Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp954555pxp; Wed, 16 Mar 2022 22:31:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwghXITvXobFQtsSARsqii2WQVQ8bcwRqalfX6jN0zRbl0N4p0mAdp0+Sh4xrJg8fY+6dIO X-Received: by 2002:a65:5c48:0:b0:382:2c7:28e9 with SMTP id v8-20020a655c48000000b0038202c728e9mr1786753pgr.472.1647495112347; Wed, 16 Mar 2022 22:31:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647495112; cv=none; d=google.com; s=arc-20160816; b=ms9wuW5LtJ04mRJmEYqVQnjSbqezGCFsoQjl3OPqxW6VPOzXFMJ+SjFqK8IoFswlCJ AuFO6TRqthgqUhWoIDi4RwpiFM+49znREWuBHJelnZOpmnzyriVLIcUoRuCzNC8eI8OM qVJD2Wv65eV4j2GiYH6lv8SfeauFYakxj/rCWCujEE/uI1efD0bJO+eqp/+CPbJHWg6l +miULHZbty91zLly8W/e38aMl3u8vfv9gH5xx7+9LyBYpRMJ5X8i39l4wL5Td5yZSHrJ 2YwwpwWKNclZO+IDl1N+MLwmNJ2Llhrxi5H1bNaJxj8Sk79zWZplz1htoPg3GeN0h4kC kmqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=Xrv4PFSyhAtwnCAL/pjWyzmn6e9Q3pw3qGeeMjVLkWc=; b=dcwGopwtQLI7+MIrfI+sRN2PhPGs4vod0Dm6THLR+9sXdd4dIf08wM4gr3mGRfmVj6 bIfXj4bB8nYldVR0eOIO5/xcmFwOim5AN0aXVxLK8qWNOquKwA2XbpMkn/3wP3Cho6Wz f6obNPfdCv3ehZNuzia6NFbBUamK2dFegb6MGT0dPJaLh+L1ePk+FL5kqoHVYnUKe9yJ 7vgLvVfYL8uPLtlIUrqCCeFxXWK7E4sgSFOqYrduUEgD2DLSDp6heMtVQZgXDYdebh2R G1sctjCQDocLyTF7MnvO4XvxIvkcI6WVMdxZPYbYl10Jb3e+Wu5BMwHAwZk3vvUv3mJS Ra2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=ThLCeQCL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id c127-20020a624e85000000b004f6d695c355si3587714pfb.295.2022.03.16.22.31.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Mar 2022 22:31:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=ThLCeQCL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 21001266B6C; Wed, 16 Mar 2022 21:33:35 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357399AbiCPP4f (ORCPT + 99 others); Wed, 16 Mar 2022 11:56:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46298 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1357364AbiCPP4e (ORCPT ); Wed, 16 Mar 2022 11:56:34 -0400 Received: from mail-ej1-x62f.google.com (mail-ej1-x62f.google.com [IPv6:2a00:1450:4864:20::62f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 944945F4F0; Wed, 16 Mar 2022 08:55:19 -0700 (PDT) Received: by mail-ej1-x62f.google.com with SMTP id hw13so5077104ejc.9; Wed, 16 Mar 2022 08:55:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Xrv4PFSyhAtwnCAL/pjWyzmn6e9Q3pw3qGeeMjVLkWc=; b=ThLCeQCLe60XloIENcKZTLtoa92AsszbMGtlE1VP85Nj8ONYeGAtPtd3THFkwuE1R4 Rb+p8levz1Kkk/esESpsWOOce4y/GAs3zE/h/Iq8JTZadMNMhSzoXuCsi65zQcSj9uj9 roUu7BL6G2KSrbQdMUcXxa1eBfn7GLPhFdgtrRtKQ1B6XjhvDCk1M6WlSKyn57HnuVDa 81Zd+YwZwjEFy9IgsZIWqi9+OJ0hcLCs/C3anzU5mAn4GgUA+5ei9x+U8aPDc4PlCURW 8DQSGQ08z9c9bhp4uK79m+ecf2bqZ6sdte5Pd0FZyKDC2WwgAQ/cfFk5gcysCgAmWYjH wmBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Xrv4PFSyhAtwnCAL/pjWyzmn6e9Q3pw3qGeeMjVLkWc=; b=jZbVG83EaNe51cfcqEo9zhXvbP0JhZmRa5ZQhstJYLcyw5r96NRrK+Quf/tVffXkRC s4KfTzJCbYt6XC3lKngK7Pt9Cg8ORMH9LLnB+SDHbXt9IKMZfKa5bLo1VL9zjdsPtn0H SqVNrKJp6hIjfAUDBJh0GMLgbC5PtvvPaXMhe1V+Y+r5o/vZTrbZntfJXz5ZcPvMonlN DT22h5wzva3KgO7A9Ms9tGDqMTRKUfhMPkrW+D48QnGLV3u0A8INbVEZ43VF/B4RG5/q DCedcz06rkUE02MyfAx2f927LmGrNhCkZnoQRIILqlyw0vy7Jn0wsDzDZ+Ns5lSCSQLi