Received: by 2002:a05:6358:111d:b0:dc:6189:e246 with SMTP id f29csp2418016rwi; Tue, 1 Nov 2022 07:30:49 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6pQcIIbEo7SWkx2Rqj82cddx4v6XunrkOmTqidRD3Jk8Bw78JSWyrvpZRcaUHEuhyZvw74 X-Received: by 2002:a50:e616:0:b0:461:fc07:b630 with SMTP id y22-20020a50e616000000b00461fc07b630mr19391073edm.219.1667313049742; Tue, 01 Nov 2022 07:30:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667313049; cv=none; d=google.com; s=arc-20160816; b=GO9covPPSM8l9LebrJkXpgvpglDkU+/VAHcpLkQAkviyPpssMoN5p4YM4yzCDhsbTo Vp5I62mrjG7PyVUFaUJo7pytzbR/w8qDYep15Tj9ga+Cwyd357oSnUrrzEg9pGwGXHig Vr2dk1hh5NRwlphydxQvd8EOXMxrPAHQCqTQwRD9Hywk1DRLeo9kkKMYUSBZeyQIhZ4p FbmoLiWV44G1hgZaUF5xY2THOMKgxjYbAYkxOPfutQ69at6c5fivwQ3xVod/fHb+wDx0 7RLPwxITjD7m+sFb9l97aQVHvcmti4LRWQi0Py6j1jkACmDdeGalpRAgof2SG0Is7jDH VZCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=5zNAL7sh9DpMaCdAK62e1jRSOZV3EO0hNoP22q8LRL0=; b=yUdKvknqy1IDx6FiUt34PmHNIRoBki3ds0QfsTu5CBxQU3RMGKZd2qPpGLtg+RIB+e 1qulacHnO3CjEwMgh2slytaOlj3G95ZcRqZsshmCnLL1x9qSC088cqRe6xXCDNzfWsC3 J0QMRBXqJzPN4wa7YGfV6iE4GDiBVK4dc7edWjH8QmMbuV9g83oQfJaZYxDIKd6MGIIX CAEaALf2OOqJ6+Qie9Ge6nwXIax0tpJ6ydP6eW9PrR6VaHjfM7g1eh86CNEmC0x+WPYR nfpbVn7Oh7GIA1eSc9wKpNbBG3XkgsmQnGBjc5rSi7AKJZjsKFqG9z/0TvaFmEl3X6ZM pdJg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sd40-20020a1709076e2800b007ac60b83407si11564482ejc.725.2022.11.01.07.30.22; Tue, 01 Nov 2022 07:30:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229935AbiKANrL (ORCPT + 96 others); Tue, 1 Nov 2022 09:47:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46230 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229487AbiKANrJ (ORCPT ); Tue, 1 Nov 2022 09:47:09 -0400 Received: from www62.your-server.de (www62.your-server.de [213.133.104.62]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 41E68DF9A; Tue, 1 Nov 2022 06:47:08 -0700 (PDT) Received: from sslproxy02.your-server.de ([78.47.166.47]) by www62.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from ) id 1oprbT-000Bjd-Nz; Tue, 01 Nov 2022 14:46:55 +0100 Received: from [85.1.206.226] (helo=linux.home) by sslproxy02.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1oprbT-000CPs-6k; Tue, 01 Nov 2022 14:46:55 +0100 Subject: Re: [PATCH bpf-next v2 1/3] bpf/verifier: Fix potential memory leak in array reallocation To: Bill Wendling , Kees Cook Cc: Alexei Starovoitov , John Fastabend , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , bpf@vger.kernel.org, linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org, Zhengchao Shao , Lorenz Bauer References: <20221029024444.gonna.633-kees@kernel.org> <20221029025433.2533810-1-keescook@chromium.org> From: Daniel Borkmann Message-ID: <2c6203ac-de2a-607e-0589-0a69f91e0479@iogearbox.net> Date: Tue, 1 Nov 2022 14:46:54 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.103.6/26706/Tue Nov 1 08:52:34 2022) X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ +Lorenz ] On 10/31/22 9:16 PM, Bill Wendling wrote: > On Fri, Oct 28, 2022 at 7:55 PM Kees Cook wrote: >> >> If an error (NULL) is returned by krealloc(), callers of realloc_array() >> were setting their allocation pointers to NULL, but on error krealloc() >> does not touch the original allocation. This would result in a memory >> resource leak. Instead, free the old allocation on the error handling >> path. >> >> Cc: Alexei Starovoitov >> Cc: Daniel Borkmann >> Cc: John Fastabend >> Cc: Andrii Nakryiko >> Cc: Martin KaFai Lau >> Cc: Song Liu >> Cc: Yonghong Song >> Cc: KP Singh >> Cc: Stanislav Fomichev >> Cc: Hao Luo >> Cc: Jiri Olsa >> Cc: bpf@vger.kernel.org >> Signed-off-by: Kees Cook > > Reviewed-by: Bill Wendling > >> --- >> kernel/bpf/verifier.c | 9 +++++++-- >> 1 file changed, 7 insertions(+), 2 deletions(-) >> >> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c >> index 014ee0953dbd..eb8c34db74c7 100644 >> --- a/kernel/bpf/verifier.c >> +++ b/kernel/bpf/verifier.c >> @@ -1027,12 +1027,17 @@ static void *copy_array(void *dst, const void *src, size_t n, size_t size, gfp_t >> */ >> static void *realloc_array(void *arr, size_t old_n, size_t new_n, size_t size) >> { >> + void *new_arr; >> + >> if (!new_n || old_n == new_n) >> goto out; >> >> - arr = krealloc_array(arr, new_n, size, GFP_KERNEL); >> - if (!arr) >> + new_arr = krealloc_array(arr, new_n, size, GFP_KERNEL); >> + if (!new_arr) { >> + kfree(arr); >> return NULL; >> + } >> + arr = new_arr; Fyi, I took this fix into bpf tree and improved commit log a bit with the one from Zhengchao [0] given yours came in first. Fixes tag would have been nice, I added the c69431aab67a to the commit message while applying. [0] https://patchwork.kernel.org/project/netdevbpf/patch/20221031070812.339883-1-shaozhengchao@huawei.com/ >> if (new_n > old_n) >> memset(arr + old_n * size, 0, (new_n - old_n) * size); >> -- >> 2.34.1 >>