Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1256252imm; Sat, 22 Sep 2018 23:51:43 -0700 (PDT) X-Google-Smtp-Source: ACcGV629Sh57aGu/KqNq3Yse3dQsgHcHeowuXaFUpvAYlVIZF795+GU5SIlOEQ2GAScxIfdxU6oB X-Received: by 2002:a17:902:14e:: with SMTP id 72-v6mr5241621plb.299.1537685503325; Sat, 22 Sep 2018 23:51:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537685503; cv=none; d=google.com; s=arc-20160816; b=dx0cyWkyG3eUeffs+notmA2g7Rd0tQzLhlGincopMA6qXw+cbq1YEEZ5FYU9D2MIgX tDgbs2RF55+Jv1WEUT2ZooOX8+ykSv5d+d7xsmWg8hu2hOOxLxmRuBViL/e1XvP8Z2GW Q6LtkfiIbe6FTa/84mLm30up2+NAL5GF21E4ZwOWc0qwhqRXVDu4Kt8HPtz8rYSQH3Np dZaq3X5S9cVNr0xy7uh5XmH0e3eaMiB6fjhq7hvwJFVnpjn3tvgGs1z/GAlbxVpjapzx JRbqSHVl/OcX12Y96oLCnDDAS8IBFGQA1TeP8T/FZYd51i5x5qS2RVTmHvh3zeJumzR7 rVWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=8zg7/GoS+6Gffbap+JwlTCnKCZnjbBqIz7sD7Uh0mjQ=; b=j748Brl3qJ7BVqpwxfpJqKCctam7k+KdSJn7n4zDYoFIK2QH6hGmBBd3gpXbv6gv2D uNpM9aFiqOy2+NEKVh6iEKid3pkOS+pKnlVobqyI/A63EmYPaMxHwakYQ7jPLuRkGDCy jbkZM9e7D5V1mwuHt/huq3IVpGgajcuORSMN/z4m0KGFySHKhVRlUjPdWxtW7vk6+xHZ o6b/2qbmlth2KkbPzgjM2WmqVCSunw0M8qt8K4OkdPLKFmH2NT2YsiLYpLO93jeMLmzr 57F5CMn5aLYWcoh5DpqYQXp2cIaDUaj0DGtPYQVv2lCqhslcp4qQmpyVHvolo8IelPTv xjgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f62-v6si35127311pfb.218.2018.09.22.23.51.27; Sat, 22 Sep 2018 23:51:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726070AbeIWMrq (ORCPT + 99 others); Sun, 23 Sep 2018 08:47:46 -0400 Received: from mail1.windriver.com ([147.11.146.13]:47357 "EHLO mail1.windriver.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726029AbeIWMrq (ORCPT ); Sun, 23 Sep 2018 08:47:46 -0400 Received: from ALA-HCA.corp.ad.wrs.com ([147.11.189.40]) by mail1.windriver.com (8.15.2/8.15.1) with ESMTPS id w8N6pGne022677 (version=TLSv1 cipher=AES128-SHA bits=128 verify=FAIL); Sat, 22 Sep 2018 23:51:16 -0700 (PDT) Received: from [128.224.162.216] (128.224.162.216) by ALA-HCA.corp.ad.wrs.com (147.11.189.50) with Microsoft SMTP Server (TLS) id 14.3.408.0; Sat, 22 Sep 2018 23:51:15 -0700 Subject: Re: [PATCH v3 1/2] printk: Fix panic caused by passing log_buf_len to command line To: Steven Rostedt CC: , , References: <1537630852-247674-1-git-send-email-zhe.he@windriver.com> <20180922121905.3e4159eb@vmware.local.home> From: He Zhe Message-ID: Date: Sun, 23 Sep 2018 14:51:12 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20180922121905.3e4159eb@vmware.local.home> Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Content-Language: en-US X-Originating-IP: [128.224.162.216] Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018年09月23日 00:19, Steven Rostedt wrote: > On Sat, 22 Sep 2018 23:40:51 +0800 > wrote: > >> From: He Zhe >> >> log_buf_len_setup does not check input argument before passing it to >> simple_strtoull. The argument would be a NULL pointer if "log_buf_len", >> without its value, is set in command line and thus causes the following >> panic. >> >> PANIC: early exception 0xe3 IP 10:ffffffffaaeacd0d error 0 cr2 0x0 >> [ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 4.19.0-rc4-yocto-standard+ #1 >> [ 0.000000] RIP: 0010:_parse_integer_fixup_radix+0xd/0x70 >> ... >> [ 0.000000] Call Trace: >> [ 0.000000] simple_strtoull+0x29/0x70 >> [ 0.000000] memparse+0x26/0x90 >> [ 0.000000] log_buf_len_setup+0x17/0x22 >> [ 0.000000] do_early_param+0x57/0x8e >> [ 0.000000] parse_args+0x208/0x320 >> [ 0.000000] ? rdinit_setup+0x30/0x30 >> [ 0.000000] parse_early_options+0x29/0x2d >> [ 0.000000] ? rdinit_setup+0x30/0x30 >> [ 0.000000] parse_early_param+0x36/0x4d >> [ 0.000000] setup_arch+0x336/0x99e >> [ 0.000000] start_kernel+0x6f/0x4ee >> [ 0.000000] x86_64_start_reservations+0x24/0x26 >> [ 0.000000] x86_64_start_kernel+0x6f/0x72 >> [ 0.000000] secondary_startup_64+0xa4/0xb0 >> >> This patch adds a check to prevent the panic. >> >> Signed-off-by: He Zhe >> Cc: stable@vger.kernel.org > I just tried this on a 2.6.32 kernel, and it crashes there. I guess > this goes farther back than git history goes. > > Perhaps it should be commented that this bug has been here since > creation of (git) time. I did a try on 2.6.32. It passed. Actually this bug only happens on early_param(not __setup) which is introduced since v3.0. The oldest LTS version is 3.16 now. Should I send v4 and add a statement about the supported version range in commit log? > > >> Cc: pmladek@suse.com >> Cc: sergey.senozhatsky@gmail.com >> Cc: rostedt@goodmis.org >> --- >> v2: >> Split out the addition of pr_fmt and the unsigned update > Which unsigned update? As it does switch to unsigned to "unsigned int", > but that change is fine to me with this. No problem. It's the history of v2. In v1 you suggested "unsigned int size" should be in a separate patch and I did that in v2. Then Sergey suggested "unsigned int size" should be in the 1/2 patch to avoid checkpatch.pl warning. With your conformation, I add it back here in v3. Thanks, Zhe > >> v3: >> Use more clear error info >> Change unsigned to unsigned in to avoid checkpatch.pl warning >> >> kernel/printk/printk.c | 9 ++++++++- >> 1 file changed, 8 insertions(+), 1 deletion(-) >> >> diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c >> index 9bf5404..d9821c0 100644 >> --- a/kernel/printk/printk.c >> +++ b/kernel/printk/printk.c >> @@ -1048,7 +1048,14 @@ static void __init log_buf_len_update(unsigned size) >> /* save requested log_buf_len since it's too early to process it */ >> static int __init log_buf_len_setup(char *str) >> { >> - unsigned size = memparse(str, &str); >> + unsigned int size; > I'm OK with the int update too, as its low risk. > > Acked-by: Steven Rostedt (VMware) > > -- Steve > >> + >> + if (!str) { >> + pr_err("boot command line parameter value not provided\n"); >> + return -EINVAL; >> + } >> + >> + size = memparse(str, &str); >> >> log_buf_len_update(size); >> >