Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp721241pxa; Thu, 27 Aug 2020 14:02:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw2Iia89WGgHLrhAu8VTQLPYQfr5Lr3yner1lj+jCwik0qmw3oArPwm2oGWqE1h24Vo1j0g X-Received: by 2002:a17:906:600f:: with SMTP id o15mr22221110ejj.529.1598562150571; Thu, 27 Aug 2020 14:02:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598562150; cv=none; d=google.com; s=arc-20160816; b=kve5NUuvvC5xeGgnElez35gtp9XLKd8UVqty8iA3L/xTztSvKSqJ4ERmWeIBA2wZ9n VO9RrT6/i6Rlsj01kASGRpydb2pQMy2gtKkihNrd7UAsP8qR9aTObuAEHRnNyXXiVqEA vLOdSkREOFMI0h1Rw4rP+VGWA33BPqLuLLqTabci7PDwNUfQXDTw7lRSmODpVi4VPSKE HHQeOEDciwZ+/JvhyCWZcvzMf1vVEmN4IXYN+4DtBZv7KVq8kseEr/8MUQahsRKAWqVV IHHsQvCmyT2xNR1yUy9YGhKMeL3EB6l0i7/bwn+9WeJZIG/CGTFmApCOM1iHks/25QOO HcWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=9Obo5yB6a8LTFA3jHak2j25ap3sTMvyjnhZzclCQshw=; b=eb3oZFUv9XSuGUWopHwrc7zmNRndtRv3LQXseAR+Idhvlr5PcwNU1lHmooiSlN+eFY U3dtbfRtevrO/EXSlkwcK1hWpWBQDH1eLRUQ/MVGftyo6uEYt69626c/XIcmQrgh482c UevhK1qkkqX8fvOcj5FJkdrTqRqINa1eoUHwSLG5PM6LXHJDypX+Ad91anYXB92codva zt+4agtMy69T6li1iV8UCoBToTSV+lpgJElGGDQ0Qo2Otn4McsCJgu7Gx4CpXf7LnEB8 EE4zRahNlZSEiPhXESn/Awqr1BCJRijIBYxcZVDdNURvK4gkCEsoAGK4V+UVFnVg4+4Z PKvA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j16si2134961ejb.407.2020.08.27.14.02.06; Thu, 27 Aug 2020 14:02:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726321AbgH0VBC (ORCPT + 99 others); Thu, 27 Aug 2020 17:01:02 -0400 Received: from smtprelay0199.hostedemail.com ([216.40.44.199]:34456 "EHLO smtprelay.hostedemail.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726147AbgH0VBB (ORCPT ); Thu, 27 Aug 2020 17:01:01 -0400 Received: from filter.hostedemail.com (clb03-v110.bra.tucows.net [216.40.38.60]) by smtprelay06.hostedemail.com (Postfix) with ESMTP id 411CB18224504; Thu, 27 Aug 2020 21:01:00 +0000 (UTC) X-Session-Marker: 6A6F6540706572636865732E636F6D X-Spam-Summary: 2,0,0,,d41d8cd98f00b204,joe@perches.com,,RULES_HIT:2:41:355:379:599:973:988:989:1260:1277:1311:1313:1314:1345:1359:1437:1515:1516:1518:1535:1593:1594:1605:1606:1730:1747:1777:1792:2194:2199:2393:2553:2559:2562:2828:2893:2894:3138:3139:3140:3141:3142:3622:3865:3866:3867:3868:3870:3871:3872:3873:3874:4118:4250:4321:5007:6117:6119:6247:6691:7903:8526:8603:8660:9040:10004:10848:11232:11658:11914:12043:12296:12297:12663:12740:12760:12895:13148:13153:13228:13230:13439:14659:21080:21324:21433:21451:21627:21939:21990:30012:30034:30054:30070:30090:30091,0,RBL:none,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache:0,MSF:not bulk,SPF:,MSBL:0,DNSBL:none,Custom_rules:0:1:0,LFtime:1,LUA_SUMMARY:none X-HE-Tag: stew80_430513e27070 X-Filterd-Recvd-Size: 7057 Received: from XPS-9350.home (unknown [47.151.133.149]) (Authenticated sender: joe@perches.com) by omf17.hostedemail.com (Postfix) with ESMTPA; Thu, 27 Aug 2020 21:00:58 +0000 (UTC) Message-ID: Subject: Re: [Cocci] [PATCH] usb: atm: don't use snprintf() for sysfs attrs From: Joe Perches To: Julia Lawall Cc: Alex Dewar , Rasmus Villemoes , cocci , Kees Cook , Greg Kroah-Hartman , linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" Date: Thu, 27 Aug 2020 14:00:57 -0700 In-Reply-To: References: <20200824222322.22962-1-alex.dewar90@gmail.com> <48f2dc90-7852-eaf1-55d7-2c85cf954688@rasmusvillemoes.dk> <20200827071537.GA168593@kroah.com> <20200827131819.7rcl2f5js3hkoqj2@lenovo-laptop> <20200827144846.yauuttjaqtxaldxg@lenovo-laptop> <5d1dfb9b031130d4d20763ec621233a19d6a88a2.camel@perches.com> Content-Type: text/plain; charset="ISO-8859-1" User-Agent: Evolution 3.36.4-0ubuntu1 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2020-08-27 at 13:29 -0700, Joe Perches wrote: > On Thu, 2020-08-27 at 21:42 +0200, Julia Lawall wrote: > > On Thu, 27 Aug 2020, Joe Perches wrote: > > > > > On Thu, 2020-08-27 at 15:48 +0100, Alex Dewar wrote: > > > > On Thu, Aug 27, 2020 at 03:41:06PM +0200, Rasmus Villemoes wrote: > > > > > On 27/08/2020 15.18, Alex Dewar wrote: > > > > > > On Thu, Aug 27, 2020 at 09:15:37AM +0200, Greg Kroah-Hartman wrote: > > > > > > > On Thu, Aug 27, 2020 at 08:42:06AM +0200, Rasmus Villemoes wrote: > > > > > > > > On 25/08/2020 00.23, Alex Dewar wrote: > > > > > > > > > kernel/cpu.c: don't use snprintf() for sysfs attrs > > > > > > > > > > > > > > > > > > As per the documentation (Documentation/filesystems/sysfs.rst), > > > > > > > > > snprintf() should not be used for formatting values returned by sysfs. > > > > > > > > > > > > > > > > > > > > > > > > > Can we have a sysfs_sprintf() (could just