Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3496233pxj; Tue, 11 May 2021 05:58:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/v45bkxJ2H0zVXJ1riEBYEFA7MotQbC318w7a9ODHQXHav9APVHhWSYeMtMhdGrkdC4a3 X-Received: by 2002:a17:906:868b:: with SMTP id g11mr31743355ejx.15.1620737897752; Tue, 11 May 2021 05:58:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620737897; cv=none; d=google.com; s=arc-20160816; b=qk0spipHrt5z49NFPUkB3/dRZo6+Kc2TJ/qEHhXDL1ASEgdMSuk0Vkihndmhih7K1N lR96mGso8/Xziv7H8kacxd4oYlMFe7++u3zqsjT+zPQtX39wmCHZIQooiRGM9OqfPFd2 InUoXjFqIs2LxItvF6Vpcqo9uQ7hSvVeO/S6UIjjnz7AEhUkBYatErgNbIODKEKMMHs0 Qm9jmBRaz8576AMoqJMzyqf05fdxY0+c1yHQV7rAwbDIKf9zjhUWwSvacasYskjHiz0O hWw5uqY7EAJegcyYj7cZ7sA5IncTBcmgsTObgqilsozKauPQJUbQ1gOD3WlEh7QE9T+G j/+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=9kMV8pUYrkvF6jIYQ+tSzpal/v2kZTEWMuHl1QDyWpI=; b=cn38om0874YdX3ubuSWMOekDydHe5PkHj1V2xn5ANjvO/xcNp7mbplJ9N8gscF+csf /u8bQcadCv/SLagZPDIsDWHiOFjFLJiFScRRi9fOVrRLe0qRNQzK9bhHEcSD836FaFA/ MrN9mWzTOFEsBAk7ao3399oZNkY3anNbqOY2BY8THrBufBeC5nWGpRXwRK+4luDjTlnN u87M9AkUQRrGBvYrxT9jt0ZMvF4QKsv8JmjqHY68BoPCTkehMpmpgxmmREV0LliamNZ+ jGFyIWude/d1GRHsICj+n6MKPbCPBJx88AxbfWYFNrs20g1yqjq2/2p4oRcees0+HUfn iFTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s5si16838168eju.297.2021.05.11.05.57.53; Tue, 11 May 2021 05:58:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231545AbhEKM4C (ORCPT + 99 others); Tue, 11 May 2021 08:56:02 -0400 Received: from out30-133.freemail.mail.aliyun.com ([115.124.30.133]:51867 "EHLO out30-133.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231392AbhEKM4C (ORCPT ); Tue, 11 May 2021 08:56:02 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R131e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04395;MF=joseph.qi@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0UYYCUtP_1620737693; Received: from B-D1K7ML85-0059.local(mailfrom:joseph.qi@linux.alibaba.com fp:SMTPD_---0UYYCUtP_1620737693) by smtp.aliyun-inc.com(127.0.0.1); Tue, 11 May 2021 20:54:54 +0800 Subject: Re: [PATCH] ocfs2: fix snprintf() checking To: Dan Carpenter , Mark Fasheh Cc: Joel Becker , Andrew Morton , Gang He , ocfs2-devel@oss.oracle.com, linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org References: From: Joseph Qi Message-ID: Date: Tue, 11 May 2021 20:54:53 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.10.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/11/21 3:16 PM, Dan Carpenter wrote: > The snprintf() function returns the number of bytes which would have > been printed if the buffer was large enough. In other words it can > return ">= remain" but this code assumes it returns "== remain". > > The run time impact of this bug is not very severe. The next iteration > through the loop would trigger a WARN() when we pass a negative limit > to snprintf(). We would then return success instead of -E2BIG. > > The kernel implementation of snprintf() will never return negatives so > there is no need to check and I have deleted that dead code. > > Fixes: a860f6eb4c6a ("ocfs2: sysfile interfaces for online file check") > Signed-off-by: Dan Carpenter Looks good. But the last 2 sections are introduced by: 74ae4e104dfc ocfs2: Create stack glue sysfs files. With 'Fixes' tag updated, Reviewed-by: Joseph Qi > --- > fs/ocfs2/filecheck.c | 6 +----- > fs/ocfs2/stackglue.c | 8 ++------ > 2 files changed, 3 insertions(+), 11 deletions(-) > > diff --git a/fs/ocfs2/filecheck.c b/fs/ocfs2/filecheck.c > index 90b8d300c1ee..de56e6231af8 100644 > --- a/fs/ocfs2/filecheck.c > +++ b/fs/ocfs2/filecheck.c > @@ -326,11 +326,7 @@ static ssize_t ocfs2_filecheck_attr_show(struct kobject *kobj, > ret = snprintf(buf + total, remain, "%lu\t\t%u\t%s\n", > p->fe_ino, p->fe_done, > ocfs2_filecheck_error(p->fe_status)); > - if (ret < 0) { > - total = ret; > - break; > - } > - if (ret == remain) { > + if (ret >= remain) { > /* snprintf() didn't fit */ > total = -E2BIG; > break; > diff --git a/fs/ocfs2/stackglue.c b/fs/ocfs2/stackglue.c > index d50e8b8dfea4..16f1bfc407f2 100644 > --- a/fs/ocfs2/stackglue.c > +++ b/fs/ocfs2/stackglue.c > @@ -500,11 +500,7 @@ static ssize_t ocfs2_loaded_cluster_plugins_show(struct kobject *kobj, > list_for_each_entry(p, &ocfs2_stack_list, sp_list) { > ret = snprintf(buf, remain, "%s\n", > p->sp_name); > - if (ret < 0) { > - total = ret; > - break; > - } > - if (ret == remain) { > + if (ret >= remain) { > /* snprintf() didn't fit */ > total = -E2BIG; > break; > @@ -531,7 +527,7 @@ static ssize_t ocfs2_active_cluster_plugin_show(struct kobject *kobj, > if (active_stack) { > ret = snprintf(buf, PAGE_SIZE, "%s\n", > active_stack->sp_name); > - if (ret == PAGE_SIZE) > + if (ret >= PAGE_SIZE) > ret = -E2BIG; > } > spin_unlock(&ocfs2_stack_lock); >