Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp758389ybb; Thu, 28 Mar 2019 11:34:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqziAtbow2r10yyKaA04fpXBu3wRaN6Q5pOoOjkEyD0zugPj7vdfL/VaYXnHUo37h5ZhQV/Z X-Received: by 2002:aa7:8a87:: with SMTP id a7mr43995328pfc.252.1553798083486; Thu, 28 Mar 2019 11:34:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553798083; cv=none; d=google.com; s=arc-20160816; b=KEvB2cnxzxCpQtZoX7Ml5gXthnbL2OWasPJM2htjYeRpa03S5XajObShpyJTbh1Y/+ qNVGXsygHMrsVqqkrd0fbisEXVv8Oukq4uzMVwpEn22jx82CEHQRg5reKreTVP22eiL3 tOlglkChNbydjdrk9SQkGz2dgO6QQcCvlzPAEAKwHm5sGvN0IEC+vxXVC3Vjx/PQzkOb BCkhQrhrNJMaD1doAdas9JQdGiwplQ8plk4rkEm2+GuqZjUDNrpbBuASo9YvDMOO1tkS zYNOfhmb8/pXz9uRJn/zwpOKeaD+yJmmoBSv4puSmNn69uW6Q/vc7UAccxHkfmWqL8Ot VfoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version; bh=69WiLbGgXKzfkPTjGDvkM0HJqDgCV4zWdT7HwJLlSnI=; b=S12J5CtoM4/Y97ydVyEEYcd4Jgu/wJ57JCRKflz6/lLSrFRSr6lvF+E97fcHh6JUCK kEaAixeLmnJ1IZYTf5h/A736BgLwPzlSEgOweg0NC7zq40tq+LqtStFGrItPbzoS+Zp8 hDuE+2LoNSqgkIPxWN6RpwEjA5duu8htYSZsIXyv8TiSsmx/xO0SqVJYPPGDqXAMl+aD KfTA9olE+TtPAxaBFmLE9Rb/AJvtw0+krs1uIoW0m3zxOfWbXvzlHU0Di2rWzXAFYs3s QIS9kG3BenRKxYsZH09JHOp69431wCd0ljToe+biSTs/CkrURn2aAIp/wWKxJrhbFsRt Avdw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k13si21461840pgo.246.2019.03.28.11.34.27; Thu, 28 Mar 2019 11:34:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726249AbfC1Sdd (ORCPT + 99 others); Thu, 28 Mar 2019 14:33:33 -0400 Received: from relay3-d.mail.gandi.net ([217.70.183.195]:33163 "EHLO relay3-d.mail.gandi.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725885AbfC1Sdd (ORCPT ); Thu, 28 Mar 2019 14:33:33 -0400 X-Originating-IP: 209.85.217.41 Received: from mail-vs1-f41.google.com (mail-vs1-f41.google.com [209.85.217.41]) (Authenticated sender: pshelar@ovn.org) by relay3-d.mail.gandi.net (Postfix) with ESMTPSA id 3F50E60008; Thu, 28 Mar 2019 18:33:30 +0000 (UTC) Received: by mail-vs1-f41.google.com with SMTP id n4so12763092vsm.3; Thu, 28 Mar 2019 11:33:30 -0700 (PDT) X-Gm-Message-State: APjAAAXafEUMek7F/XSM4WNNoGOG9FSnylWOTFwdn0w8u0jneoQXhMoU fsytLKAarBdLCt+4QMupMu1rykTqLslols1OxdI= X-Received: by 2002:a05:6102:3cc:: with SMTP id n12mr3999363vsq.58.1553798008716; Thu, 28 Mar 2019 11:33:28 -0700 (PDT) MIME-Version: 1.0 References: <20190328063600.GC16096@xps-13> In-Reply-To: <20190328063600.GC16096@xps-13> From: Pravin Shelar Date: Thu, 28 Mar 2019 11:33:18 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2] openvswitch: fix flow actions reallocation To: Andrea Righi Cc: "David S. Miller" , Linux Kernel Network Developers , ovs dev , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 27, 2019 at 11:36 PM Andrea Righi wrote: > > The flow action buffer can be resized if it's not big enough to contain > all the requested flow actions. However, this resize doesn't take into > account the new requested size, the buffer is only increased by a factor > of 2x. This might be not enough to contain the new data, causing a > buffer overflow, for example: > > [ 42.044472] ============================================================================= > [ 42.045608] BUG kmalloc-96 (Not tainted): Redzone overwritten > [ 42.046415] ----------------------------------------------------------------------------- > > [ 42.047715] Disabling lock debugging due to kernel taint > [ 42.047716] INFO: 0x8bf2c4a5-0x720c0928. First byte 0x0 instead of 0xcc > [ 42.048677] INFO: Slab 0xbc6d2040 objects=29 used=18 fp=0xdc07dec4 flags=0x2808101 > [ 42.049743] INFO: Object 0xd53a3464 @offset=2528 fp=0xccdcdebb > > [ 42.050747] Redzone 76f1b237: cc cc cc cc cc cc cc cc ........ > [ 42.051839] Object d53a3464: 6b 6b 6b 6b 6b 6b 6b 6b 0c 00 00 00 6c 00 00 00 kkkkkkkk....l... > [ 42.053015] Object f49a30cc: 6c 00 0c 00 00 00 00 00 00 00 00 03 78 a3 15 f6 l...........x... > [ 42.054203] Object acfe4220: 20 00 02 00 ff ff ff ff 00 00 00 00 00 00 00 00 ............... > [ 42.055370] Object 21024e91: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > [ 42.056541] Object 070e04c3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > [ 42.057797] Object 948a777a: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > [ 42.059061] Redzone 8bf2c4a5: 00 00 00 00 .... > [ 42.060189] Padding a681b46e: 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZ > > Fix by making sure the new buffer is properly resized to contain all the > requested data. > > BugLink: https://bugs.launchpad.net/bugs/1813244 > Signed-off-by: Andrea Righi > --- > Changes in v2: > - correctly resize to current_size+req_size (thanks to Pravin) > > net/openvswitch/flow_netlink.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/net/openvswitch/flow_netlink.c b/net/openvswitch/flow_netlink.c > index 691da853bef5..4bdf5e3ac208 100644 > --- a/net/openvswitch/flow_netlink.c > +++ b/net/openvswitch/flow_netlink.c > @@ -2306,14 +2306,14 @@ static struct nlattr *reserve_sfa_size(struct sw_flow_actions **sfa, > > struct sw_flow_actions *acts; > int new_acts_size; > - int req_size = NLA_ALIGN(attr_len); > + size_t req_size = NLA_ALIGN(attr_len); > int next_offset = offsetof(struct sw_flow_actions, actions) + > (*sfa)->actions_len; > > if (req_size <= (ksize(*sfa) - next_offset)) > goto out; > > - new_acts_size = ksize(*sfa) * 2; > + new_acts_size = max(next_offset + req_size, ksize(*sfa) * 2); > > if (new_acts_size > MAX_ACTIONS_BUFSIZE) { > if ((MAX_ACTIONS_BUFSIZE - next_offset) < req_size) { > -- Looks good. Acked-by: Pravin B Shelar Thanks, Pravin.