Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp697564imm; Sat, 22 Sep 2018 08:41:31 -0700 (PDT) X-Google-Smtp-Source: ACcGV63xAG6Cb42slT0UwAv7L1HnjccheYZWc/1IZfiJKjc0bTsVpBIlvohOphHmI4aRl6pN/9k8 X-Received: by 2002:a63:2106:: with SMTP id h6-v6mr2694175pgh.161.1537630891487; Sat, 22 Sep 2018 08:41:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537630891; cv=none; d=google.com; s=arc-20160816; b=w2wIK6610IkjjK4aRMofVxFWSiU+rtNzlhjW2nKIjTIzuLWw1bVmnk3RnKiCPR7GxY TTYWT+A/Oxu947hCh1p2AV1vb2Wj4UsJei2cg5GXOmTJJG1fg89xoerSdT8sgAdDdXP9 HHx0WyEKNhdn+M77Gbmy48sOzjXud9cszy0WymaTwLvvo+v2DhAUdJshv+MAcGX1O/+l sGIxFIRouAcDMwktqO8DFbmqwOTLOqNMpjMVxP+uzQN8q5yfncnSDR+TQsvxI1vDN8Uc kVC9Vvhj374BvEJZsm79F17AXFT8y+yRU4xXwQixG1LaJzUiykwr9WhaRyZbcaSg9TQF S2Kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:to :from; bh=TGGap3y/wqhDItesbUHy80Drhb83s1Ts/5uQnlqXgPc=; b=fnXkl1OYCCBegd28ebFwEGdk6aVRQDRCKLSXfVv86npzniPeTqzKclktieqI8cV7X/ D+3NozH04ZIebX4tKDUfDNy8LL6uu70MzRoffrAs6WPBrWKgsG19dILYvtWKHnfVov13 OnXQPqebyCP21c9NMdAQlHW411gSItDScvjMEFiV2+BPGaHKTG6VYfAzQr7J7DDmsFGT 1yygAgJc68D7Xs0pIho4cfrzmxsHNbqqF3d4FYFwNbfZ2yLidk4uLUsAXhRPzLMHaqSu sheUCuOftsor3gAjQ4X/WJpYNtHlxBzeDDZDw0dwaMdP/G6kQdkmKsxmzF5xTDZHRYDu vUww== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bb7-v6si29559035plb.359.2018.09.22.08.41.15; Sat, 22 Sep 2018 08:41:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728778AbeIVVfK (ORCPT + 99 others); Sat, 22 Sep 2018 17:35:10 -0400 Received: from mail.windriver.com ([147.11.1.11]:33293 "EHLO mail.windriver.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728534AbeIVVfK (ORCPT ); Sat, 22 Sep 2018 17:35:10 -0400 Received: from ALA-HCB.corp.ad.wrs.com ([147.11.189.41]) by mail.windriver.com (8.15.2/8.15.1) with ESMTPS id w8MFf6U8016784 (version=TLSv1 cipher=AES128-SHA bits=128 verify=FAIL); Sat, 22 Sep 2018 08:41:06 -0700 (PDT) Received: from pek-lpg-core2.corp.ad.wrs.com (128.224.153.41) by ALA-HCB.corp.ad.wrs.com (147.11.189.41) with Microsoft SMTP Server id 14.3.408.0; Sat, 22 Sep 2018 08:40:53 -0700 From: To: , , , , Subject: [PATCH v3 1/2] printk: Fix panic caused by passing log_buf_len to command line Date: Sat, 22 Sep 2018 23:40:51 +0800 Message-ID: <1537630852-247674-1-git-send-email-zhe.he@windriver.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: He Zhe log_buf_len_setup does not check input argument before passing it to simple_strtoull. The argument would be a NULL pointer if "log_buf_len", without its value, is set in command line and thus causes the following panic. PANIC: early exception 0xe3 IP 10:ffffffffaaeacd0d error 0 cr2 0x0 [ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 4.19.0-rc4-yocto-standard+ #1 [ 0.000000] RIP: 0010:_parse_integer_fixup_radix+0xd/0x70 ... [ 0.000000] Call Trace: [ 0.000000] simple_strtoull+0x29/0x70 [ 0.000000] memparse+0x26/0x90 [ 0.000000] log_buf_len_setup+0x17/0x22 [ 0.000000] do_early_param+0x57/0x8e [ 0.000000] parse_args+0x208/0x320 [ 0.000000] ? rdinit_setup+0x30/0x30 [ 0.000000] parse_early_options+0x29/0x2d [ 0.000000] ? rdinit_setup+0x30/0x30 [ 0.000000] parse_early_param+0x36/0x4d [ 0.000000] setup_arch+0x336/0x99e [ 0.000000] start_kernel+0x6f/0x4ee [ 0.000000] x86_64_start_reservations+0x24/0x26 [ 0.000000] x86_64_start_kernel+0x6f/0x72 [ 0.000000] secondary_startup_64+0xa4/0xb0 This patch adds a check to prevent the panic. Signed-off-by: He Zhe Cc: stable@vger.kernel.org Cc: pmladek@suse.com Cc: sergey.senozhatsky@gmail.com Cc: rostedt@goodmis.org --- v2: Split out the addition of pr_fmt and the unsigned update v3: Use more clear error info Change unsigned to unsigned in to avoid checkpatch.pl warning kernel/printk/printk.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c index 9bf5404..d9821c0 100644 --- a/kernel/printk/printk.c +++ b/kernel/printk/printk.c @@ -1048,7 +1048,14 @@ static void __init log_buf_len_update(unsigned size) /* save requested log_buf_len since it's too early to process it */ static int __init log_buf_len_setup(char *str) { - unsigned size = memparse(str, &str); + unsigned int size; + + if (!str) { + pr_err("boot command line parameter value not provided\n"); + return -EINVAL; + } + + size = memparse(str, &str); log_buf_len_update(size); -- 2.7.4