linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: [PATCH 0/3] sysctl: detect overflows when setting integers
@ 2015-03-30 12:34 Alexey Dobriyan
  2015-03-30 17:37 ` Heinrich Schuchardt
  0 siblings, 1 reply; 4+ messages in thread
From: Alexey Dobriyan @ 2015-03-30 12:34 UTC (permalink / raw)
  To: Heinrich Schuchardt; +Cc: Linux Kernel, Andrew Morton

> Unfortunately functions simple_strtoul and simple_strtoull cannot
> be replaced by kstrtoul and kstrtoull in some places, because they
> expect a zero terminated string instead of returning a pointer to
> the character after the last digit.
>
> This patch introduces two new functions kstrtoul_e and kstrtoull_e
> which fill this gap.

Well, there were two ideas:
a) to convert first, see what's left and generalize it,
b) kstrtox() should be used only in one place --
   parsing integers in proc/sysfs files.

The functions can probably be replaced by sscanf() (I didn't look closely).

I hate "_e" suffix with passion.

C in 2015 doesn't have this arcane concept known as optional
parameters so I'd suggest to hack around with always returning
number of OK characters OR add one (just one) more separate
interface

   unsigned int parse_integer(const char *s, unsigned int base, T *p);

and dispatching with __builtin_choose_expr().

Of course if someone rewrites that abomination called
sysctl parsing from scratch, maybe none of this will be needed!

  Alexey

^ permalink raw reply	[flat|nested] 4+ messages in thread
* [PATCH 0/3] sysctl: detect overflows when setting integers
@ 2015-03-29 19:28 Heinrich Schuchardt
  0 siblings, 0 replies; 4+ messages in thread
From: Heinrich Schuchardt @ 2015-03-29 19:28 UTC (permalink / raw)
  To: Andrew Morton
  Cc: Michal Nazarewicz, Ingo Molnar, Steven Rostedt, Peter Zijlstra,
	Joe Perches, Josh Hunt, Rasmus Villemoes, Rusty Russell,
	Daniel Walter, David Rientjes, Kees Cook, David S. Miller,
	Johannes Weiner, Aaron Tomlin, Prarit Bhargava, Eric B Munson,
	Paul E. McKenney, Sam Ravnborg, linux-kernel, Heinrich Schuchardt

This patch series addresses undetected overflows when writing to the
sysctl file system.

E.g.
echo 0x800001234 > /proc/sys/kernel/threads-max
has the same effect as
echo 0x1234 > /proc/sys/kernel/threads-max

The first type of overflow occurs when converting from string to unsigned long.
The second type of overflow occurs when converting from unsigned long to int.

The first patch provide new functions kstrtoul_e and kstrtoull_e that can be
used to replace deprecated simple_strtoul and simple_strtoull.

The second patch replaces a call to simple_strtoul by kstrtoul_e. This is
necessary to detect overflows when converting from string to unsigned long.

The third patch adds checks when converting form unsigned long to int.

Heinrich Schuchardt (3):
  lib/kstrtox.c: functions returning end of string
  sysctl: detect overflows in proc_get_long
  sysctl: detect overflows when converting to int

 include/linux/kernel.h |  4 +++
 kernel/sysctl.c        | 13 +++++++--
 lib/kstrtox.c          | 71 +++++++++++++++++++++++++++++++++++++++++++++++---
 3 files changed, 83 insertions(+), 5 deletions(-)

-- 
2.1.4


^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2015-03-31 11:50 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-03-30 12:34 [PATCH 0/3] sysctl: detect overflows when setting integers Alexey Dobriyan
2015-03-30 17:37 ` Heinrich Schuchardt
2015-03-31 11:50   ` Alexey Dobriyan
  -- strict thread matches above, loose matches on Subject: below --
2015-03-29 19:28 Heinrich Schuchardt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).