From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id DBC24C4167D for ; Tue, 31 Oct 2023 17:49:11 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1376567AbjJaRtM (ORCPT ); Tue, 31 Oct 2023 13:49:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45280 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376521AbjJaRtK (ORCPT ); Tue, 31 Oct 2023 13:49:10 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8C7F3F4 for ; Tue, 31 Oct 2023 10:49:02 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B5965C433CA; Tue, 31 Oct 2023 17:49:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1698774542; bh=eJC+CvqeTWkLLFVTr50LAmd8scizRWCW0WSbwxKRFxE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CQgmJJNIG2jlKOv8WwQuuYmspzDpdXEXwNu4JKs3ClUrf39F4/AOrj1L6Wt9T+UaS isGALGqkBrv638BEo/j2AFMu2s5Bnf3T2Cf0UQoYeUKnCPL4tmVNWUz0ClkJVaIJWn 0QK0R0pt+jUj+iMw2CL+oB+7dq6eJaUH8C+Rbvb4= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Khazhismel Kumykov , Tejun Heo , Jens Axboe Subject: [PATCH 6.5 081/112] blk-throttle: check for overflow in calculate_bytes_allowed Date: Tue, 31 Oct 2023 18:01:22 +0100 Message-ID: <20231031165903.873194815@linuxfoundation.org> X-Mailer: git-send-email 2.42.0 In-Reply-To: <20231031165901.318222981@linuxfoundation.org> References: <20231031165901.318222981@linuxfoundation.org> User-Agent: quilt/0.67 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org 6.5-stable review patch. If anyone has any objections, please let me know. ------------------ From: Khazhismel Kumykov commit 2dd710d476f2f1f6eaca884f625f69ef4389ed40 upstream. Inexact, we may reject some not-overflowing values incorrectly, but they'll be on the order of exabytes allowed anyways. This fixes divide error crash on x86 if bps_limit is not configured or is set too high in the rare case that jiffy_elapsed is greater than HZ. Fixes: e8368b57c006 ("blk-throttle: use calculate_io/bytes_allowed() for throtl_trim_slice()") Fixes: 8d6bbaada2e0 ("blk-throttle: prevent overflow while calculating wait time") Signed-off-by: Khazhismel Kumykov Acked-by: Tejun Heo Link: https://lore.kernel.org/r/20231020223617.2739774-1-khazhy@google.com Signed-off-by: Jens Axboe Signed-off-by: Greg Kroah-Hartman --- block/blk-throttle.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/block/blk-throttle.c +++ b/block/blk-throttle.c @@ -723,6 +723,12 @@ static unsigned int calculate_io_allowed static u64 calculate_bytes_allowed(u64 bps_limit, unsigned long jiffy_elapsed) { + /* + * Can result be wider than 64 bits? + * We check against 62, not 64, due to ilog2 truncation. + */ + if (ilog2(bps_limit) + ilog2(jiffy_elapsed) - ilog2(HZ) > 62) + return U64_MAX; return mul_u64_u64_div_u64(bps_limit, (u64)jiffy_elapsed, (u64)HZ); }