Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp993233yba; Thu, 4 Apr 2019 01:58:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqyKux8vplZGKgfL08g0aJbu/bVHfZxN19vvBJh8aeRao47MZ8Vr6aXg1oW3Sixgwhln5/c8 X-Received: by 2002:a17:902:547:: with SMTP id 65mr5186491plf.242.1554368328919; Thu, 04 Apr 2019 01:58:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554368328; cv=none; d=google.com; s=arc-20160816; b=zhm0U07ThxaXrz7OIv4snL+NKmTi+R7Yb8u2NC/PYmm7DeRkFhu+YxEWHJPlJk28tG chdI/VnxV4hAYMHvH+Ee1bGeECX/5FtcFjNOS4T0BvmchryFMCj/njG57fSIXaJ6ZBoH owXSkrJUpQ7mO1ofAfdv6UimxlnXM+D9ti98MhZXP9MoMHz8TOZOjBcG3m0ieN3lda+i fF4RZCxSh0wU20D23ieD53ksxXWg7JIokbT5/O9a8u1EYVB9LuUBJR4siPuyYDkRRwjR Ep2FKD+5B2qPuhzHREd0pwa2rrbSbRoSL3dxB90Z5gls3Il3sS/G6A350nTzjvp/dFni WbkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fYOXWM2MAuLU/gWsHV+u6uUyWytiEiFTWIH+/f/kUYw=; b=DolQyXnG9VsplOGyKPMl7jGxzebfaWhY2dPtksk9uvUC92DaZUGq/RcUeIPSv5S59p 05PJyCcsrpX12We9cyqSmNorQuSY3rhT5S8JV8Og6in7krv+wBxDuZVuPPRhHhSeTU23 nUMP+xiVXJwbeYE8NaCxL4+quQpY0ru7lVezUif68FFB2ao2tbT8YybP53nO6F71+Bbz VlziMDK5lFcpJqaUof9wGmC9rpUwlsnZAVZAZZWfB1spaS1yMcNbk94eL6A9rUQGtXyQ 5iwpPOovr26zVWFAkiJ/3KDxNdNwLWrVpiqXyqb7D/vkY9yXqVivGhmWdSz/GaLQObRd PaAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u0Ftwop1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z73si15986298pgd.345.2019.04.04.01.58.34; Thu, 04 Apr 2019 01:58:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u0Ftwop1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730350AbfDDI5j (ORCPT + 99 others); Thu, 4 Apr 2019 04:57:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:33172 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730039AbfDDI5g (ORCPT ); Thu, 4 Apr 2019 04:57:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4F1742075E; Thu, 4 Apr 2019 08:57:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554368255; bh=29gU3Q4H9g9cuavq0z/q0JImifr6SqSZQEo5qVZ+BG4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=u0Ftwop1K3b3rEUC1BMQ2RrNTkyL1/rpjg6UU/pEmHVOTjCrn6iIgxmuQLlkYPWN+ I1jN76mkEZReHoMnS7hCqJcjBCz9x4siXZCSKWhqI3QPCzmPM2oDRwaQyWSi+3+Jv3 NUZ8R5x14jPs30nVZ33KYD0c9NOn5FmN6AVqWYgI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Coly Li , Jens Axboe , Sasha Levin Subject: [PATCH 4.14 078/121] bcache: improve sysfs_strtoul_clamp() Date: Thu, 4 Apr 2019 10:47:46 +0200 Message-Id: <20190404084549.495302328@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190404084545.245659903@linuxfoundation.org> References: <20190404084545.245659903@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 596b5a5dd1bc2fa019fdaaae522ef331deef927f ] Currently sysfs_strtoul_clamp() is defined as, 82 #define sysfs_strtoul_clamp(file, var, min, max) \ 83 do { \ 84 if (attr == &sysfs_ ## file) \ 85 return strtoul_safe_clamp(buf, var, min, max) \ 86 ?: (ssize_t) size; \ 87 } while (0) The problem is, if bit width of var is less then unsigned long, min and max may not protect var from integer overflow, because overflow happens in strtoul_safe_clamp() before checking min and max. To fix such overflow in sysfs_strtoul_clamp(), to make min and max take effect, this patch adds an unsigned long variable, and uses it to macro strtoul_safe_clamp() to convert an unsigned long value in range defined by [min, max]. Then assign this value to var. By this method, if bit width of var is less than unsigned long, integer overflow won't happen before min and max are checking. Now sysfs_strtoul_clamp() can properly handle smaller data type like unsigned int, of cause min and max should be defined in range of unsigned int too. Signed-off-by: Coly Li Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- drivers/md/bcache/sysfs.h | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/drivers/md/bcache/sysfs.h b/drivers/md/bcache/sysfs.h index b54fe9602529..e6e258f897ca 100644 --- a/drivers/md/bcache/sysfs.h +++ b/drivers/md/bcache/sysfs.h @@ -81,9 +81,16 @@ do { \ #define sysfs_strtoul_clamp(file, var, min, max) \ do { \ - if (attr == &sysfs_ ## file) \ - return strtoul_safe_clamp(buf, var, min, max) \ - ?: (ssize_t) size; \ + if (attr == &sysfs_ ## file) { \ + unsigned long v = 0; \ + ssize_t ret; \ + ret = strtoul_safe_clamp(buf, v, min, max); \ + if (!ret) { \ + var = v; \ + return size; \ + } \ + return ret; \ + } \ } while (0) #define strtoul_or_return(cp) \ -- 2.19.1