public inbox for linux-pm@vger.kernel.org
 help / color / mirror / Atom feed
From: mark gross <markgross@thegnar.org>
To: Alan Stern <stern@rowland.harvard.edu>
Cc: linux-pm@lists.linux-foundation.org,
	Dan Carpenter <error27@gmail.com>,
	mark gross <markgross@thegnar.org>
Subject: Re: [PATCH] PM QoS: Allow parsing of ASCII values
Date: Thu, 24 Feb 2011 08:17:32 -0800	[thread overview]
Message-ID: <20110224161732.GA6512@gvim.org> (raw)
In-Reply-To: <Pine.LNX.4.44L0.1102231009070.2233-100000@iolanthe.rowland.org>

On Wed, Feb 23, 2011 at 10:20:35AM -0500, Alan Stern wrote:
> On Tue, 22 Feb 2011, mark gross wrote:
> 
> > On Mon, Feb 21, 2011 at 08:33:36PM -0800, mark gross wrote:
> > > On Fri, Feb 18, 2011 at 10:54:56AM +0900, Simon Horman wrote:
> > > > In "PM QoS: Correct pr_debug() misuse and improve parameter checks"
> > > > the parsing of the ASCII hex value was tightened. Unfortunately
> > > > it was tightened to the point where no value is valid.
> > > > 
> > > > Root of the problem seems to lie in wheather the ASCII hex is followed
> > > > by a '\n' or not. My reading of the documentation is that the '\n' should
> > > > not be present. However the code previously only accepted that version.
> > > > The current code accepts neither. My fix is to accept both.
> > > > 
> > > > Cc: Mark Gross <markgross@thegnar.org>
> > > > Cc: Dan Carpenter <error27@gmail.com>
> > > > Cc: Rafael J. Wysocki <rjw@sisk.pl>
> > > > Signed-off-by: Simon Horman <horms@verge.net.au>
> > > > 
> > > > ---
> > > > This appears to have been introduced around 2.6.36-rc4.
> > > > And was an @stable patch. As such I believe this change
> > > > is stable material.
> > > > ---
> > > >  kernel/pm_qos_params.c |    7 ++++---
> > > >  1 files changed, 4 insertions(+), 3 deletions(-)
> > > > 
> > > > diff --git a/kernel/pm_qos_params.c b/kernel/pm_qos_params.c
> > > > index aeaa7f8..98a34ea 100644
> > > > --- a/kernel/pm_qos_params.c
> > > > +++ b/kernel/pm_qos_params.c
> > > > @@ -387,10 +387,11 @@ static ssize_t pm_qos_power_write(struct file *filp, const char __user *buf,
> > > >  	if (count == sizeof(s32)) {
> > > >  		if (copy_from_user(&value, buf, sizeof(s32)))
> > > >  			return -EFAULT;
> > > > -	} else if (count == 11) { /* len('0x12345678/0') */
> > > > -		if (copy_from_user(ascii_value, buf, 11))
> > > > +	} else if (count == 11 || count == 10) { /* len('0x12345678\n') or
> > > shouldn't this be count ==12 ||count ==10?
> > > After taking Alan's advice and looking at strict_strtoul it looks like
> > > 10 and 12 are the numbers to use.
> > > 
> > > Also playing with your dd test:
> > > mgross@mgt:~$ echo -n 0x12345678 | dd of=junk.bin
> > > 0+1 records in
> > > 0+1 records out
> > > 10 bytes (10 B) copied, 0.000368621 s, 27.1 kB/s
> > > mgross@mgt:~$ hexdump junk.bin 
> > > 0000000 7830 3231 3433 3635 3837               
> > > 000000a
> > > mgross@mgt:~$ echo  0x12345678 | dd of=junk.bin
> > > 0+1 records in
> > > 0+1 records out
> > > 11 bytes (11 B) copied, 0.000384755 s, 28.6 kB/s
> > > mgross@mgt:~$ hexdump junk.bin 
> > > 0000000 7830 3231 3433 3635 3837 000a          
> > > 000000b
> 
> The "extra" byte here is undoubtedly caused by the fact that hexdump is 
> presenting the data in 2-byte chunks.  I almost always invoke hexdump 
> with the -C option, to get individual bytes.  The length of the data 
> really is 11 bytes.
> 
> > > 
> > > it looks like I have 10 or 12 bytes (but can't reconcile the dd output
> > > saying 11 bytes when hexdump is showing 12 )
> > 
> > on a 64 bit ubuntu box its 11 bytes that get sent to the kernel hexdump
> > must be padding the extra byte.> 
> > > The following patch (untested) should make things work ok.
> > it doesn't work and I'm still debugging some straingess with  strict_strtoul
> > 
> > it looks like its munging the string I'm passing in.
> 
> No, strict_strtoul() doesn't touch the input string.

