Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp6338457rdb; Mon, 1 Jan 2024 20:12:55 -0800 (PST) X-Google-Smtp-Source: AGHT+IGk5QbN7bxzHJaJj0RIq+bsWifqIg91nXzdMJLYLnaxjhtlDQQmiZKnvyifXmYvDL1B+WI+ X-Received: by 2002:ad4:5186:0:b0:67f:ad95:4bb9 with SMTP id b6-20020ad45186000000b0067fad954bb9mr22646246qvp.101.1704168775209; Mon, 01 Jan 2024 20:12:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704168775; cv=none; d=google.com; s=arc-20160816; b=AauoJU0+X/fT/y/+TxDJdAiZqZjk+syjcq0PWDw6sw+7DEhHbHmeF3G+9cGKKB/HMS HfOrq3Zo9wsxfvc5JsXQ6Tn7/THfXLdC1JHFgfJd7URRv17GoGSfxsgchQ2eLhU5+aHO dnf7ZmpXOk2hSNhWMBOr6Sc1i7jcqnhSriGYUnk5ZfHMG/rdC2kVkAl83q0ncF5m+gFu QUR1dsrsP3AAiXOq4k+vTfOOIFePyFgl6My53J6FahWgupU5mcZSOU64RNSJUAEToCy0 0KBgIFG5LvYsvPt158ofJr0KHAaJ7O4vPFZXMekpjM/obO1vlKEH4IaCCa0r7Kqst7xZ JQRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:to:from :dkim-signature:dkim-signature; bh=pqyUBOmhs9offHldf0W33EpKIqaYkR5v3L8UtRVyOpw=; fh=aq23pSLwbr03HoKdXnGr0/uCxlT9OZ+QQ/0yofwyUC8=; b=XwasHY6Pqoo/LcOqr/59HD/imUkP6E0thpGQ4uqPx6N46F1rcJC/bKmvGW6wM6Gzm0 02C1gyZ86XIsnSVT6uyNkdgDYK6JyzAtxJ6D15MDct8Wtx3bl/K9bIcya26ITtwPXNRP k3fpTWcc484Rr5HW8LTjNwGc3ETaNrD0AA6i25uSGftMuhpwmUSrVqKtYh8u5YSZxGhy uboL1pKwqPPzFce6WeeF7yaCT8V7fEibwo6ys64wpWRTE/o2P5NEUBsPKMqKUIDIUa2P kRqLPRnSqtag9xdv+o+1kwGPi3Mlt/bBLQWRGiviEs/Xv2K/s85ucnh9Q4u2BJkum15l uhxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b="gTh1lc/l"; dkim=pass header.i=@suse.com header.s=susede1 header.b="gTh1lc/l"; spf=pass (google.com: domain of linux-kernel+bounces-14009-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-14009-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id z3-20020a0cf003000000b0068078aa6b8csi3671462qvk.615.2024.01.01.20.12.55 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 01 Jan 2024 20:12:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-14009-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b="gTh1lc/l"; dkim=pass header.i=@suse.com header.s=susede1 header.b="gTh1lc/l"; spf=pass (google.com: domain of linux-kernel+bounces-14009-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-14009-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id E318A1C210E0 for ; Tue, 2 Jan 2024 04:12:54 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9419B23CA; Tue, 2 Jan 2024 04:12:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=suse.com header.i=@suse.com header.b="gTh1lc/l"; dkim=pass (1024-bit key) header.d=suse.com header.i=@suse.com header.b="gTh1lc/l" X-Original-To: linux-kernel@vger.kernel.org Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7A94E20FA; Tue, 2 Jan 2024 04:12:43 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=suse.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=suse.com Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 01A4521E95; Tue, 2 Jan 2024 04:12:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1704168761; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=pqyUBOmhs9offHldf0W33EpKIqaYkR5v3L8UtRVyOpw=; b=gTh1lc/lXZFGjEKesd9Gevs1I53VdB+N+SyqMrimTYU/xJaKFVlB9ynmaLDS/xelaQ737O 2yai750KC5G1uh470GM6wvJuwNvCRWnPXs/HoYe1tHb6HBKPRvadOD4lE6+YC0CyaXLFc4 UKN6bvyvPT9HSPAWzu+z3eKOZnv8/DE= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1704168761; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc: mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=pqyUBOmhs9offHldf0W33EpKIqaYkR5v3L8UtRVyOpw=; b=gTh1lc/lXZFGjEKesd9Gevs1I53VdB+N+SyqMrimTYU/xJaKFVlB9ynmaLDS/xelaQ737O 2yai750KC5G1uh470GM6wvJuwNvCRWnPXs/HoYe1tHb6HBKPRvadOD4lE6+YC0CyaXLFc4 UKN6bvyvPT9HSPAWzu+z3eKOZnv8/DE= Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id D4BD4136D1; Tue, 2 Jan 2024 04:12:37 +0000 (UTC) Received: from dovecot-director2.suse.de ([10.150.64.162]) by imap1.dmz-prg2.suse.org with ESMTPSA id I2Q0HzWNk2UHQQAAD6G6ig (envelope-from ); Tue, 02 Jan 2024 04:12:37 +0000 From: Qu Wenruo To: linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org, akpm@linux-foundation.org, christophe.jaillet@wanadoo.fr, andriy.shevchenko@linux.intel.com, David.Laight@ACULAB.COM, ddiss@suse.de Subject: [PATCH v2 0/4] kstrtox: introduce memparse_safe() Date: Tue, 2 Jan 2024 14:42:10 +1030 Message-ID: X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Level: * X-Spam-Level: Authentication-Results: smtp-out1.suse.de; dkim=pass header.d=suse.com header.s=susede1 header.b="gTh1lc/l" X-Rspamd-Server: rspamd2.dmz-prg2.suse.org X-Spamd-Result: default: False [-1.00 / 50.