Re: [PATCH] pci: use kstrtobool over ad hoc string parsing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Mar 02, 2018 at 04:47:16PM -0700, Kenny Ballou wrote:
> 
> On 2018年02月28日 03:32 GMT, Bjorn Helgaas wrote:
> > On Mon, Feb 12, 2018 at 04:04:57PM -0700, Kenny Ballou wrote:
> >> Convert ROM read access enable/disable string parsing to use the
> >> `kstrtobool` function.
> >>
> >> This fixes Bugzilla Bug 111301 -- Sysfs PCI rom file functionality does
> >> not match documentation.
> >>
> >> bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=111301
> >>
> >> Reported-by: googlegot@xxxxxxxxx
> >> Signed-off-by: Kenny Ballou <kballou@xxxxxxxxxxxxxx>
> >> ---
> >>  drivers/pci/pci-sysfs.c | 8 +++++---
> >>  1 file changed, 5 insertions(+), 3 deletions(-)
> >>
> >> diff --git a/drivers/pci/pci-sysfs.c b/drivers/pci/pci-sysfs.c
> >> index eb6bee8724cc..3cde1f25e786 100644
> >> --- a/drivers/pci/pci-sysfs.c
> >> +++ b/drivers/pci/pci-sysfs.c
> >> @@ -1424,10 +1424,12 @@ static ssize_t pci_write_rom(struct file *filp, struct kobject *kobj,
> >>  {
> >>  	struct pci_dev *pdev = to_pci_dev(kobj_to_dev(kobj));
> >>
> >> -	if ((off ==  0) && (*buf == '0') && (count == 2))
> >> -		pdev->rom_attr_enabled = 0;
> >> -	else
> >> +	bool res = false;
> >> +
> >> +	if (kstrtobool(buf, &res) == 0 && res)
> >>  		pdev->rom_attr_enabled = 1;
> >> +	else
> >> +		pdev->rom_attr_enabled = 0;
> >>
> >>  	return count;
> >>  }
> >
> > I know I proposed kstrtobool().  But looking closer, I don't think
> > it's the right answer because:
> >
> >   - kstrtobool() assumes a NULL-terminated string, and sysfs does not
> >     guarantee that.  This is a binary file and we can write arbitrary
> >     data to it.  kstrtobool_from_user() makes sure the string is
> >     NULL-terminated, but it does a copy_from_user() that we don't want
> >     in the sysfs case.
> >
> >   - The current behavior is that only 2-byte writes starting with '0'
> >     disable the ROM, and all other writes enable it.
> >
> >     Using kstrtobool() would enable the ROM only for writes starting
> >     with y/Y/1/on/oN/On/ON, and all other writes would disable it.
> >
> >     That changes the behavior for most writes, e.g., writing "2"
> >     currently enables, but would now disable.  This feels
> >     unnecessarily risky because we don't know what programs are
> >     writing to enable the ROM.  The doc says to write "1", but the
> >     code comment says "anything except 0".
> >
> > We *could* change the code to accept a single-byte '0' write, but I
> > think the simplest solution would be to change the documentation to
> > explicitly require a 2-byte "0\n" write to disable the ROM.
> >
> > Sorry for dithering on this.
> >
> > Bjorn
> 
> I was not under the impression that this particular device needed data
> written to it(?).  If it is the case that arbitrary data needs to be
> written, your argument makes sense, and I can put together a patch for
> the documentation instead.

I'm not sure I understand your question, but here's a stab at
answering it:

The sysfs "rom" file has a read method (pci_read_rom()) and a write
method (pci_write_rom()).  User-space software can open the file and
do a read() system call to read the contents of the ROM from the
device, so pci_read_rom() is directly connected to the PCI hardware
device.

The write method doesn't touch the hardware device at all; it's only a
software switch, and the data written to the sysfs "rom" file is never
written to the PCI hardware device at all.  It doesn't need any
particular data written to it.  The data can be whatever we decide it
should be, and we can interpret that data in any way we like since
it's purely a software construct.  

However, there is user-space software that assumes certain behavior
(enabling/disabling read access to the ROM).  We don't want to break
that software.  Using kstrtobool() would change the interpretation of
some writes.  We *could* assume that user-space software always writes
"1" to enable reads of the ROM and "0" to disable reads, but it's
impossible to be certain of that.

So the safest thing in terms of not breaking the ABI is to leave the
code unchanged but update the documentation.  Does that make sense?

Bjorn



[Index of Archives]     [DMA Engine]     [Linux Coverity]     [Linux USB]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [Greybus]

  Powered by Linux