Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp5395997imm; Tue, 18 Sep 2018 08:53:55 -0700 (PDT) X-Google-Smtp-Source: ANB0Vda7XAMGI7GLcHBmgMooz7Gv6JjR3EfIqQEfKynGQHiNYNYgwaNFaj7OwOzncqcilfkV163s X-Received: by 2002:a65:49cc:: with SMTP id t12-v6mr28346527pgs.27.1537286035045; Tue, 18 Sep 2018 08:53:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537286035; cv=none; d=google.com; s=arc-20160816; b=APb7LD6kGpnnwahd0NC2EBmKCetyR23soOwtS/JMFdWKoB0rBi02tiYscZZCx9P/9o 1ZyX12wrbz0xGwM0F7LtQ4hhCbRM5/lwraJoEWB058Eg7rciRzq2AdEnW+tdy6GxlnWU xxmMpQVPJdesd+k5pAxv9p/nHn4Io24D/5Wtyy5wMRGVLPk7AM47FZAT4POWEI2oWpYD nfFbuotk9Lo3o2HbhGOiLSIOI7o9/LQGUqet4oT8MrFk0nsJMjHosVGPh2pqckhyaPHj OqcyV1oaIwy2h6mRgfcZ53oyOXyRNLOF5S3+5dFLu5v4809vV4rF2j9LDlpAsoGvFxCr Lwkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=uO2RT10WIdcfJqUB2KaqpgQvZ8mpqtrphHB0d4EaX1M=; b=ptnuyTvXP1IoulDWy8uXR8bQHXKLYnyM2LNoy7zfekl6w1MAuvgM95++7UxjotBy6f 9KzPRmEavOO3YgG5uEv/1JHJpfarWFbDkzXJgPtSL8brjFpW+lUN+6MpJ9zOFKjzBorx 7C6F9Vdf14TAUarps1EghPzhjuSCNb9bRmjWolS9mayEjzjeVnx653eIPwrvh4SLm8gG /df/MoLsSjxrHhGH+uroQt8tf8xbtqyb0gCm6RY0C9GRViCfZrQX+zm0bCGMxh447hr2 1g9qo4v4K8Dq7aTl9ggwh3aBfQyBP7yGHxeR/xWOENvhMwIp9OB23JiIezqmr3hyN4kn Jl9A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 93-v6si19578478plf.113.2018.09.18.08.53.35; Tue, 18 Sep 2018 08:53:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730076AbeIRVZC (ORCPT + 99 others); Tue, 18 Sep 2018 17:25:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:48890 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729249AbeIRVZC (ORCPT ); Tue, 18 Sep 2018 17:25:02 -0400 Received: from gandalf.local.home (cpe-66-24-56-78.stny.res.rr.com [66.24.56.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5627321471; Tue, 18 Sep 2018 15:51:51 +0000 (UTC) Date: Tue, 18 Sep 2018 11:51:49 -0400 From: Steven Rostedt To: Cc: , , Subject: Re: [PATCH] printk: Fix panic caused by passing log_buf_len to command line Message-ID: <20180918115149.46685fae@gandalf.local.home> In-Reply-To: <1537285354-430044-1-git-send-email-zhe.he@windriver.com> References: <1537285354-430044-1-git-send-email-zhe.he@windriver.com> X-Mailer: Claws Mail 3.16.0 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 18 Sep 2018 23:42:34 +0800 wrote: > From: He Zhe > > log_buf_len_setup does not check input argument before passing it to > simple_strtoull. The argument would be a NULL pointer if "log_buf_len", > without its value, is set in command line and thus causes the following > panic. > > PANIC: early exception 0xe3 IP 10:ffffffffaaeacd0d error 0 cr2 0x0 > [ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 4.19.0-rc4-yocto-standard+ #1 > [ 0.000000] RIP: 0010:_parse_integer_fixup_radix+0xd/0x70 > ... > [ 0.000000] Call Trace: > [ 0.000000] simple_strtoull+0x29/0x70 > [ 0.000000] memparse+0x26/0x90 > [ 0.000000] log_buf_len_setup+0x17/0x22 > [ 0.000000] do_early_param+0x57/0x8e > [ 0.000000] parse_args+0x208/0x320 > [ 0.000000] ? rdinit_setup+0x30/0x30 > [ 0.000000] parse_early_options+0x29/0x2d > [ 0.000000] ? rdinit_setup+0x30/0x30 > [ 0.000000] parse_early_param+0x36/0x4d > [ 0.000000] setup_arch+0x336/0x99e > [ 0.000000] start_kernel+0x6f/0x4ee > [ 0.000000] x86_64_start_reservations+0x24/0x26 > [ 0.000000] x86_64_start_kernel+0x6f/0x72 > [ 0.000000] secondary_startup_64+0xa4/0xb0 > > This patch adds a check to prevent the panic, adds KBUILD_MODNAME to > prints and correct bare use of 'unsigned'. Hi! The addition of pr_fmt and the unsigned update should be a separate patch. This is a bug fix and only the bug fix should be included, as it is going to be backported. Thanks! -- Steve > > Signed-off-by: He Zhe > Cc: stable@vger.kernel.org > Cc: pmladek@suse.com > Cc: sergey.senozhatsky@gmail.com > Cc: rostedt@goodmis.org > --- > kernel/printk/printk.c | 11 ++++++++++- > 1 file changed, 10 insertions(+), 1 deletion(-) > > diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c > index 9bf5404..f6d4030 100644 > --- a/kernel/printk/printk.c > +++ b/kernel/printk/printk.c > @@ -16,6 +16,8 @@ > * 01Mar01 Andrew Morton > */ > > +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt > + > #include > #include > #include > @@ -1048,7 +1050,14 @@ static void __init log_buf_len_update(unsigned size) > /* save requested log_buf_len since it's too early to process it */ > static int __init log_buf_len_setup(char *str) > { > - unsigned size = memparse(str, &str); > + unsigned int size; > + > + if (!str) { > + pr_err("Config string not provided\n"); > + return -EINVAL; > + } > + > + size = memparse(str, &str); > > log_buf_len_update(size); >