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_MISSING_CHARSET(2.50)[]; TO_DN_NONE(0.00)[]; BROKEN_CONTENT_TYPE(1.50)[]; RCVD_COUNT_THREE(0.00)[3]; DKIM_TRACE(0.00)[suse.com:+]; MX_GOOD(-0.01)[]; RCPT_COUNT_SEVEN(0.00)[7]; NEURAL_HAM_SHORT(-0.19)[-0.973]; FREEMAIL_TO(0.00)[vger.kernel.org,linux-foundation.org,wanadoo.fr,linux.intel.com,ACULAB.COM,suse.de]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; BAYES_HAM(-3.00)[100.00%]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[suse.com:s=susede1]; RCVD_DKIM_ARC_DNSWL_HI(-1.00)[]; FROM_HAS_DN(0.00)[]; FREEMAIL_ENVRCPT(0.00)[wanadoo.fr]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; NEURAL_HAM_LONG(-1.00)[-1.000]; DKIM_SIGNED(0.00)[suse.com:s=susede1]; MID_CONTAINS_FROM(1.00)[]; DBL_BLOCKED_OPENRESOLVER(0.00)[suse.com:dkim]; FUZZY_BLOCKED(0.00)[rspamd.com]; RCVD_IN_DNSWL_HI(-0.50)[2a07:de40:b281:104:10:150:64:97:from]; RCVD_TLS_ALL(0.00)[] X-Spam-Score: -1.00 X-Rspamd-Queue-Id: 01A4521E95 X-Spam-Flag: NO [CHANGELOG] v2: - Make _parse_integer_fixup_radix() to always treat "0x" as hex This is to make sure invalid strings like "0x" or "0xG" to fail as expected for memparse_safe(). Or they would only parse the first 0, then leaving "x" for caller to handle. - Update the test case to include above failure cases This including: * "0x", just hex prefix without any suffix/follow up chars * "0xK", just hex prefix and a stray suffix * "0xY", hex prefix with an invalid char - Fix a bug in btrfs' conversion to memparse_safe() Where I forgot to delete the old memparse() line. - Fix a compiler warning on m68K On that platform, a pointer (32 bits) is smaller than unsigned long long (64 bits), which can cause static checker to warn. Function memparse() lacks error handling: - If no valid number string at all In that case @retptr would just be updated and return value would be zero. - No overflown detection This applies to both the number string part, and the suffixes part. And since we have no way to indicate errors, we can get weird results like: "25E" -> 10376293541461622784 (9E) This is due to the fact that for "E" suffix, there is only 4 bits left, and 25 with 60 bits left shift would lead to overflow. (And decision to support for that "E" suffix is already cursed) So here we introduce a safer version of it: memparse_safe(), and mark the original one deprecated. Unfortunately I didn't find a good way to mark it deprecated, as with recent -Werror changes, '__deprecated' marco does not seem to warn anymore. The new helper has the following advantages: - Better overflow and invalid string detection The overflow detection is for both the numberic part, and with the suffix. Thus above "25E" would be rejected correctly. The invalid string part means if there is no valid number starts at the buffer, we return -EINVAL. - Allow caller to select the suffixes, and saner default ones The new default one would be "KMGTP", without the cursed and overflow prone "E". Some older code like setup_elfcorehdr() would benefit from it, if the code really wants to only allow "KMG" suffixes. - Keep the old @retptr behavior So the existing callers can easily migrate to the new one, without the need to do extra strsep() work. - Finally test cases The test case would cover more things other than the existing kstrtox tests: * The @retptr behavior Either for bad cases, which @retptr should not be touched, or for good cases, the @retptr is properly advanced, * Return value verification Make sure we distinguish -EINVAL and -ERANGE correctly. With the new helper, migrate btrfs to the interface, and since the @retptr behavior is the same, we won't cause any behavior change. Qu Wenruo (4): kstrtox: always skip the leading "0x" even if no more valid chars kstrtox: introduce a safer version of memparse() kstrtox: add unit tests for memparse_safe() btrfs: migrate to the newer memparse_safe() helper fs/btrfs/ioctl.c | 6 +- fs/btrfs/super.c | 9 +- fs/btrfs/sysfs.c | 14 ++- include/linux/kernel.h | 8 +- include/linux/kstrtox.h | 15 +++ lib/cmdline.c | 5 +- lib/kstrtox.c | 98 ++++++++++++++++- lib/test-kstrtox.c | 235 ++++++++++++++++++++++++++++++++++++++++ 8 files changed, 382 insertions(+), 8 deletions(-) -- 2.43.0