Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1882658pxp; Mon, 7 Mar 2022 04:33:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJxeIHYsvw2ccAdnjL7Ipn1earCgoya01jHq972MjI0wcNC22gptHixvpMs/E156aQnepXd6 X-Received: by 2002:aa7:c54b:0:b0:415:c714:7a1f with SMTP id s11-20020aa7c54b000000b00415c7147a1fmr10625984edr.385.1646656423205; Mon, 07 Mar 2022 04:33:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646656423; cv=none; d=google.com; s=arc-20160816; b=xn6ZPRVaUUCWl2nDKaltJjeOHxnWGrXcIHh1QolEe1NsMGux52QMMl1sC/5NjNZMdO NRNOUIKvQRXsim/kgKfTAVCq/B5g0FJrL8OL+c4M0yNpRW4BvAjXJmS0I5hB+c9FhhUz Lim0HD9lTlrUzT9OPs1HgoBJb+hgaIjfSmjaJssGKHGSjUI7W/uE/VdGi/XgWrMm0ycz TLwuf8hIZpQKLanv+D67fbdD3wL48oHjGQY2tZkRaaKuGZClZtd4V3UBYVhBenCgKElr DXrrHTbBBv1M8N0bH9IBLdEGgK/y8OfQSsawp05mdm2/uhrzjaXKO+4ABruslrvqvsZT l0aQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fjVgOeTPf2PWTfwUM9304IwL5bDG8k2aNe/u+FgSdU4=; b=SBgmML2QKCCTRYrSULueNcEubgV6PkREBLxvcSjspkOcyqnEMOX6sFfhn9CY/4vbuM dr+kFR6Vc0IwagtvTKyaIcSBe4TEWzWcu/J/EvM7SM1+8fWUTVOHqISr724G1aFILA5J jPel3t9gtJXq40sU1rIvsAwD/8uqTME2cyucHvkZovvlac8+vZkd1E+cKHINSy/X5tcA SNqt4JHWOPzrOu5Qkj8wxFMB7x3u2zrmEvPu3M3LlnI37s0pKiQfS40x4tEcbkHxVbFa czgidLvTlRqjm+AJdEoJwRJgQ0I5i2cYYucD3m/IKID3Bp/hLrimkrnzJcGQEPZNPhgI ++GA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wvbkSJcW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i25-20020a50fd19000000b0041614eca4cbsi5284021eds.479.2022.03.07.04.33.19; Mon, 07 Mar 2022 04:33:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=wvbkSJcW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240348AbiCGKX3 (ORCPT + 99 others); Mon, 7 Mar 2022 05:23:29 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40430 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240398AbiCGKA7 (ORCPT ); Mon, 7 Mar 2022 05:00:59 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5F44713E9E; Mon, 7 Mar 2022 01:47:54 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 0FBE8B80E70; Mon, 7 Mar 2022 09:47:53 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4ED97C340E9; Mon, 7 Mar 2022 09:47:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1646646471; bh=O834SLh8x99q2Ut0KUpMDKC7Kn7l+pM8+iUMXreQbKE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wvbkSJcWjEBFP8/HRrKfRhLswICPizFl4jRjfey04GjVFzRs1Fg8csKIyIeWTMAVY zw9Kna+u+WzNCEWqr3LTzdInHaNOJwRVaUfRKW3OdRCEr0eJSUnPjT1LQvCfE3sPd9 CeSRJ1fUf5BxjAX2lYRKLiYca+UwcwQudJY4S0cc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Randy Dunlap , Igor Zhbanov , Masami Hiramatsu , "Steven Rostedt (Google)" Subject: [PATCH 5.15 253/262] tracing: Fix return value of __setup handlers Date: Mon, 7 Mar 2022 10:19:57 +0100 Message-Id: <20220307091710.796331942@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220307091702.378509770@linuxfoundation.org> References: <20220307091702.378509770@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Randy Dunlap commit 1d02b444b8d1345ea4708db3bab4db89a7784b55 upstream. __setup() handlers should generally return 1 to indicate that the boot options have been handled. Using invalid option values causes the entire kernel boot option string to be reported as Unknown and added to init's environment strings, polluting it. Unknown kernel command line parameters "BOOT_IMAGE=/boot/bzImage-517rc6 kprobe_event=p,syscall_any,$arg1 trace_options=quiet trace_clock=jiffies", will be passed to user space. Run /sbin/init as init process with arguments: /sbin/init with environment: HOME=/ TERM=linux BOOT_IMAGE=/boot/bzImage-517rc6 kprobe_event=p,syscall_any,$arg1 trace_options=quiet trace_clock=jiffies Return 1 from the __setup() handlers so that init's environment is not polluted with kernel boot options. Link: lore.kernel.org/r/64644a2f-4a20-bab3-1e15-3b2cdd0defe3@omprussia.ru Link: https://lkml.kernel.org/r/20220303031744.32356-1-rdunlap@infradead.org Cc: stable@vger.kernel.org Fixes: 7bcfaf54f591 ("tracing: Add trace_options kernel command line parameter") Fixes: e1e232ca6b8f ("tracing: Add trace_clock= kernel parameter") Fixes: 970988e19eb0 ("tracing/kprobe: Add kprobe_event= boot parameter") Signed-off-by: Randy Dunlap Reported-by: Igor Zhbanov Acked-by: Masami Hiramatsu Signed-off-by: Steven Rostedt (Google) Signed-off-by: Greg Kroah-Hartman --- kernel/trace/trace.c | 4 ++-- kernel/trace/trace_kprobe.c | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -235,7 +235,7 @@ static char trace_boot_options_buf[MAX_T static int __init set_trace_boot_options(char *str) { strlcpy(trace_boot_options_buf, str, MAX_TRACER_SIZE); - return 0; + return 1; } __setup("trace_options=", set_trace_boot_options); @@ -246,7 +246,7 @@ static int __init set_trace_boot_clock(c { strlcpy(trace_boot_clock_buf, str, MAX_TRACER_SIZE); trace_boot_clock = trace_boot_clock_buf; - return 0; + return 1; } __setup("trace_clock=", set_trace_boot_clock); --- a/kernel/trace/trace_kprobe.c +++ b/kernel/trace/trace_kprobe.c @@ -31,7 +31,7 @@ static int __init set_kprobe_boot_events strlcpy(kprobe_boot_events_buf, str, COMMAND_LINE_SIZE); disable_tracing_selftest("running kprobe events"); - return 0; + return 1; } __setup("kprobe_event=", set_kprobe_boot_events);