Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1928545ybl; Tue, 3 Dec 2019 15:10:04 -0800 (PST) X-Google-Smtp-Source: APXvYqwDYMXSla+tO6XvdMTK9wE5bHWCTlfnWwp+icnHtLLC2kQUkRtMOhhkDlrslDop9n+EFwAx X-Received: by 2002:a9d:7f90:: with SMTP id t16mr279774otp.315.1575414604162; Tue, 03 Dec 2019 15:10:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575414604; cv=none; d=google.com; s=arc-20160816; b=IQ+daewH5VeVIMN7FEmYkvYIV+cjRjAjmW1jGKg5LqLq3zH+MLtS+qfY3XeKqH+Y+8 gI8+up1LqhPWftmGvVsU7caTlpLlzTUJLveKjzSyHqO1EcWLyEAo8ql+sEdCI3O5/BG7 SbVOal4OEytk4wizWdG13Mc9Se9pYanFMNd2VMEn6Db2UG9yPgk6AfSaql9q/a2NQoL0 kl1TagEAduktfr90KrCaC3t+bpzlyzwjlZgeRQfllD2UldUyDUi1hB8c2G82gQEYaOiQ c7PF4+CCx18K6no+ZHlA2agxO/y7ZLQXrGhPyigTMjIqbQBX3pljAM0Zh8Pms54Af+4D RGyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jvx5BgVXxK0uLEkLKCjFNxvVB6lh90ea1oMqRHYkeXM=; b=0ohaUdq/oZ5xnCaGPtY7xuOGTmomaDaanZDHZaEAgtw3fmoG/w1cdGAHlszv1r6MBz DyjaVCkTHVnD2ng42o54kVIICXqiTohhxfkCe3f9w8dYXESa22tCkpN3vzpF7Lj54rjA MHj/2rElfto50AQDE+k3Q86/uy3bFjOTor6buaMBma7RU6zPfOntCx75HvtHi2l/+J6+ DhZWntaCafq0Qa3g5sOzaZf3MIPj60h0YbZQ9XeS/TUG3T8rotT6iqKraNSrqYMfsL4a oGQe+BUVdx4xCB0vtJB9ra1DTDrC3YdAPpkGjdKPg46S98L9QsQfV6AUJSHkbpQp4RH0 TWfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yrRjB8bv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r12si2236801otq.156.2019.12.03.15.09.52; Tue, 03 Dec 2019 15:10:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yrRjB8bv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729120AbfLCWp4 (ORCPT + 99 others); Tue, 3 Dec 2019 17:45:56 -0500 Received: from mail.kernel.org ([198.145.29.99]:34812 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729113AbfLCWpv (ORCPT ); Tue, 3 Dec 2019 17:45:51 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 15CD22084F; Tue, 3 Dec 2019 22:45:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575413151; bh=lJh3RkMtFWDI0wGx4wOr6RiA9sQ7klQH6rhWkBo+7Ac=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yrRjB8bv7d8xsVNElOeZZBoP0mChFZBAFurWlch2Kri5EqQSadE0f2klJuitEiidr PbYOB6qzhfrLA7C1DLhCcFFsOAk9RAH+UMiw/O0+ZAGgK4uDcrBkvKvwppvEHbz/yw Idjkb4lp17omS4oFGA1RTYH2xPnikKZ4rgiIqPc4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Matthew Wilcox (Oracle)" , Sasha Levin Subject: [PATCH 4.19 019/321] idr: Fix integer overflow in idr_for_each_entry Date: Tue, 3 Dec 2019 23:31:25 +0100 Message-Id: <20191203223428.119431642@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191203223427.103571230@linuxfoundation.org> References: <20191203223427.103571230@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Matthew Wilcox (Oracle) [ Upstream commit f6341c5af4e6e15041be39976d16deca789555fa ] If there is an entry at INT_MAX then idr_for_each_entry() will increment id after handling it. This is undefined behaviour, and is caught by UBSAN. Adding 1U to id forces the operation to be carried out as an unsigned addition which (when assigned to id) will result in INT_MIN. Since there is never an entry stored at INT_MIN, idr_get_next() will return NULL, ending the loop as expected. Signed-off-by: Matthew Wilcox (Oracle) Signed-off-by: Sasha Levin --- include/linux/idr.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/linux/idr.h b/include/linux/idr.h index 3ec8628ce17f0..b6c6151c7446f 100644 --- a/include/linux/idr.h +++ b/include/linux/idr.h @@ -185,7 +185,7 @@ static inline void idr_preload_end(void) * is convenient for a "not found" value. */ #define idr_for_each_entry(idr, entry, id) \ - for (id = 0; ((entry) = idr_get_next(idr, &(id))) != NULL; ++id) + for (id = 0; ((entry) = idr_get_next(idr, &(id))) != NULL; id += 1U) /** * idr_for_each_entry_ul() - Iterate over an IDR's elements of a given type. -- 2.20.1