I've been having really bad luck with this function.  I must be having a
operator error happening.  I'm still looking at it and plan on setting
up more tracing tonight.
 
> > > diff --git a/kernel/pm_qos_params.c b/kernel/pm_qos_params.c
> > > index aeaa7f8..6cbce91 100644
> > > --- a/kernel/pm_qos_params.c
> > > +++ b/kernel/pm_qos_params.c
> > > @@ -381,19 +381,18 @@ static ssize_t pm_qos_power_write(struct file *filp, const char __user *buf,
> > >  {
> > >  	s32 value;
> > >  	int x;
> > > -	char ascii_value[11];
> > > +	char ascii_value[12];
> > >  	struct pm_qos_request_list *pm_qos_req;
> > >  
> > >  	if (count == sizeof(s32)) {
> > >  		if (copy_from_user(&value, buf, sizeof(s32)))
> > >  			return -EFAULT;
> > > -	} else if (count == 11) { /* len('0x12345678/0') */
> > > -		if (copy_from_user(ascii_value, buf, 11))
> > > +	} else if (count == 10 || count == 12) { /* '0x12345678' or
> > 	} else if (count == 10 || count == 11) { /* '0x12345678' or
> 
> The test should be for 10 or 11: "0x12345678" or "0x12345678\n".  By 
> the way, note the difference between "\n" and "/n".
> 
> > > +						    '0x12345678/n/0'*/
> > > +		memset(ascii_value, 0, sizeof(ascii_value));
> 
> Actually, it suffices to do
> 
> 		ascii_value[count] = 0;
> 
> if the number of bytes you copy is equal to count.
true.
 
> > > +		if (copy_from_user(ascii_value, buf, count))
> > 		if (copy_from_user(ascii_value, buf, 10))
> 
> Which line does the patch add?
> 
> > >  			return -EFAULT;
> > > -		if (strlen(ascii_value) != 10)
> > > -			return -EINVAL;
> > > -		x = sscanf(ascii_value, "%x", &value);
> > > -		if (x != 1)
> > > +		if (strict_strtoul(ascii_value,16,value) != 0)
> >                                                   ^&value
> > its odd the array ascii_value is getting stomped on.  Very strange.
> > I'm sure I'm doing something dumb.  I'll keep working on this and send
> > an patch after it checks out.
> 
> How careful do you want to be here?  For example, which of the
> following inputs do you want to accept?
> 
> 	0x1234
> 	abcd1234
> 	abcd123456
> 	abcd123456\n
> 	abcd1234567
> 	1234567890
> 	1234567890\n
> 	12345678901

> 	0x12345678
> 	0x12345678\n
just these 2 are what I had planned to allow after this email thread.

> 	0x123456789
> 
> Maybe it's okay to be a little relaxed about this, and trust the caller 
> to pass in data that makes sense.
yeah but is it worth the effort?

--mark
 

  reply	other threads:[~2011-02-24 16:17 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-02-18  1:54 [PATCH] PM QoS: Allow parsing of ASCII values Simon Horman
2011-02-18  5:05 ` mark gross
2011-02-18  6:39   ` Simon Horman
2011-02-18 15:17     ` Alan Stern
2011-02-22  4:33 ` mark gross
2011-02-23  6:56   ` mark gross
2011-02-23 15:20     ` Alan Stern
2011-02-24 16:17       ` mark gross [this message]
2011-02-24 17:00         ` Alan Stern
2011-03-06 14:07           ` mark gross
2011-03-29 20:01             ` Rafael J. Wysocki
2011-03-30  3:59               ` mark gross
2011-03-30  7:11                 ` Simon Horman

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20110224161732.GA6512@gvim.org \
    --to=markgross@thegnar.org \
    --cc=error27@gmail.com \
    --cc=linux-pm@lists.linux-foundation.org \
    --cc=stern@rowland.harvard.edu \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox