Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp3498142imm; Sun, 16 Sep 2018 20:27:41 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbcD0gJFAyoshmYYLpdBMpNTQr+qbGOpuOG7KC/x1cv4pWdM1Q07M3cqofptKVFE8dKU/ow X-Received: by 2002:a62:ba0b:: with SMTP id k11-v6mr23964223pff.171.1537154861073; Sun, 16 Sep 2018 20:27:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537154861; cv=none; d=google.com; s=arc-20160816; b=z8RClq1IOkL2eMeo1kuLmNBCh/vJKcdc2DlJ2DSBGWN7rPV3B7dtMPyL9ja8jBaAnB AL1HiWBC1/ANKMVtIa16I2sYkMF7S6+3EnHuAVdmZTt1jfYXsuOqGeCEzXs/pp4zZe79 LyiIG6ZTVOY37qwRMa9SXCAW9dO6TNGxOh+OBagFbdwOmSFEMbvZLTaLGowu+I08ikrQ 0cHtl6UXmAeL0KjA7q8cDHBFvn77NG+QgoivYo/nOMWRxCOWIsiCbNLbDpYxnDBjyfUW LueppTpMhIfXPtzqwqtf5oish0gck2IXS6c6QpFCsjmWdhfrZ+MUs3M1yyLljg3snc5b 25KQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=gpL2sfmUipUJxjiRdhMm/qX+CDb73ZnseWN2JgzRpXs=; b=EVWimh1Y9AUnYFu47gAq+9iRxcjfxIxTpamSzlzlrvN3CAH7K/isfhvk6ZylRHK031 VaPs8bPc+CDGMGU3kkCR2LNIksTdtYxhk+HXhOPWuVUSDYO3NuG6i37v6+yZFl+DwoaR xCqbD0Qd5Uh75pPBqoPrdbPYFlHWUhjQLt7wrBVdkNZcwYt29MflrSGEkUxRXgqlCXq4 eBBy9x7pTUTUs3Q2ktsbc0EAn52JlVqhK4SZU9A63WZz0XQKmXWdrSNbjzXL2t9UbcpP yiGpO/zsBMB4aDyzR8MnQrpnCM7TyZVCWi8RfPZv9ol8xyOBi7/++ZDi16LMDTgmKYzS HDXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n2-v6si13827775plp.276.2018.09.16.20.27.26; Sun, 16 Sep 2018 20:27:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730176AbeIQIv3 (ORCPT + 99 others); Mon, 17 Sep 2018 04:51:29 -0400 Received: from mail5.windriver.com ([192.103.53.11]:49600 "EHLO mail5.wrs.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729621AbeIQIv3 (ORCPT ); Mon, 17 Sep 2018 04:51:29 -0400 Received: from ALA-HCA.corp.ad.wrs.com (ala-hca.corp.ad.wrs.com [147.11.189.40]) by mail5.wrs.com (8.15.2/8.15.2) with ESMTPS id w8H3OWMl020932 (version=TLSv1 cipher=AES128-SHA bits=128 verify=FAIL); Sun, 16 Sep 2018 20:24:43 -0700 Received: from pek-lpg-core2.corp.ad.wrs.com (128.224.153.41) by ALA-HCA.corp.ad.wrs.com (147.11.189.40) with Microsoft SMTP Server id 14.3.408.0; Sun, 16 Sep 2018 20:24:22 -0700 From: To: , , , , CC: Subject: [PATCH] kernel/dma: Fix panic caused by passing cma to command line Date: Mon, 17 Sep 2018 11:24:20 +0800 Message-ID: <1537154660-296740-1-git-send-email-zhe.he@windriver.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: He Zhe early_cma does not check input argument before passing it to simple_strtoull. The argument would be a NULL pointer if "cma", without its value, is set in command line and thus causes the following panic. PANIC: early exception 0xe3 IP 10:ffffffffa3e9db8d error 0 cr2 0x0 [ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 4.19.0-rc3-yocto-standard+ #7 [ 0.000000] RIP: 0010:_parse_integer_fixup_radix+0xd/0x70 ... [ 0.000000] Call Trace: [ 0.000000] simple_strtoull+0x29/0x70 [ 0.000000] memparse+0x26/0x90 [ 0.000000] early_cma+0x17/0x6a [ 0.000000] do_early_param+0x57/0x8e [ 0.000000] parse_args+0x208/0x320 [ 0.000000] ? rdinit_setup+0x30/0x30 [ 0.000000] parse_early_options+0x29/0x2d [ 0.000000] ? rdinit_setup+0x30/0x30 [ 0.000000] parse_early_param+0x36/0x4d [ 0.000000] setup_arch+0x336/0x99e [ 0.000000] start_kernel+0x6f/0x4e6 [ 0.000000] x86_64_start_reservations+0x24/0x26 [ 0.000000] x86_64_start_kernel+0x6f/0x72 [ 0.000000] secondary_startup_64+0xa4/0xb0 This patch adds a check to prevent the panic. Signed-off-by: He Zhe Cc: stable@vger.kernel.org Cc: hch@lst.de Cc: m.szyprowski@samsung.com Cc: robin.murphy@arm.com --- kernel/dma/contiguous.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/kernel/dma/contiguous.c b/kernel/dma/contiguous.c index 286d823..b2a8790 100644 --- a/kernel/dma/contiguous.c +++ b/kernel/dma/contiguous.c @@ -49,7 +49,11 @@ static phys_addr_t limit_cmdline; static int __init early_cma(char *p) { - pr_debug("%s(%s)\n", __func__, p); + if (!p) { + pr_err("Config string not provided\n"); + return -EINVAL; + } + size_cmdline = memparse(p, &p); if (*p != '@') return 0; -- 2.7.4