jQHw== X-Gm-Message-State: AOAM532FM1C5NuMF+Jefu/fmEKnWuwFxwfW4y5qzanz2YoWIcBTMkeY7 lVwHu1j6CbKdJUvidv7pmqkKuZydHQWmUgZOtDA= X-Received: by 2002:a17:907:6e01:b0:6d0:562c:e389 with SMTP id sd1-20020a1709076e0100b006d0562ce389mr499870ejc.497.1647446118072; Wed, 16 Mar 2022 08:55:18 -0700 (PDT) MIME-Version: 1.0 References: <20220316150533.421349-1-krzysztof.kozlowski@canonical.com> <20220316150533.421349-2-krzysztof.kozlowski@canonical.com> In-Reply-To: <20220316150533.421349-2-krzysztof.kozlowski@canonical.com> From: Andy Shevchenko Date: Wed, 16 Mar 2022 17:54:04 +0200 Message-ID: Subject: Re: [PATCH v5 01/11] driver: platform: Add helper for safer setting of driver_override To: Krzysztof Kozlowski Cc: Greg Kroah-Hartman , "Rafael J. Wysocki" , Stuart Yoder , "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , Wei Liu , Dexuan Cui , Bjorn Helgaas , Bjorn Andersson , Mathieu Poirier , Vineeth Vijayan , Peter Oberparleiter , Heiko Carstens , Vasily Gorbik , Alexander Gordeev , Christian Borntraeger , Sven Schnelle , Andy Gross , Linux Kernel Mailing List , linux-clk , NXP Linux Team , linux-arm Mailing List , Linux on Hyper-V List , linux-pci , linux-remoteproc@vger.kernel.org, linux-s390@vger.kernel.org, linux-arm-msm@vger.kernel.org, ALSA Development Mailing List , linux-spi , virtualization@lists.linux-foundation.org, Linus Torvalds , Rasmus Villemoes Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 16, 2022 at 5:06 PM Krzysztof Kozlowski wrote: ... > +int driver_set_override(struct device *dev, const char **override, > + const char *s, size_t len) > +{ > + const char *new, *old; > + char *cp; > + if (!dev || !override || !s) > + return -EINVAL; Sorry, I didn't pay much attention on this. First of all, I would drop dev checks and simply require that dev should be valid. Do you expect this can be called when dev is invalid? I would like to hear if it's anything but theoretical. Second one, is the !s requirement. Do I understand correctly that the string must be always present? But then how we NULify the override? Is it possible? Third one is absence of len check. See below. > + /* > + * The stored value will be used in sysfs show callback (sysfs_emit()), > + * which has a length limit of PAGE_SIZE and adds a trailing newline. > + * Thus we can store one character less to avoid truncation during sysfs > + * show. > + */ > + if (len >= (PAGE_SIZE - 1)) > + return -EINVAL; I would relax this to make sure we can use it if \n is within this limit. > + cp = strnchr(s, len, '\n'); > + if (cp) > + len = cp - s; > + > + new = kstrndup(s, len, GFP_KERNEL); Here is a word about the len check. > + if (!new) If len == 0, this won't trigger and you have something very interesting as a result. One way is to use ZERO_PTR_OR_NULL() another is explicitly check for 0 and issue a (different?) error code. > + return -ENOMEM; > + > + device_lock(dev); > + old = *override; > + if (cp != s) { > + *override = new; > + } else { > + kfree(new); > + *override = NULL; > + } > + device_unlock(dev); > + > + kfree(old); > + > + return 0; > +} -- With Best Regards, Andy Shevchenko