libbpf: Fix potential multiplication overflow in mmap() size calculation
authorAndrii Nakryiko <andriin@fb.com>
Fri, 17 Jan 2020 06:08:00 +0000 (22:08 -0800)
committerAlexei Starovoitov <ast@kernel.org>
Fri, 17 Jan 2020 16:33:18 +0000 (08:33 -0800)
Prevent potential overflow performed in 32-bit integers, before assigning
result to size_t. Reported by LGTM static analysis.

Fixes: eba9c5f498a1 ("libbpf: Refactor global data map initialization")
Signed-off-by: Andrii Nakryiko <andriin@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20200117060801.1311525-4-andriin@fb.com
tools/lib/bpf/libbpf.c

index 3b0b88c..fc41c3f 100644 (file)
@@ -1283,7 +1283,7 @@ static size_t bpf_map_mmap_sz(const struct bpf_map *map)
        long page_sz = sysconf(_SC_PAGE_SIZE);
        size_t map_sz;
 
-       map_sz = roundup(map->def.value_size, 8) * map->def.max_entries;
+       map_sz = (size_t)roundup(map->def.value_size, 8) * map->def.max_entries;
        map_sz = roundup(map_sz, page_sz);
        return map_sz;
 }