OSDN Git Service

bcache: fix input integer overflow of congested threshold
authorColy Li <colyli@suse.de>
Sat, 9 Feb 2019 04:53:00 +0000 (12:53 +0800)
committerJens Axboe <axboe@kernel.dk>
Sat, 9 Feb 2019 14:18:31 +0000 (07:18 -0700)
Cache set congested threshold values congested_read_threshold_us and
congested_write_threshold_us can be set via sysfs interface. These
two values are 'unsigned int' type, but sysfs interface uses strtoul
to convert input string. So if people input a large number like
9999999999, the value indeed set is 1410065407, which is not expected
behavior.

This patch replaces sysfs_strtoul() by sysfs_strtoul_clamp() when
convert input string to unsigned int value, and set value range in
[0, UINT_MAX], to avoid the above integer overflow errors.

Signed-off-by: Coly Li <colyli@suse.de>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
drivers/md/bcache/sysfs.c

index 9be27b2..bedd3e6 100644 (file)
@@ -778,10 +778,12 @@ STORE(__bch_cache_set)
                c->shrink.scan_objects(&c->shrink, &sc);
        }
 
-       sysfs_strtoul(congested_read_threshold_us,
-                     c->congested_read_threshold_us);
-       sysfs_strtoul(congested_write_threshold_us,
-                     c->congested_write_threshold_us);
+       sysfs_strtoul_clamp(congested_read_threshold_us,
+                           c->congested_read_threshold_us,
+                           0, UINT_MAX);
+       sysfs_strtoul_clamp(congested_write_threshold_us,
+                           c->congested_write_threshold_us,
+                           0, UINT_MAX);
 
        if (attr == &sysfs_errors) {
                v = __sysfs_match_string(error_actions, -1, buf);