be a macro that does sprintf) > > > > > > > > to make it clear to the next reader that we know we're in a sysfs show > > > > > > > > method? It would make auditing uses of sprintf() much easier. > > > > > > > > > > > > > > Code churn to keep code checkers quiet for pointless reasons? What > > > > > > > could go wrong with that... > > > > > > > > > > I did not (mean to) suggest replacing existing sprintf() calls in sysfs > > > > > show methods. But when changes _are_ being made, such as when replacing > > > > > snprintf() calls for whatever reasons, can we please not make it harder > > > > > for people doing manual audits (those are "code checkers" as well, I > > > > > suppose, but they do tend to only make noise when finding something). > > > > > > > > > > > > It should be pretty obvious to any reader that you are in a sysfs show > > > > > > > method, as almost all of them are trivially tiny and obvious. > > > > > > > > > > git grep doesn't immediately show that, not even with a suitable -C > > > > > argument, as you can't really know the potential callers unless you open > > > > > the file and see that the function is only assigned as a .show method. > > > > > And even that can be a pain because it's all hidden behind five levels > > > > > of magic macros that build identifiers with ##. > > > > > > > > > > > Perhaps I should have mentioned this in the commit message, but the problem > > > > > > is that snprintf() doesn't return the number of bytes written to the > > > > > > destination buffer, > > > > > > > > > > I'm perfectly well aware of that, TYVM (you may want to 'git log > > > > > --author Villemoes lib/vsprintf.c'). > > > > > > > > > > but the number of bytes that *would have been written if > > > > > > they fitted*, which may be more than the bounds specified [1]. So "return > > > > > > snprintf(...)" for sysfs attributes is an antipattern. If you need bounded > > > > > > string ops, scnprintf() is the way to go. Using snprintf() can give a > > > > > > false sense of security, because it isn't necessarily safe. > > > > > > > > > > Huh? This all seems utterly irrelevant WRT a change that replaces > > > > > PAGE_SIZE by INT_MAX (because that's what sprintf() is going to pretend > > > > > you passed). You get the same return value. > > > > > > > > > > But I'm not at all concerned about whether one passes the proper buffer > > > > > size or not in sysfs show methods; with my embedded hat on, I'm all for > > > > > saving a few bytes of .text here and there. The problem, as far as I'm > > > > > concerned, is merely that adding sprintf() callers makes it harder to > > > > > find the problematic sprintf() instances. > > > > > > > > > > > > > Apologies, I think I might have expressed myself poorly, being a kernel noob > > > > ;-). I know that this is a stylistic change rather than a functional > > > > one -- I meant that I was hoping that it would be helpful to get rid of bad > > > > uses of snprintf(). > > > > > > > > I really like your idea of helper methods though :-). If in show() > > > > methods we could have something like: > > > > return sysfs_itoa(buf, i); > > > > in place of: > > > > return sprintf(buf, "%d\n", i); > > > > > > > > ... then we wouldn't be introducing any new calls to sprintf() as you > > > > say, but we'd still be removing a call to snprintf() (which also may be > > > > problematic). Plus we'd have type checking on the argument. > > > > > > > > For returning strings, we could have a bounded and unbounded variant of > > > > the function. As it seems like only single values should be returned via > > > > sysfs, if we did things this way then it would only be these > > > > string-returning functions which could cause buffer overflow problems > > > > and kernel devs could focus their attention accordingly... > > > > > > > > What do people think? I'm happy to have a crack, provided this is > > > > actually a sensible thing to do! I'm looking for a newbie-level project > > > > to get started with. > > > > > > Not a bad idea. > > > > > > Coccinelle should be able to transform the various .show > > > methods to something sysfs_ prefixed in a fairly automated > > > way. > > > > Something like > > > > identifier f; > > fresh identifier = "sysfs" ## f; > > > > may be useful. Let me know if further help is needed. cocci syntax eludes me, but I imagine something like: @@ identifier f_show =~ "^.*_show$"; @@ ssize_t f_show(struct kobject *kobj, struct kobj_attribute *attr, char *buf) { - sprintf + kobj_sprintf (...);