Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp3884896rdh; Tue, 28 Nov 2023 06:29:54 -0800 (PST) X-Google-Smtp-Source: AGHT+IHA7xFZRj9sy6+ou0p43NXS9cNYuUvwYlCLg4fJnTBFNu5ZgXIL31+gxtjQcU2AoCT3JUwT X-Received: by 2002:a05:6a21:9997:b0:18b:cc7e:de3 with SMTP id ve23-20020a056a21999700b0018bcc7e0de3mr19810971pzb.41.1701181794627; Tue, 28 Nov 2023 06:29:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701181794; cv=none; d=google.com; s=arc-20160816; b=TO4uoU9x9OuVql6/pR9yAq8LhGNoRiqBDeesuarM8Ynu+Dh6b9KJ7jaVgTaMf5ijc6 /3XO/SxK0cDoO5epe/NgV4g1klxldyToucQnt3EKcVBesX6mSG90xx+RieyBvtwzEHBF cNaNqkOYApvqFkyCIfYxwDyA7Nv6PjjQBwOiOfPbqhNs7xqph2aN59+bvu0ldUs7DH6k pUbjszZ6otAFZle6YNCo+Tn6azv27KkIqoKV9eqHTKH8npA0IKViOGX80QxkN9yQcVey /+qeHpBZU56Mq2RG5HJL9dMZQe7hQIvLLw8DKBJ6R/nTHxyE0rubfAWj3ITvZTmEAbEg S6Uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :organization:autocrypt:from:content-language:references:cc:to :subject:user-agent:mime-version:date:message-id:dkim-signature; bh=olnZk6p+1V5N/WuSZmT5UaIb8pCzSj1eRHD7vfRsAU0=; fh=Ql93xjscbyQ79uysKfSyvU2NAOiyL8nbzYqrMReCKf8=; b=JDflsn1Qgz5zHY+GAu1HqmKB3k1Fga8Pe+lZCl7Y9z2JZqWomWyA/eL8PLhney2ZoI cTbbE06B8vA4B7wwfSkB3xpjWF0MsRiRMCzXpmBf2B0Z7kpZY60YbL+nYyOmFY2rpMiC Knr7cZ9ePsFv0JhzV4SKAFDZU9uuqvGHJd9s0QV9G7Zwzu6kqzWycevksL4bm8ZwhaiZ 93RxcHfxFHE2Jb8Lv+4wt9ICEa9LMwx7KByrK5XhXQdIjNwhEsn0ggIGRdSKotpY0EMN 0ObdJqH2qM0gKmku2W6wVnGqaBI69jtv4SpdT3z9Naz3SphbdorvyAXZyLun3epblw0g 9qZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=sNh0CUpT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id 17-20020a630a11000000b0056952b496efsi12502347pgk.366.2023.11.28.06.29.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Nov 2023 06:29:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=sNh0CUpT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 30CDF80486A9; Tue, 28 Nov 2023 06:29:53 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346252AbjK1O3o (ORCPT + 99 others); Tue, 28 Nov 2023 09:29:44 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46508 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345705AbjK1O3n (ORCPT ); Tue, 28 Nov 2023 09:29:43 -0500 Received: from smtp-relay-canonical-1.canonical.com (smtp-relay-canonical-1.canonical.com [185.125.188.121]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64E7318D; Tue, 28 Nov 2023 06:29:49 -0800 (PST) Received: from [192.168.192.84] (unknown [50.39.103.33]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-canonical-1.canonical.com (Postfix) with ESMTPSA id 0443C3F5DF; Tue, 28 Nov 2023 14:29:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1701181786; bh=olnZk6p+1V5N/WuSZmT5UaIb8pCzSj1eRHD7vfRsAU0=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=sNh0CUpTVWqE05Kk9k6guUYv1zy0LsuJMCLlIcEuswbOg7R3AXWO75mUyEiwfnNuP ERK7vTDlfQeGpOHdEobXcz6TwoqEtcVJdiCPfukv3xvfgEJEvQE15SE6LQ9O/M0bzu 5VVvfDCa5Ign9xkOy81pq1POj7CxV8boRfhz6fBjsT5N8W1Ch0MG1itkeux0LmwdGe crU39Fn9ozWO7k9kbsbn3XVsVl4bc0Zlymt3ZEcq9bjVAM7C9RwnayWyVuYeG3TiN6 