Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2475158yba; Sun, 28 Apr 2019 01:38:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqxkkRqRfsYmjEi9+V1+GOFdV+PioL7yz1lAipqwma9zOzP8hs3B51SuI+pEaqNsfZSNFYrQ X-Received: by 2002:a63:6503:: with SMTP id z3mr53800714pgb.113.1556440735128; Sun, 28 Apr 2019 01:38:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556440735; cv=none; d=google.com; s=arc-20160816; b=NIWUnQL1xbiA7Qd8rAJ5miA3fbqhjlF+L8IxpwY9tJsIU3n5n/MwIqwtVa19oipQK2 ZoK/Llfdc8hSdouLpt2N4ydrRpngRriHlhmNLwrRRVmw509/wKrorHRhOhru1Hd1RBJY QrbDE2wXDQxGNslvkhtQ8g/i9kziz4gGLs76mBuziA6U9l6sXt3fg4M51XoFPmE7KCaq tWiv5HbxadfSHSUxb4I/YzIzQusY7aHBei7qR3auENceHSnjx/gLYNm2zCqyAILwM4zD 2wNIwTa+M+vhpEgTWQfGVPtm4ZGcwvyMbkgGGDFiNE4CrjAHSXiOcIGNQugLvG2pAV2U knsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=1UWqZ7MLiw0VkLguI+bztwS+2z2DmNdJF9yIeec+Tbk=; b=ZdxeQr4z6SXzsUeRWbJDhb3v7J6trkY7USwAezbARzsDS1R+vfCPMlqO9D+OXMkc6G iFbBN0eW3ufU7FNmGxBEDur6m442/AHnaA+xS7HlDdi5RuWPjY9ljH0PfZkPoeUAE2Ok cOljWjMOWPfwBN2B7Pk0LwbBRxELt4v6CcAldfc7CjtQaVlw6o080+HwlfUq0GquVwgn is0ITff8Rw/i36wL9aGEqmqE8XzoMgpraSO7vT97ofLgJQ0ZC1c8FKM+QOMLOPKc1y2G f09lXbffeYUpDhSBsJ297SK8AtvfXuR16QyTzRn7tk+jBmJgKUNuAnky6r7NWVOfvd4P Ji5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f5si16379092pgs.86.2019.04.28.01.38.40; Sun, 28 Apr 2019 01:38:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726601AbfD1Ihj (ORCPT + 99 others); Sun, 28 Apr 2019 04:37:39 -0400 Received: from mx1.redhat.com ([209.132.183.28]:53382 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726532AbfD1Ihj (ORCPT ); Sun, 28 Apr 2019 04:37:39 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id BEE19308425B; Sun, 28 Apr 2019 08:37:36 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-12-104.pek2.redhat.com [10.72.12.104]) by smtp.corp.redhat.com (Postfix) with ESMTPS id EF1721001DCE; Sun, 28 Apr 2019 08:37:14 +0000 (UTC) Date: Sun, 28 Apr 2019 16:37:10 +0800 From: Dave Young To: Pingfan Liu Cc: Matthias Brugger , LKML , Rich Felker , linux-ia64@vger.kernel.org, Julien Thierry , Yangtao Li , Benjamin Herrenschmidt , Palmer Dabbelt , Heiko Carstens , x86@kernel.org, linux-mips@vger.kernel.org, Paul Mackerras , "H. Peter Anvin" , linux-s390@vger.kernel.org, Florian Fainelli , Yoshinori Sato , linux-sh@vger.kernel.org, Michael Ellerman , David Hildenbrand , Russell King , Ingo Molnar , linux-arm-kernel@lists.infradead.org, Catalin Marinas , James Hogan , Fenghua Yu , Will Deacon , linuxppc-dev@lists.ozlabs.org, Ananth N Mavinakayanahalli , Borislav Petkov , Stefan Agner , Thomas Gleixner , Hari Bathini , Jens Axboe , Tony Luck , Baoquan He , Ard Biesheuvel , Robin Murphy , Greg Kroah-Hartman , Ralf Baechle , Thomas Bogendoerfer , Paul Burton , Johannes Weiner , Martin Schwidefsky , Andrew Morton , Logan Gunthorpe , Greg Hackmann , kexec@lists.infradead.org Subject: Re: [PATCHv2] kernel/crash: make parse_crashkernel()'s return value more indicant Message-ID: <20190428083710.GA11981@dhcp-128-65.nay.redhat.com> References: <1556087581-14513-1-git-send-email-kernelfans@gmail.com> <10dc5468-6cd9-85c7-ba66-1dfa5aa922b7@suse.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.3 (2019-02-01) X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.40]); Sun, 28 Apr 2019 08:37:38 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/25/19 at 04:20pm, Pingfan Liu wrote: > On Wed, Apr 24, 2019 at 4:31 PM Matthias Brugger wrote: > > > > > [...] > > > @@ -139,6 +141,8 @@ static int __init parse_crashkernel_simple(char *cmdline, > > > pr_warn("crashkernel: unrecognized char: %c\n", *cur); > > > return -EINVAL; > > > } > > > + if (*crash_size == 0) > > > + return -EINVAL; > > > > This covers the case where I pass an argument like "crashkernel=0M" ? > > Can't we fix that by using kstrtoull() in memparse and check if the return value > > is < 0? In that case we could return without updating the retptr and we will be > > fine. > > > It seems that kstrtoull() treats 0M as invalid parameter, while > simple_strtoull() does not. > > If changed like your suggestion, then all the callers of memparse() > will treats 0M as invalid parameter. This affects many components > besides kexec. Not sure this can be done or not. simple_strtoull is obsolete, move to kstrtoull is the right way. $ git grep memparse|wc 158 950 10479 Except some documentation/tools etc there are still a log of callers which directly use the return value as the ull number without error checking. So it would be good to mark memparse as obsolete as well in lib/cmdline.c, and introduce a new function eg. kmemparse() to use kstrtoull, and return a real error code, and save the size in an argument like &size. Then update X86 crashkernel code to use it. Thanks Dave