Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp678803pxa; Thu, 27 Aug 2020 12:44:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw0KFa9OBnu+9VdzfueKkuRKe5KUiDTfmYw+nAiuDaJRIzqvi9oT9Wo9TXUUVPvCOI4hyHM X-Received: by 2002:a17:906:140e:: with SMTP id p14mr22867903ejc.430.1598557473963; Thu, 27 Aug 2020 12:44:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598557473; cv=none; d=google.com; s=arc-20160816; b=bytSjeNifMv2Pcy6RNBhdWehsZaduirHSUD7IVYeoAwPb8ZKVrc9kgsl4BYCEGhMib 2xTKLD54S/aFghBCSzvZexyJmFlnlazRhtEW7hef/QcRC1ldaD9+7Ri67XvTtTOTr8Ld mpfoiAAgtfB/ZavHnxgs7G/mjNaStjx1zHeqISQnzd9rydwuo9cQ12FTTe9CxytW6JEj uCazPLwdcuHbFFLOX8zwU4CWiV8cBPMtNHPzT5VN+xOUdv0YCb6yfNaRVuhbKvBMog9T I+0MNV1iUs52rkKcUfZJQlHfhoM5WipBOFbqUB9wMRIc67Xr9v3G3pmUuSwHDTQnRwV+ uaQw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=WAOKzFyNC4Nrxxbu5VRJ1xHg20V+ewnGUequRB0U9Gg=; b=qy6v8AC9yCCPzqFplTgdVYIyQQtkwD6BTw5OSyvf3vb07sDQlw1m6UQ5ufaPcY3ExS N/DN4z9FAORGGocs0qvgxM/Kko7Jumpl48Q3/+Hpj+4A4XstyrAyXyplvZinw5rZR504 PjjD7+mE/MC/w+ZnHMYVR+T43+wCQb+t+bntppK7f+Eev18fd7OjBCuYFaWN2L5Mrl9x khKov55y8XpxY8gl+3LXZ3iflXnqpJC9s/CcUgV0g4SIl3BTG/uOx3CGYnMgcwVymcP6 rhI2tMpzVdKebtbSxmBfJ5xQtbj/bciYfsTz/r7k/XzUUPNz5lRS/ybxwr6R4voZhyp4 iJGA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id lz8si1926974ejb.399.2020.08.27.12.44.10; Thu, 27 Aug 2020 12:44:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726887AbgH0Tmq (ORCPT + 99 others); Thu, 27 Aug 2020 15:42:46 -0400 Received: from mail2-relais-roc.national.inria.fr ([192.134.164.83]:19640 "EHLO mail2-relais-roc.national.inria.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726120AbgH0Tmp (ORCPT ); Thu, 27 Aug 2020 15:42:45 -0400 X-IronPort-AV: E=Sophos;i="5.76,359,1592863200"; d="scan'208";a="465001195" Received: from abo-173-121-68.mrs.modulonet.fr (HELO hadrien) ([85.68.121.173]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Aug 2020 21:42:42 +0200 Date: Thu, 27 Aug 2020 21:42:42 +0200 (CEST) From: Julia Lawall X-X-Sender: jll@hadrien To: Joe Perches cc: Alex Dewar , Rasmus Villemoes , cocci , Kees Cook , Greg Kroah-Hartman , linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , accessrunner-general@lists.sourceforge.net Subject: Re: [Cocci] [PATCH] usb: atm: don't use snprintf() for sysfs attrs In-Reply-To: <5d1dfb9b031130d4d20763ec621233a19d6a88a2.camel@perches.com> Message-ID: References: <20200824222322.22962-1-alex.dewar90@gmail.com> <48f2dc90-7852-eaf1-55d7-2c85cf954688@rasmusvillemoes.dk> <20200827071537.GA168593@kroah.com> <20200827131819.7rcl2f5js3hkoqj2@lenovo-laptop> <20200827144846.yauuttjaqtxaldxg@lenovo-laptop> <5d1dfb9b031130d4d20763ec621233a19d6a88a2.camel@perches.com> User-Agent: Alpine 2.22 (DEB 394 2020-01-19) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 27 Aug 2020, Joe Perches wrote: > On Thu, 2020-08-27 at 15:48 +0100, Alex Dewar wrote: > > On Thu, Aug 27, 2020 at 03:41:06PM +0200, Rasmus Villemoes wrote: > > > On 27/08/2020 15.18, Alex Dewar wrote: > > > > On Thu, Aug 27, 2020 at 09:15:37AM +0200, Greg Kroah-Hartman wrote: > > > > > On Thu, Aug 27, 2020 at 08:42:06AM +0200, Rasmus Villemoes wrote: > > > > > > On 25/08/2020 00.23, Alex Dewar wrote: > > > > > > > kernel/cpu.c: don't use snprintf() for sysfs attrs > > > > > > > > > > > > > > As per the documentation (Documentation/filesystems/sysfs.rst), > > > > > > > snprintf() should not be used for formatting values returned by sysfs. > > > > > > > > > > > > > > > > > > > Can we have a sysfs_sprintf() (could just be a macro that does sprintf) > > > > > > to make it clear to the next reader that we know we're in a sysfs show > > > > > > method? It would make auditing uses of sprintf() much easier. > > > > > > > > > > Code churn to keep code checkers quiet for pointless reasons? What > > > > > could go wrong with that... > > > > > > I