Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp580891pxa; Thu, 27 Aug 2020 09:59:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwvKtVgXC8SHD1oAfWcEiPYC6DGuSdc/NA0ujKbHkuT7QMMM19nmVy73vEEpWBaEpdtBqF8 X-Received: by 2002:a17:906:4a99:: with SMTP id x25mr22838666eju.439.1598547598674; Thu, 27 Aug 2020 09:59:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598547598; cv=none; d=google.com; s=arc-20160816; b=Fyy3+g/MCAJspzx99J4WQ4p1VpwzzE/s6E6v/2ZZ88ajV5iGPd4xNSwGxTdMmXumZ6 5LUwlRrnjBXEWXSBfwM9vpBApA9L6gzXhs3SoLNcVXpmj2KO5xLYqvenO6irLDanP29w u0Fjw3wKVjdm4y2Ko1pxEL416PxHotuOGxtx3OHbdznWDvVkK+qrJ5UbET66YM+oIjMb 74m3I8dyXMFAJ+PmHxcC2/bnMGcGb7kNf94cwPinQVKQLXYQn95c9fviofevYxyLz6q7 a88GFlW9qk1HImVFgWGynlTVZLlfgTTap4zcTtOIS/sL6t6+wqlvmw3E8LRGcSUab6au XJew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=IqG2+LRM1p9AI4aYfleV7hRRGkBCCOwVFRwlwxPrXPk=; b=iCxpXv0bNt56cDWRH8elZqq78Ek7Eq+6z8u8BEhJN4wx0r2dOQfKmPQFCSewoEyl0h Ho75LSrPbD44BgawC8wN9cIM+bktvNWeVspsfXKfyXt8PO/p5xrA1TDmxQu2TAf3XMe+ PuZD66eGtMjh66EACq6Y9MiTRsorzjKcZgBBVBEcKmDXjfDVc0wJkBIuKeau6KdD73HQ ByQfewWJNXb4KYZrNy6q9KCtGCCGg5d4+sFJRG6Newj3CmJRTtySovCH6tTvxtWpUamF LElELO2MKZ4zYEs7bYrqn7iuiKKHL4Xdev6a19E8oOQMlY4ni66KwAl4zRVCqDLlFcAz vykg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l17si1944900edq.349.2020.08.27.09.59.34; Thu, 27 Aug 2020 09:59:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726307AbgH0Q6r (ORCPT + 99 others); Thu, 27 Aug 2020 12:58:47 -0400 Received: from smtprelay0149.hostedemail.com ([216.40.44.149]:37430 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726009AbgH0Q6o (ORCPT ); Thu, 27 Aug 2020 12:58:44 -0400 Received: from filter.hostedemail.com (clb03-v110.bra.tucows.net [216.40.38.60]) by smtprelay01.hostedemail.com (Postfix) with ESMTP id 68626100E7B46; Thu, 27 Aug 2020 16:58:42 +0000 (UTC) X-Session-Marker: 6A6F6540706572636865732E636F6D X-Spam-Summary: 2,0,0,,d41d8cd98f00b204,joe@perches.com,,RULES_HIT:41:355:379:599:973:988:989:1260:1277:1311:1313:1314:1345:1359:1437:1515:1516:1518:1535:1544:1593:1594:1605:1711:1730:1747:1777:1792:2194:2199:2393:2553:2559:2562:2828:2893:2894:3138:3139:3140:3141:3142:3622:3865:3866:3867:3868:3870:3871:3872:3873:3874:4250:4321:5007:6117:6119:6247:6691:7903:8603:8660:9040:10004:10848:11232:11658:11914:12043:12296:12297:12663:12740:12760:12895:13018:13019:13095:13148:13153:13228:13230:13439:14096:14097:14181:14659:14721:21080:21324:21433:21451:21627:21939:21990:30012:30034:30054:30070:30090:30091,0,RBL:none,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache:0,MSF:not bulk,SPF:,MSBL:0,DNSBL:none,Custom_rules:0:1:0,LFtime:1,LUA_SUMMARY:none X-HE-Tag: air51_610ed3a2706e X-Filterd-Recvd-Size: 5803 Received: from XPS-9350.home (unknown [47.151.133.149]) (Authenticated sender: joe@perches.com) by omf11.hostedemail.com (Postfix) with ESMTPA; Thu, 27 Aug 2020 16:58:40 +0000 (UTC) Message-ID: <5d1dfb9b031130d4d20763ec621233a19d6a88a2.camel@perches.com> Subject: Re: [PATCH] usb: atm: don't use snprintf() for sysfs attrs From: Joe Perches To: Alex Dewar , Rasmus Villemoes , cocci Cc: Greg Kroah-Hartman , Kees Cook , "Gustavo A. R. Silva" , accessrunner-general@lists.sourceforge.net, linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org Date: Thu, 27 Aug 2020 09:58:39 -0700 In-Reply-To: <20200827144846.yauuttjaqtxaldxg@lenovo-laptop> References: <20200824222322.22962-1-alex.dewar90@gmail.com> <48f2dc90-7852-eaf1-55d7-2c85cf954688@rasmusvillemoes.dk> <20200827071537.GA168593@kroah.com> <20200827131819.7rcl2f5js3hkoqj2@lenovo-laptop> <20200827144846.yauuttjaqtxaldxg@lenovo-laptop> Content-Type: text/plain; charset="ISO-8859-1" User-Agent: Evolution 3.36.4-0ubuntu1 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2020-08-27 at 15:48 +0100, Alex Dewar wrote: > On Thu, Aug 27, 2020 at 03:41:06PM +0200, Rasmus Villemoes wrote: > > On 27/08/2020 15.18, Alex Dewar wrote: > > > On Thu, Aug 27, 2020 at 09:15:37AM +0200, Greg Kroah-Hartman wrote: > > > > On Thu, Aug 27, 2020 at 08:42:06AM +0200, Rasmus Villemoes wrote: > > > > > On 25/08/2020 