Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1577725pxb; Mon, 22 Feb 2021 05:51:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJw0IsL5MZg0AiSfiw2Z96IBzDDBiq31Gdu09xzV9zH/08uLgkI4McfbcnyhB81Q2hvg83B2 X-Received: by 2002:a17:906:8a55:: with SMTP id gx21mr3659072ejc.21.1614001871965; Mon, 22 Feb 2021 05:51:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614001871; cv=none; d=google.com; s=arc-20160816; b=ILJHDnQKYtIbtkl1/+p54TLFZjP9fSeiAamAZ5unuXu/+7l4IRshOs/hhhwdCcxl2R d0pIXgR7u2lsd4DM2DvmNEk5Wobb56zfttIhcbpCNwGWojDAC+RYiCs0aeaD9lEMXuK4 y21pnrp4zvjazhui4mhw3KsAw3lm+2gKeLwUPLbeCznCOVVN+wa8sdG4Y1d3em3pc0Ub GhlGiYufhl0yj8wh473IXsdvUsU9aAoy7QJJWSd9fiieMRUUxn2cLwe87qR7a73ct1nX Ji8kdqpTNuB/hNwZsk5wo7hhwnhToeMrQ2CFq3nXyQhWOqZ20uS1Y8fi+GB7fz7N037E ZdyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dVKBCYZd1LQty/VTxRHh3TpxW1BXht0qzcGyEYjAPPs=; b=wBoOLfRedtoFMLD+zcxAWzogXEfzM4tMAJ1zOu5QnCksaxdF6r3f2t4wYX98KL8nd5 0UJuMlT5yTcctS8+aWGsEBZSFTUiuEJ5IHdSU9zQsF4Gvq8C3YIWf6s1eIoH3HV4/HNc cSVZ55DOjZ/ZDjMwfw64oB8CsTbYQkn1c7Mq5Gxm8hGi1gdHD1bTEQeZEe1Bydew5onI z3JWd1xiwkGXxAVDdHHXAtkyWuGyqiyA6waQWJYKgi5LLGk/wgZfOuxzmyJnd2VigOLb QfZt23DGn10l7Xn64nezD5pMp00J2KaBp/De+h1pZ7FGpA2uaPETI2vVIh9SXeNGXuTX WBlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=GetZMnTQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y101si12475174ede.594.2021.02.22.05.50.49; Mon, 22 Feb 2021 05:51:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=GetZMnTQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231667AbhBVNsf (ORCPT + 99 others); Mon, 22 Feb 2021 08:48:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:56544 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231641AbhBVMof (ORCPT ); Mon, 22 Feb 2021 07:44:35 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5A16564F50; Mon, 22 Feb 2021 12:41:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1613997680; bh=C63N+M1LH+aHDrqabny7wZ3zf4eLkZdKVj7jxNqG1yY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GetZMnTQS9oee9CNzzqHF4YJORvLaSa+Ze0+q7RBGymjfB7GeNSmlRKuN2RdLl8aV FrSP5dYZVkuKKfdNvXwgWn0mgYIyEC1a+AVKqx79dIBIeudItzzfYdPBCiM46JR34u o9cI0d7EVxRI/77UoSNmg7j3tl6Z4p6CwnJ6Mlrg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bui Quang Minh , Daniel Borkmann , Sasha Levin Subject: [PATCH 4.9 24/49] bpf: Check for integer overflow when using roundup_pow_of_two() Date: Mon, 22 Feb 2021 13:36:22 +0100 Message-Id: <20210222121026.720135690@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210222121022.546148341@linuxfoundation.org> References: <20210222121022.546148341@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Bui Quang Minh [ Upstream commit 6183f4d3a0a2ad230511987c6c362ca43ec0055f ] On 32-bit architecture, roundup_pow_of_two() can return 0 when the argument has upper most bit set due to resulting 1UL << 32. Add a check for this case. Fixes: d5a3b1f69186 ("bpf: introduce BPF_MAP_TYPE_STACK_TRACE") Signed-off-by: Bui Quang Minh Signed-off-by: Daniel Borkmann Link: https://lore.kernel.org/bpf/20210127063653.3576-1-minhquangbui99@gmail.com Signed-off-by: Sasha Levin --- kernel/bpf/stackmap.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/kernel/bpf/stackmap.c b/kernel/bpf/stackmap.c index a2a232dec2363..2fdf6f96f9762 100644 --- a/kernel/bpf/stackmap.c +++ b/kernel/bpf/stackmap.c @@ -70,6 +70,8 @@ static struct bpf_map *stack_map_alloc(union bpf_attr *attr) /* hash table size must be power of 2 */ n_buckets = roundup_pow_of_two(attr->max_entries); + if (!n_buckets) + return ERR_PTR(-E2BIG); cost = n_buckets * sizeof(struct stack_map_bucket *) + sizeof(*smap); if (cost >= U32_MAX - PAGE_SIZE) -- 2.27.0