did not (mean to) suggest replacing existing sprintf() calls in sysfs > > > show methods. But when changes _are_ being made, such as when replacing > > > snprintf() calls for whatever reasons, can we please not make it harder > > > for people doing manual audits (those are "code checkers" as well, I > > > suppose, but they do tend to only make noise when finding something). > > > > > > > > It should be pretty obvious to any reader that you are in a sysfs show > > > > > method, as almost all of them are trivially tiny and obvious. > > > > > > git grep doesn't immediately show that, not even with a suitable -C > > > argument, as you can't really know the potential callers unless you open > > > the file and see that the function is only assigned as a .show method. > > > And even that can be a pain because it's all hidden behind five levels > > > of magic macros that build identifiers with ##. > > > > > > > Perhaps I should have mentioned this in the commit message, but the problem > > > > is that snprintf() doesn't return the number of bytes written to the > > > > destination buffer, > > > > > > I'm perfectly well aware of that, TYVM (you may want to 'git log > > > --author Villemoes lib/vsprintf.c'). > > > > > > but the number of bytes that *would have been written if > > > > they fitted*, which may be more than the bounds specified [1]. So "return > > > > snprintf(...)" for sysfs attributes is an antipattern. If you need bounded > > > > string ops, scnprintf() is the way to go. Using snprintf() can give a > > > > false sense of security, because it isn't necessarily safe. > > > > > > Huh? This all seems utterly irrelevant WRT a change that replaces > > > PAGE_SIZE by INT_MAX (because that's what sprintf() is going to pretend > > > you passed). You get the same return value. > > > > > > But I'm not at all concerned about whether one passes the proper buffer > > > size or not in sysfs show methods; with my embedded hat on, I'm all for > > > saving a few bytes of .text here and there. The problem, as far as I'm > > > concerned, is merely that adding sprintf() callers makes it harder to > > > find the problematic sprintf() instances. > > > > > > > Apologies, I think I might have expressed myself poorly, being a kernel noob > > ;-). I know that this is a stylistic change rather than a functional > > one -- I meant that I was hoping that it would be helpful to get rid of bad > > uses of snprintf(). > > > > I really like your idea of helper methods though :-). If in show() > > methods we could have something like: > > return sysfs_itoa(buf, i); > > in place of: > > return sprintf(buf, "%d\n", i); > > > > ... then we wouldn't be introducing any new calls to sprintf() as you > > say, but we'd still be removing a call to snprintf() (which also may be > > problematic). Plus we'd have type checking on the argument. > > > > For returning strings, we could have a bounded and unbounded variant of > > the function. As it seems like only single values should be returned via > > sysfs, if we did things this way then it would only be these > > string-returning functions which could cause buffer overflow problems > > and kernel devs could focus their attention accordingly... > > > > What do people think? I'm happy to have a crack, provided this is > > actually a sensible thing to do! I'm looking for a newbie-level project > > to get started with. > > Not a bad idea. > > Coccinelle should be able to transform the various .show > methods to something sysfs_ prefixed in a fairly automated > way. Something like identifier f; fresh identifier = "sysfs" ## f; may be useful. Let me know if further help is needed. julia > > > > > _______________________________________________ > Cocci mailing list > Cocci@systeme.lip6.fr > https://systeme.lip6.fr/mailman/listinfo/cocci >