Re: [PATCH v3 3/3] lib/string_helpers.c: Change semantics of string_escape_mem
From: Andy Shevchenko
Date: Tue Mar 03 2015 - 05:26:58 EST
On Tue, 2015-03-03 at 00:03 +0100, Rasmus Villemoes wrote:
> On Mon, Mar 02 2015, Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx> wrote:
> > On Mon, 2015-02-23 at 23:55 +0100, Rasmus Villemoes wrote:
> >> On Mon, Feb 23 2015, Andy Shevchenko <andriy.shevchenko@xxxxxxxxxxxxxxx> wrote:
> >
> >> > What about to make it a separate function *and* call from inside of
> >> > test_string_escape? Would it work for you?
> >>
> >> See my earlier point about "quite a lot of state to pass". But if this
> >>
> >> static __init void
> >> test_string_escape_overflow(const char *in, int p, char *out_real, int out_size,
> >> unsigned int flags, const char *esc, int q_test,
> >> const char *name)
> >> {
> >> int q_real;
> >>
> >> memset(out_real, 'Z', out_size);
> >> q_real = string_escape_mem(in, p, out_real, 0, flags, esc);
> >> if (q_real != q_test)
> >> pr_warn("Test '%s' failed: flags = %u, osz = 0, expected %d, got %d\n",
> >> name, flags, q_test, q_real);
> >> if (memchr_inv(out_real, 'Z', out_size))
> >> pr_warn("Test '%s' failed: osz = 0 but string_escape_mem wrote to the buffer\n",
> >> name);
> >> }
> >>
> >> is what you want, sure, have it your way.
> >
> > Something like above, though might be few variables can be defined
> > inside it, such as out_real, out_size.
>
> Or maybe not at all: We could pass NULL, 0, which is what has to work
> anyway for the kasprintf case - failure will then be detected through an
> oops, but I think that should be ok. That would also remove the memset and
> memchr_inv calls above.
>
> I don't like the idea of just defining a small stack buffer (say
> buf[16]) and passing that (still with a size of 0): It's better to
> either detect writes directly (by passing a large enough buffer with
> known contents), or indirectly through an oops, as opposed to having to
> figure it out from random stack corruption. And kmalloc'ing+error
> handling+kfree'ing a buffer inside the overflow check would just be
> plain silly, when we have a large enough buffer already.
Come with v4, I think I have no big objections to the approach.
> As I said, I do think that longer-term one shouldn't have to poke around
> in the seq_file internals, but for now I'd like to make the patch minimal.
Ok.
> >> Another option is to do everything with a single seq_printf call,
> >> something like
> >>
> >> seq_printf(m, "Name:\t%*pEcs\n, (int)strlen(tcomm), tcomm)
> >>
> >> That will escape more than just \ and \n, but that would IMO be an
> >> improvement. But of course this is out of scope for this series.]
> >
> > It should be %pT and reconsider policy how we print task name in
> > different cases (vsprintf.c::comm_name()).
>
> Well, %pT is a completely new addition to vsprintf.c. Also, I don't
> think that would be a very good match - not every user of %pT might want
> escaping, so at the very least this would require implementing some
> extra flags for %pT.
Something like %pTe (for 'sanely Escaped' with flags you proposed
earlier) ?
> But if task_name would be the only user of those
> flags, I think the escaping logic is better kept there. Anyway, this is
> outside this series' scope.
Yes.
--
Andy Shevchenko <andriy.shevchenko@xxxxxxxxx>
Intel Finland Oy
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/