Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp4921612imc; Mon, 25 Feb 2019 13:41:26 -0800 (PST) X-Google-Smtp-Source: AHgI3IZHWNa5sSsxR7mynGNwvA2vfnjiSAFv30sgomk7EpqwKDW5B5bm04wXbSPO7ItSHO1PTgZf X-Received: by 2002:a62:e216:: with SMTP id a22mr22253351pfi.20.1551130886409; Mon, 25 Feb 2019 13:41:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551130886; cv=none; d=google.com; s=arc-20160816; b=0lISCFW0n6JSeXznL8zjLyhWXTFaZBeioKL49JmrnIe24QtKmfcbqvj7ANutcpdahy 8yW6Hrz8nvNjvsNitmkANY7Xm8GeXLAOjozsrtV3gU/ALfLVtMb5ZRkSCiKqHX3DYSb4 PgieIqKqciG/Repw1xhmhAPfzs4W+P8ewsfpTfVxeHDv9bLPOQ7pbZpOfxLtAmLu8n9f w6WO9iUnkm5Dr3zzWT6VhJVpo7RTITu99H7ojPLEGscA9fniKi34dA1ymJP85IMISZA3 AdQfxvD4yp7CKnnwDJtCRmzkRMYPhuYkCkGIYGMgvKEDpCyRJ9dS79SBMJQO3n8wEzu4 ddog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3pHnA7ke7azSU6OBeWBv8+/1NuXIzv4PiNG8SYVMDus=; b=rM6EH7/w2lUpdqH5LUkHMKKZHqlCcvhVATT4wxjkzyr1037rNZId2mqeHoky7+7okj yHonjd2hMNYDbk0CW2PPTWOORnptruX6tOjcICh81Zhlh2aks3diWEvkME7xjphJMTSG ippdUf37buisEnWTYoQxoG7LL99McaujdHUtSGGvkSeosAPnLyOaCJ+Rhm9T8fgPHf9s aFsYEg9cDdZo89Y9ASotGfpXSK4Yilo1XgSrz0G1M8rSsKmz96OZWvByStL0+6pUbrU7 FPvKAc1s/PDQOs+aJB6ZNMP1ejq//2SnNoQsTiYOasSSiNm6j1HnsTKKvxAyUt6u4+8o N5Vg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YPcH5998; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 137si9944411pgc.237.2019.02.25.13.41.11; Mon, 25 Feb 2019 13:41:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YPcH5998; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726845AbfBYVkH (ORCPT + 99 others); Mon, 25 Feb 2019 16:40:07 -0500 Received: from mail.kernel.org ([198.145.29.99]:41390 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732944AbfBYVfQ (ORCPT ); Mon, 25 Feb 2019 16:35:16 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 02DEC21841; Mon, 25 Feb 2019 21:35:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551130515; bh=nHB8gqAmFCOX6LZwoWehfF5OSPYP/w6ADNOHPi64fGQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YPcH5998t+dcpLm/KDWKyERncA9n/+bNF+5GoM7kuIrN1sGJRVmZwZarM4KIxvC6p zdv0sVHIm/zHB4phW2jBxIWyTelz8McaGI3un/O+YqsgBgW4pEhWOd7vN7IaXfo+r5 DRQzxg6fkmzkYuH+WGY/xevvBpATfw393oJ0e9Yc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Song Liu , Stanislav Fomichev , Daniel Borkmann , Sasha Levin Subject: [PATCH 4.20 107/183] bpf: zero out build_id for BPF_STACK_BUILD_ID_IP Date: Mon, 25 Feb 2019 22:11:20 +0100 Message-Id: <20190225195112.708417893@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190225195054.748060397@linuxfoundation.org> References: <20190225195054.748060397@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 4af396ae4836c4ecab61e975b8e61270c551894d ] When returning BPF_STACK_BUILD_ID_IP from stack_map_get_build_id_offset, make sure that build_id field is empty. Since we are using percpu free list, there is a possibility that we might reuse some previous bpf_stack_build_id with non-zero build_id. Fixes: 615755a77b24 ("bpf: extend stackmap to save binary_build_id+offset instead of address") Acked-by: Song Liu Signed-off-by: Stanislav Fomichev Signed-off-by: Daniel Borkmann Signed-off-by: Sasha Levin --- kernel/bpf/stackmap.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/kernel/bpf/stackmap.c b/kernel/bpf/stackmap.c index f9df545e92f6e..d43b145358275 100644 --- a/kernel/bpf/stackmap.c +++ b/kernel/bpf/stackmap.c @@ -314,6 +314,7 @@ static void stack_map_get_build_id_offset(struct bpf_stack_build_id *id_offs, for (i = 0; i < trace_nr; i++) { id_offs[i].status = BPF_STACK_BUILD_ID_IP; id_offs[i].ip = ips[i]; + memset(id_offs[i].build_id, 0, BPF_BUILD_ID_SIZE); } return; } @@ -324,6 +325,7 @@ static void stack_map_get_build_id_offset(struct bpf_stack_build_id *id_offs, /* per entry fall back to ips */ id_offs[i].status = BPF_STACK_BUILD_ID_IP; id_offs[i].ip = ips[i]; + memset(id_offs[i].build_id, 0, BPF_BUILD_ID_SIZE); continue; } id_offs[i].offset = (vma->vm_pgoff << PAGE_SHIFT) + ips[i] -- 2.19.1