On Wed, Dec 19, 2018 at 05:19:22PM +0200, Alexander Shishkin wrote:
The 'nr_pages' attribute of the 'msc' subdevices parses a comma-separated list of window sizes, passed from userspace. However, there is a bug in the string parsing logic wherein it doesn't exclude the comma character from the range of characters as it consumes them. This leads to an out-of-bounds access given a sufficiently long list. For example:
# echo 8,8,8,8 > /sys/bus/intel_th/devices/0-msc0/nr_pages
BUG: KASAN: slab-out-of-bounds in memchr+0x1e/0x40 Read of size 1 at addr ffff8803ffcebcd1 by task sh/825
CPU: 3 PID: 825 Comm: npktest.sh Tainted: G W 4.20.0-rc1+ Call Trace: dump_stack+0x7c/0xc0 print_address_description+0x6c/0x23c ? memchr+0x1e/0x40 kasan_report.cold.5+0x241/0x308 memchr+0x1e/0x40 nr_pages_store+0x203/0xd00 [intel_th_msu]
Fix this by accounting for the comma character.
Ugh, this is one major reason sysfs files are "one value per file".
You should never have to "parse" a sysfs file for something like this.
It's a bit too late now, but please, never create such a sysfs file again :(
greg k-h