Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2311386imu; Fri, 14 Dec 2018 09:01:48 -0800 (PST) X-Google-Smtp-Source: AFSGD/V/0xbHGlUSpwh1Spaj1WmktBiPD47NT6y0RDhq+5Q/gKesVUBxwI6BQCXrCz5FmkTzKbO9 X-Received: by 2002:a63:1b1f:: with SMTP id b31mr3362755pgb.66.1544806908245; Fri, 14 Dec 2018 09:01:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544806908; cv=none; d=google.com; s=arc-20160816; b=Pf4snlD+vtIBEhDBjMQPK3WN2AiKeHrcerS3nW2a4Bh1yXkNAWvcW2yRVtcKxzKQIl SJOT3kkqWWQSYbpspoo2QoMolUUzFbJPB6HbwWFtG3Jr8xVyyU/MqYEwV9brE3Y2pvrr UjMV8KcTUuOjs47qUj7odO8Lpm9WUfdE7njIADwcU9VJUHzwg3mvQ5rDeV2q5Ut+NJsY i/bUROUCCVBUgwYEG8x6LRABkjd7SFvk/lzhrgltvpv6g+aBR1SqXZJUplWZG2KKm/2d rUARiBaeIGf9xgI+1xYvZjbJxNaqNZSfhsnS+rQJxP4qsm3DL4xTNGdN6rzefDmyeCfh AKEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=y2PR+5Y0wontH/TYszU/fdh83VOFfKGgB0agspfXqi0=; b=HNChYdad6glcwaUUUXwYlRNR+1FR9ubj+2jYDInyl0MQYdxlX/deEEwUXQzrL/ly/6 nz5pvpOkOQM567MFTAsswgciOhzX+nleNPuNCsMQc0mTBDQC7IInsdL3/+92bSCFqyq8 cR6NPm9PgzfQZ89rKiM8ezDrJPxyC+g2yDO2Y6H6VwcWMBGnst7MmzNDn4JpbIiI2fBl ed1xPQr3sYNuEyLNhd+nztzebRBoRbAIPxZG+LYmZCtTt/BK19C3OHLk+Q8ig+C3T+AP 9/5KjaZrwNZ5I2Kv/gM3XtO4HAJjcobLg31dg6R/V2onpFQEnKCPRodOK6Vdv+cTgi+5 TQTg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t4si4305322pgb.97.2018.12.14.09.01.21; Fri, 14 Dec 2018 09:01:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730078AbeLNQ74 (ORCPT + 99 others); Fri, 14 Dec 2018 11:59:56 -0500 Received: from www.osadl.org ([62.245.132.105]:42959 "EHLO www.osadl.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729409AbeLNQ74 (ORCPT ); Fri, 14 Dec 2018 11:59:56 -0500 Received: from debian01.hofrr.at (178.115.242.59.static.drei.at [178.115.242.59]) by www.osadl.org (8.13.8/8.13.8/OSADL-2007092901) with ESMTP id wBEGxVdk014507; Fri, 14 Dec 2018 17:59:40 +0100 From: Nicholas Mc Guire To: Josh Poimboeuf Cc: Jessica Yu , Jiri Kosina , Miroslav Benes , Petr Mladek , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org, Nicholas Mc Guire Subject: [PATCH 2/2] livepatch: check kzalloc return values Date: Fri, 14 Dec 2018 17:56:10 +0100 Message-Id: <1544806570-21299-2-git-send-email-hofrat@osadl.org> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1544806570-21299-1-git-send-email-hofrat@osadl.org> References: <1544806570-21299-1-git-send-email-hofrat@osadl.org> X-Spam-Status: No, score=0.4 required=6.0 tests=BAYES_00,DATE_IN_FUTURE_96_Q autolearn=no version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on www.osadl.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org kzalloc() return should always be checked - notably in example code where this may be seen as reference. On failure of allocation in livepatch_fix1_dummy_alloc() respectively dummy_alloc() previous allocation is freed (thanks to Petr Mladek for catching this) and NULL returned. Signed-off-by: Nicholas Mc Guire Fixes: 439e7271dc2b ("livepatch: introduce shadow variable API") --- Problem located with an experimental coccinelle script Patch was compile tested with: x86_64_defconfig + FTRACE=y FUNCTION_TRACER=y, EXPERT=y, LATENCYTOP=y, SAMPLES=y, SAMPLE_LIVEPATCH=y Patch is against 4.20-rc6 (localversion-next is next-20181214) on top of 0001-livepatch-fix-non-static-warnings.patch samples/livepatch/livepatch-shadow-fix1.c | 5 +++++ samples/livepatch/livepatch-shadow-mod.c | 4 ++++ 2 files changed, 9 insertions(+) diff --git a/samples/livepatch/livepatch-shadow-fix1.c b/samples/livepatch/livepatch-shadow-fix1.c index eaab10f..1974eb5 100644 --- a/samples/livepatch/livepatch-shadow-fix1.c +++ b/samples/livepatch/livepatch-shadow-fix1.c @@ -89,6 +89,11 @@ static __noclone struct dummy *livepatch_fix1_dummy_alloc(void) * pointer to handle resource release. */ leak = kzalloc(sizeof(int), GFP_KERNEL); + if (!leak) { + kfree(d); + return NULL; + } + klp_shadow_alloc(d, SV_LEAK, sizeof(leak), GFP_KERNEL, shadow_leak_ctor, leak); diff --git a/samples/livepatch/livepatch-shadow-mod.c b/samples/livepatch/livepatch-shadow-mod.c index dc69da0..b4ece36 100644 --- a/samples/livepatch/livepatch-shadow-mod.c +++ b/samples/livepatch/livepatch-shadow-mod.c @@ -123,6 +123,10 @@ static __noclone noinline struct dummy *dummy_alloc(void) /* Oops, forgot to save leak! */ leak = kzalloc(sizeof(int), GFP_KERNEL); + if (!leak) { + kfree(d); + return NULL; + } pr_info("%s: dummy @ %p, expires @ %lx\n", __func__, d, d->jiffies_expire); -- 2.1.4