Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2453079pxp; Mon, 7 Mar 2022 16:04:39 -0800 (PST) X-Google-Smtp-Source: ABdhPJxm4ft6vgAUjq3/dLojeYSRXJdaX6DWyDPZFX95RmX89qoWQZwuiC8kMnHHZDaaeDH3Bv9V X-Received: by 2002:a17:906:9b94:b0:6db:472:db87 with SMTP id dd20-20020a1709069b9400b006db0472db87mr9963625ejc.624.1646697879126; Mon, 07 Mar 2022 16:04:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646697879; cv=none; d=google.com; s=arc-20160816; b=apQXTeqDHeMNaHqw9msa1B4d/sUtbNxph3dJNYkkWw9HfORO5L3zyy+SuVFgP+/14f Dvv0wkHzPjdIZFHY57dJlAwR7U5qdcvA4kz/pKRdFCnwLvbS9iwmq1Rn8ouf2WtkVeVS Hfzobqa9L+mEVfgd8HlwA0PhGP2zOL0MZ+b2R4hV0d0jTbMcnl79tYEg6S71UG7ZftLs Yk7wFtp+MAmeoY4+ikZePx5CQb2NM3bs8nBrDMReTU8lmmgZmE9IKNDqfF+YJ/BT8REv Vzq3iGGVC1QmsVqGquwfLEGSxRAqWi+xyN28s/Yq7fkEuLziWzc381JOINC9grW6pGZo jaxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fjVgOeTPf2PWTfwUM9304IwL5bDG8k2aNe/u+FgSdU4=; b=t6WDD1uNlVSl0jXatqirUXy7sDRSmE9sad8X80miP22nL1Hae5sPE+SscGO7L6skd2 MBGoxQQxn4N+SEQLLd2FS6fj4R+7ptBKDS2z69nSUag8va2DTAqJSiMH61veNCBZNmPS uw2AVXOad8Z7xO/EQVEKoYiFfDBKwF5SAq5NUyrJVG1b3hZ14oUhy3bZW32Q1eOnR/7+ RRZoMk2VDQXm6U4mrDMetNkzzIUYKwjCTCFolS+btf5JICZ9OqAP71/qcepJv09o1Xb6 YqyHI6bRfOjEk2I89mAS33kGoimcM6XDn+5Fk7nz5/xEbUqw5+P9qqIsMZ9XmgCQCCcY 8ZGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="GCNY4Un/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id kz9-20020a17090777c900b006cfd1959b85si8363906ejc.363.2022.03.07.16.04.14; Mon, 07 Mar 2022 16:04:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="GCNY4Un/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240535AbiCGKkS (ORCPT + 99 others); Mon, 7 Mar 2022 05:40:18 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41172 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240792AbiCGKT2 (ORCPT ); Mon, 7 Mar 2022 05:19:28 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 15CAC62112; Mon, 7 Mar 2022 01:57:59 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 78D1660929; Mon, 7 Mar 2022 09:57:19 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6B934C340F3; Mon, 7 Mar 2022 09:57:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1646647038; bh=O834SLh8x99q2Ut0KUpMDKC7Kn7l+pM8+iUMXreQbKE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GCNY4Un/ulNZh00bridmXk7OSRBLSmRbbP1/gCa26fXtKUCrVBh5PNLYwRyCKMlgl 7b7SRc3ogMwEwIaKZsAKFWEfl2UVpoPsWxuK4domJw85zUFYSFRFq4rVC30shItOZ2 hPMoxdhhvxqYCvehwR1LiD3xUWMa/pWXE+PJMjR8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Randy Dunlap , Igor Zhbanov , Masami Hiramatsu , "Steven Rostedt (Google)" Subject: [PATCH 5.16 172/186] tracing: Fix return value of __setup handlers Date: Mon, 7 Mar 2022 10:20:10 +0100 Message-Id: <20220307091658.886471698@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220307091654.092878898@linuxfoundation.org> References: <20220307091654.092878898@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Randy Dunlap commit 1d02b444b8d1345ea4708db3bab4db89a7784b55 upstream. __setup() handlers should generally return 1 to indicate that the boot options have been handled. Using invalid option values causes the entire kernel boot option string to be reported as Unknown and added to init's environment strings, polluting it. Unknown kernel command line parameters "BOOT_IMAGE=/boot/bzImage-517rc6 kprobe_event=p,syscall_any,$arg1 trace_options=quiet trace_clock=jiffies", will be passed to user space. Run /sbin/init as init process with arguments: /sbin/init with environment: HOME=/ TERM=linux BOOT_IMAGE=/boot/bzImage-517rc6 kprobe_event=p,syscall_any,$arg1 trace_options=quiet trace_clock=jiffies Return 1 from the __setup() handlers so that init's environment is not polluted with kernel boot options. Link: lore.kernel.org/r/64644a2f-4a20-bab3-1e15-3b2cdd0defe3@omprussia.ru Link: https://lkml.kernel.org/r/20220303031744.32356-1-rdunlap@infradead.org Cc: stable@vger.kernel.org Fixes: 7bcfaf54f591 ("tracing: Add trace_options kernel command line parameter") Fixes: e1e232ca6b8f ("tracing: Add trace_clock= kernel parameter") Fixes: 970988e19eb0 ("tracing/kprobe: Add kprobe_event= boot parameter") Signed-off-by: Randy Dunlap Reported-by: Igor Zhbanov Acked-by: Masami Hiramatsu Signed-off-by: Steven Rostedt (Google) Signed-off-by: Greg Kroah-Hartman --- kernel/trace/trace.c | 4 ++-- kernel/trace/trace_kprobe.c | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -235,7 +235,7 @@ static char trace_boot_options_buf[MAX_T static int __init set_trace_boot_options(char *str) { strlcpy(trace_boot_options_buf, str, MAX_TRACER_SIZE); - return 0; + return 1; } __setup("trace_options=", set_trace_boot_options); @@ -246,7 +246,7 @@ static int __init set_trace_boot_clock(c { strlcpy(trace_boot_clock_buf, str, MAX_TRACER_SIZE); trace_boot_clock = trace_boot_clock_buf; - return 0; + return 1; } __setup("trace_clock=", set_trace_boot_clock); --- a/kernel/trace/trace_kprobe.c +++ b/kernel/trace/trace_kprobe.c @@ -31,7 +31,7 @@ static int __init set_kprobe_boot_events strlcpy(kprobe_boot_events_buf, str, COMMAND_LINE_SIZE); disable_tracing_selftest("running kprobe events"); - return 0; + return 1; } __setup("kprobe_event=", set_kprobe_boot_events);