Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp3366721pxb; Mon, 4 Apr 2022 14:50:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyhJ+0Bdtz/aYOTMT/X9YCKAQWKETP3XixvFebuA3ZxWCJOiWk1PH/5gDYxNbdAZgDUAEZp X-Received: by 2002:a50:9d47:0:b0:40f:9d3d:97b6 with SMTP id j7-20020a509d47000000b0040f9d3d97b6mr231545edk.392.1649109035054; Mon, 04 Apr 2022 14:50:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649109035; cv=none; d=google.com; s=arc-20160816; b=VWYy5DLzyUfZxW37eCzJnvvt+obbM/SSCDGlj/nKs1526jv9hzgd/cmFfBBJqQTcOF PFdUbT+jhhXjiMcsYYoiAlpEoLLt++UE39BXmccrUinCVc015hBE99UggNng21ZU6+nE KO7nv7jRof4bAkYQIIrpuWqGBury0MFi25FRryXeCofcnfQCFZW7hO8JZe7jx47NJ2Br ZUNWeP7ETYP3+Rp4IlcHb2CkKWkjT+WZWX3FAyPZoCLGP4ffyCXkLgBNaoHGHntlk+Z4 3gvzVrGV5PQVzvo4jNNcLEhLdQAJA0K9ON8XVvQwZkhtsMxQtza2rBwi2C6zQlJwjF6X PDWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=bdNSHlvxbLgeS5OtknPrJD9scGCCHGJswcOxfjpkj8k=; b=g/52xkb/fOQV3NEgJvIBmDvyIDA8YN6sD4ejWKwFpWA0XJLYGH+j9cs42YSmsQij2+ LXxfWUV0qPwXF+cbc9XW4frIytXnW05OLsow0PQH+XpCUFVnBFb1EwS3R0HY+NcymhML l67YkLksmPbTllf8N2/1Xo69oNrigNtfXPlfpJS6YL7bVmCbbUVm1Ae5PF0WAn8ZI0mm FNt7RKvRyd70pM0di7C+k3WPu64Y5kvohqsm9wDq9OU2N3D1tr4I5bmOrCUQ9LPmQQHD qh2jPTpylD+f66+wV4BgejNMIGNSd/DSgRXTHN0c03xNzg7s0Sl8fQHYDJJl231TpD6s XXsg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=HJPxauCl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l19-20020a17090612d300b006df76385e94si7269843ejb.820.2022.04.04.14.50.10; Mon, 04 Apr 2022 14:50:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=HJPxauCl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1359763AbiDCS2y (ORCPT + 99 others); Sun, 3 Apr 2022 14:28:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54076 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235979AbiDCS2t (ORCPT ); Sun, 3 Apr 2022 14:28:49 -0400 Received: from mail-wr1-x431.google.com (mail-wr1-x431.google.com [IPv6:2a00:1450:4864:20::431]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 078C439154 for ; Sun, 3 Apr 2022 11:26:55 -0700 (PDT) Received: by mail-wr1-x431.google.com with SMTP id d3so553451wrb.7 for ; Sun, 03 Apr 2022 11:26:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=message-id:date:mime-version:user-agent:subject:content-language:to :cc:references:from:in-reply-to:content-transfer-encoding; bh=bdNSHlvxbLgeS5OtknPrJD9scGCCHGJswcOxfjpkj8k=; b=HJPxauClsE0np7DjAvay8A3qNO9yH3dZHFeONBhunsAye2QJjEwG8hC0V131BjTbQw vtyLN7WthuLgwwNhdCY6aF/k7R8txSC/qRMJ8xCwemdVY+KaeRBkvHINcZa7pp8B9n/4 psP1HG8tSSfUDJ2zS0n2xwmmwSuh7hDUpNROy3vYRAbyHR3Q57BU0DgYPwekeLzw8ODZ H+QsFAuIO1JiJhRZbkQKkU+MKR7bpvvFeUkaLl+jN0kxpw3dXUqm7FpniWC9vVy3Mtjb RbhlTctNKmMP8B2cuuCA2Qn5LglXfvS2+fDopX/AruCsvwpY0kuwoNM7/EI3sZhhp1GW 65HA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:message-id:date:mime-version:user-agent:subject :content-language:to:cc:references:from:in-reply-to :content-transfer-encoding; bh=bdNSHlvxbLgeS5OtknPrJD9scGCCHGJswcOxfjpkj8k=; b=1Yldc/CNyI0i4rMZyJoaLaqCi76mRSbYgl1qj6ynqrCMezhvXYqWkWZnz/UsBPKXFe j+HfJYPmbOM8ksRswSN8cfyFfJutUPmvJ3mzIMCscN8pjOeZ7pLFqYmSMnVmhR6wI2fz MO5XvAEhzT2elOPLX6wOnrLtKTwAiEURByG46AyPC0v8xm3wCnEYrz4XEzoH+oiGmo4h sgQ4eRsTIdNxTMCffp45ejCBR7GL8B5p/Ts7fT7nVyQJuup/qxCDlI8wmEKY/WyBq4zx i2Us+aB5/1YbdazmnyNPnM2snC2WB/92z4/h53utEsEOAVjrUdTcDgw/A/umtVYyw+RX DC6A== X-Gm-Message-State: AOAM531IwlWVpgA6pKOsd1CpXxBRNn4GunMWDarRhDh3qtZAciKbmq4b M8F6zbifvjdWzYsxeSds04McZA== X-Received: by 2002:a05:6000:1547:b0:204:213:ae28 with SMTP id 7-20020a056000154700b002040213ae28mr14429429wry.114.1649010413589; Sun, 03 Apr 2022 11:26:53 -0700 (PDT) Received: from [192.168.0.172] (xdsl-188-155-201-27.adslplus.ch. [188.155.201.27]) by smtp.gmail.com with ESMTPSA id f1-20020a1c6a01000000b0038c9f6a3634sm14881579wmc.7.2022.04.03.11.26.51 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sun, 03 Apr 2022 11:26:52 -0700 (PDT) Message-ID: Date: Sun, 3 Apr 2022 20:26:51 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0 Subject: Re: [PATCH v5 01/11] driver: platform: Add helper for safer setting of driver_override Content-Language: en-US To: Andy Shevchenko , Krzysztof Kozlowski Cc: Greg Kroah-Hartman , "Rafael J. Wysocki" , Stuart Yoder , "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , Wei Liu , Dexuan Cui , Bjorn Helgaas , Bjorn Andersson , Mathieu Poirier , Vineeth Vijayan , Peter Oberparleiter , Heiko Carstens , Vasily Gorbik , Alexander Gordeev , Christian Borntraeger , Sven Schnelle , Andy Gross , Linux Kernel Mailing List , linux-clk , NXP Linux Team , linux-arm Mailing List , Linux on Hyper-V List , linux-pci , linux-remoteproc@vger.kernel.org, linux-s390@vger.kernel.org, linux-arm-msm@vger.kernel.org, ALSA Development Mailing List , linux-spi , virtualization@lists.linux-foundation.org, Linus Torvalds , Rasmus Villemoes References: <20220316150533.421349-1-krzysztof.kozlowski@canonical.com> <20220316150533.421349-2-krzysztof.kozlowski@canonical.com> From: Krzysztof Kozlowski In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-5.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 16/03/2022 16:54, Andy Shevchenko wrote: > On Wed, Mar 16, 2022 at 5:06 PM Krzysztof Kozlowski > wrote: > > ... > >> +int driver_set_override(struct device *dev, const char **override, >> + const char *s, size_t len) >> +{ >> + const char *new, *old; >> + char *cp; I focused on some other topics, so I did not respond to your questions for some time. > >> + if (!dev || !override || !s) >> + return -EINVAL; > > Sorry, I didn't pay much attention on this. First of all, I would drop > dev checks and simply require that dev should be valid. Do you expect > this can be called when dev is invalid? No, I can skip the check. > I would like to hear if it's > anything but theoretical. Second one, is the !s requirement. Do I > understand correctly that the string must be always present? But then > how we NULify the override? Is it possible? I did not change the convention of this sysfs hook, so removing of override is passing empty string "". Have in mind that his interface is mainly for sysfs, not for other drivers. > Third one is absence of > len check. See below. > >> + /* >> + * The stored value will be used in sysfs show callback (sysfs_emit()), >> + * which has a length limit of PAGE_SIZE and adds a trailing newline. >> + * Thus we can store one character less to avoid truncation during sysfs >> + * show. >> + */ >> + if (len >= (PAGE_SIZE - 1)) >> + return -EINVAL; > > I would relax this to make sure we can use it if \n is within this limit. Relax in what way? Store more than PAGE_SIZE? This is a user-visible string and the name of a driver. > >> + cp = strnchr(s, len, '\n'); >> + if (cp) >> + len = cp - s; >> + >> + new = kstrndup(s, len, GFP_KERNEL); > > Here is a word about the len check. > >> + if (!new) > > If len == 0, this won't trigger and you have something very > interesting as a result. True, empty string would be set as override. The API says that empty string clears the override, so len==0 should be valid (just like "\n" is ok). > > One way is to use ZERO_PTR_OR_NULL() another is explicitly check for 0 > and issue a (different?) error code. Best regards, Krzysztof