00.23, Alex Dewar wrote: > > > > > > kernel/cpu.c: don't use snprintf() for sysfs attrs > > > > > > > > > > > > As per the documentation (Documentation/filesystems/sysfs.rst), > > > > > > snprintf() should not be used for formatting values returned by sysfs. > > > > > > > > > > > > > > > > Can we have a sysfs_sprintf() (could just be a macro that does sprintf) > > > > > to make it clear to the next reader that we know we're in a sysfs show > > > > > method? It would make auditing uses of sprintf() much easier. > > > > > > > > Code churn to keep code checkers quiet for pointless reasons? What > > > > could go wrong with that... > > > > I did not (mean to) suggest replacing existing sprintf() calls in sysfs > > show methods. But when changes _are_ being made, such as when replacing > > snprintf() calls for whatever reasons, can we please not make it harder > > for people doing manual audits (those are "code checkers" as well, I > > suppose, but they do tend to only make noise when finding something). > > > > > > It should be pretty obvious to any reader that you are in a sysfs show > > > > method, as almost all of them are trivially tiny and obvious. > > > > git grep doesn't immediately show that, not even with a suitable -C > > argument, as you can't really know the potential callers unless you open > > the file and see that the function is only assigned as a .show method. > > And even that can be a pain because it's all hidden behind five levels > > of magic macros that build identifiers with ##. > > > > > Perhaps I should have mentioned this in the commit message, but the problem > > > is that snprintf() doesn't return the number of bytes written to the > > > destination buffer, > > > > I'm perfectly well aware of that, TYVM (you may want to 'git log > > --author Villemoes lib/vsprintf.c'). > > > > but the number of bytes that *would have been written if > > > they fitted*, which may be more than the bounds specified [1]. So "return > > > snprintf(...)" for sysfs attributes is an antipattern. If you need bounded > > > string ops, scnprintf() is the way to go. Using snprintf() can give a > > > false sense of security, because it isn't necessarily safe. > > > > Huh? This all seems utterly irrelevant WRT a change that replaces > > PAGE_SIZE by INT_MAX (because that's what sprintf() is going to pretend > > you passed). You get the same return value. > > > > But I'm not at all concerned about whether one passes the proper buffer > > size or not in sysfs show methods; with my embedded hat on, I'm all for > > saving a few bytes of .text here and there. The problem, as far as I'm > > concerned, is merely that adding sprintf() callers makes it harder to > > find the problematic sprintf() instances. > > > > Apologies, I think I might have expressed myself poorly, being a kernel noob > ;-). I know that this is a stylistic change rather than a functional > one -- I meant that I was hoping that it would be helpful to get rid of bad > uses of snprintf(). > > I really like your idea of helper methods though :-). If in show() > methods we could have something like: > return sysfs_itoa(buf, i); > in place of: > return sprintf(buf, "%d\n", i); > > ... then we wouldn't be introducing any new calls to sprintf() as you > say, but we'd still be removing a call to snprintf() (which also may be > problematic). Plus we'd have type checking on the argument. > > For returning strings, we could have a bounded and unbounded variant of > the function. As it seems like only single values should be returned via > sysfs, if we did things this way then it would only be these > string-returning functions which could cause buffer overflow problems > and kernel devs could focus their attention accordingly... > > What do people think? I'm happy to have a crack, provided this is > actually a sensible thing to do! I'm looking for a newbie-level project > to get started with. Not a bad idea. Coccinelle should be able to transform the various .show methods to something sysfs_ prefixed in a fairly automated way.