Received: by 2002:a4a:301c:0:0:0:0:0 with SMTP id q28-v6csp762403oof; Tue, 25 Sep 2018 04:25:44 -0700 (PDT) X-Google-Smtp-Source: ACcGV61PyR9UQbU/zRF+r4qx/W1gQyKBGJvKKjwe673ub7awI6CyNWN4WFv7yPsHnaw78hmcL+k8 X-Received: by 2002:a63:844:: with SMTP id 65-v6mr662945pgi.144.1537874744820; Tue, 25 Sep 2018 04:25:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537874744; cv=none; d=google.com; s=arc-20160816; b=jaigQxp4LeNl6wu9TtQ5KVu7LGcYOV+dhwj4lgBqBE/WMrzD8QjKYNDyeEvRYDuAsx BBxjQKOpzvDgpJaAeay22UwkfMuUee/dnmmwwAttAT2xe7J8u040fRbFEh3jmHwmeGy3 /FPNXbinl+lYrGgC9IJF27ix4u72xe7DfGwmfjAnV8FbDTmp5k8CLRHJp1Nff3nfDRXs gewbOcCHWXtzKopVYOHYp0B1EQ08Jg1e1+RyqbYuGO+vsKAom1JyiEQbOh2ndU5BSzZu M0ZPQ2V6ZT8q3O2dy4IXJ5rDLBAJOEsjm8LTdbatFgLC1wQzTGzwnOxDHcdneNhUYyxF wYJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=MMOe1f/Y1jFrVnK9p0//bbnIUTaRPZP6aS6OSummMP0=; b=yjYrxAGK8fFqAEKREK3EpeZfvD2rWL7lCM11MxI7Z4L72t9pp7Fkf7lpOsrZIomq0A 9BoRnDwSmmECyACqKgn0rHE06s2nRH85Z167yMUfny7a9cCcjZkg6SE9hYklYRtEbyGz KrhGsohGibtq2fWZbtRQs49GMv94V2cVhbrCbz3OtRsJQxbG9QQ8Yew09yNv0NOoV5qp u/ldbRhip0HzSQZy+i1aO1tiVkuEOQt00h2wZHSd2VgcGLrRasXBrj0mqPQp1rvpuSNZ 7xJJT57bbYHY2DsUP+GXkkRnEt8hxe6YhVnBREnf17Hl19uTWTnXn1UisrLqJdqyc3QU W0Jg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 9-v6si2182492pgn.512.2018.09.25.04.25.29; Tue, 25 Sep 2018 04:25:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728906AbeIYRcX (ORCPT + 99 others); Tue, 25 Sep 2018 13:32:23 -0400 Received: from mx2.suse.de ([195.135.220.15]:52674 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728421AbeIYRcX (ORCPT ); Tue, 25 Sep 2018 13:32:23 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B2855AFCA; Tue, 25 Sep 2018 11:25:16 +0000 (UTC) Date: Tue, 25 Sep 2018 13:25:14 +0200 From: Petr Mladek To: zhe.he@windriver.com Cc: sergey.senozhatsky@gmail.com, rostedt@goodmis.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 1/2] printk: Fix panic caused by passing log_buf_len to command line Message-ID: <20180925112514.vpxu6ldy3r4hglj6@pathway.suse.cz> References: <1537630852-247674-1-git-send-email-zhe.he@windriver.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1537630852-247674-1-git-send-email-zhe.he@windriver.com> User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat 2018-09-22 23:40:51, zhe.he@windriver.com wrote: > diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c > index 9bf5404..d9821c0 100644 > --- a/kernel/printk/printk.c > +++ b/kernel/printk/printk.c > @@ -1048,7 +1048,14 @@ static void __init log_buf_len_update(unsigned size) > /* save requested log_buf_len since it's too early to process it */ > static int __init log_buf_len_setup(char *str) > { > - unsigned size = memparse(str, &str); > + unsigned int size; > + > + if (!str) { > + pr_err("boot command line parameter value not provided\n"); This message is too generic. It would be hard to guess what parameter was affected. Also it is not fatal, so I would just use warning, something like: pr_warn("Warning: No value defined for the command line parameter: log_bug_len\n"); > + return -EINVAL; > + } > + > + size = memparse(str, &str); > > log_buf_len_update(size); Best Regards, Petr