c1bRUDo3xK+bd67tAfVrViHFeky1TxOTlK37/XvboXcWnC3Q2IF+h/ddfVkhojv7wO ofq9AkjA7l8yw== Message-ID: Date: Tue, 28 Nov 2023 06:29:38 -0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH] apparmor: free the allocated pdb objects To: Fedor Pchelkin Cc: Paul Moore , James Morris , "Serge E. Hallyn" , Georgia Garcia , apparmor@lists.ubuntu.com, linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Alexey Khoroshilov , lvc-project@linuxtesting.org References: <20231127175904.156583-1-pchelkin@ispras.ru> Content-Language: en-US From: John Johansen Autocrypt: addr=john.johansen@canonical.com; keydata= xsFNBE5mrPoBEADAk19PsgVgBKkImmR2isPQ6o7KJhTTKjJdwVbkWSnNn+o6Up5knKP1f49E BQlceWg1yp/NwbR8ad+eSEO/uma/K+PqWvBptKC9SWD97FG4uB4/caomLEU97sLQMtnvGWdx rxVRGM4anzWYMgzz5TZmIiVTZ43Ou5VpaS1Vz1ZSxP3h/xKNZr/TcW5WQai8u3PWVnbkjhSZ PHv1BghN69qxEPomrJBm1gmtx3ZiVmFXluwTmTgJOkpFol7nbJ0ilnYHrA7SX3CtR1upeUpM a/WIanVO96WdTjHHIa43fbhmQube4txS3FcQLOJVqQsx6lE9B7qAppm9hQ10qPWwdfPy/+0W 6AWtNu5ASiGVCInWzl2HBqYd/Zll93zUq+NIoCn8sDAM9iH+wtaGDcJywIGIn+edKNtK72AM gChTg/j1ZoWH6ZeWPjuUfubVzZto1FMoGJ/SF4MmdQG1iQNtf4sFZbEgXuy9cGi2bomF0zvy BJSANpxlKNBDYKzN6Kz09HUAkjlFMNgomL/cjqgABtAx59L+dVIZfaF281pIcUZzwvh5+JoG eOW5uBSMbE7L38nszooykIJ5XrAchkJxNfz7k+FnQeKEkNzEd2LWc3QF4BQZYRT6PHHga3Rg ykW5+1wTMqJILdmtaPbXrF3FvnV0LRPcv4xKx7B3fGm7ygdoowARAQABzStKb2huIEpvaGFu c2VuIDxqb2huLmpvaGFuc2VuQGNhbm9uaWNhbC5jb20+wsF3BBMBCgAhBQJOjRdaAhsDBQsJ CAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJEAUvNnAY1cPYi0wP/2PJtzzt0zi4AeTrI0w3Rj8E Waa1NZWw4GGo6ehviLfwGsM7YLWFAI8JB7gsuzX/im16i9C3wHYXKs9WPCDuNlMc0rvivqUI JXHHfK7UHtT0+jhVORyyVVvX+qZa7HxdZw3jK+ROqUv4bGnImf31ll99clzo6HpOY59soa8y 66/lqtIgDckcUt/1ou9m0DWKwlSvulL1qmD25NQZSnvB9XRZPpPd4bea1RTa6nklXjznQvTm MdLq5aJ79j7J8k5uLKvE3/pmpbkaieEsGr+azNxXm8FPcENV7dG8Xpd0z06E+fX5jzXHnj69 DXXc3yIvAXsYZrXhnIhUA1kPQjQeNG9raT9GohFPMrK48fmmSVwodU8QUyY7MxP4U6jE2O9L 7v7AbYowNgSYc+vU8kFlJl4fMrX219qU8ymkXGL6zJgtqA3SYHskdDBjtytS44OHJyrrRhXP W1oTKC7di/bb8jUQIYe8ocbrBz3SjjcL96UcQJecSHu0qmUNykgL44KYzEoeFHjr5dxm+DDg OBvtxrzd5BHcIbz0u9ClbYssoQQEOPuFmGQtuSQ9FmbfDwljjhrDxW2DFZ2dIQwIvEsg42Hq 5nv/8NhW1whowliR5tpm0Z0KnQiBRlvbj9V29kJhs7rYeT/dWjWdfAdQSzfoP+/VtPRFkWLr 0uCwJw5zHiBgzsFNBE5mrPoBEACirDqSQGFbIzV++BqYBWN5nqcoR+dFZuQL3gvUSwku6ndZ vZfQAE04dKRtIPikC4La0oX8QYG3kI/tB1UpEZxDMB3pvZzUh3L1EvDrDiCL6ef93U+bWSRi GRKLnNZoiDSblFBST4SXzOR/m1wT/U3Rnk4rYmGPAW7ltfRrSXhwUZZVARyJUwMpG3EyMS2T dLEVqWbpl1DamnbzbZyWerjNn2Za7V3bBrGLP5vkhrjB4NhrufjVRFwERRskCCeJwmQm0JPD IjEhbYqdXI6uO+RDMgG9o/QV0/a+9mg8x2UIjM6UiQ8uDETQha55Nd4EmE2zTWlvxsuqZMgy W7gu8EQsD+96JqOPmzzLnjYf9oex8F/gxBSEfE78FlXuHTopJR8hpjs6ACAq4Y0HdSJohRLn 5r2CcQ5AsPEpHL9rtDW/1L42/H7uPyIfeORAmHFPpkGFkZHHSCQfdP4XSc0Obk1olSxqzCAm uoVmRQZ3YyubWqcrBeIC3xIhwQ12rfdHQoopELzReDCPwmffS9ctIb407UYfRQxwDEzDL+m+ TotTkkaNlHvcnlQtWEfgwtsOCAPeY9qIbz5+i1OslQ+qqGD2HJQQ+lgbuyq3vhefv34IRlyM sfPKXq8AUTZbSTGUu1C1RlQc7fpp8W/yoak7dmo++MFS5q1cXq29RALB/cfpcwARAQABwsFf BBgBCgAJBQJOZqz6AhsMAAoJEAUvNnAY1cPYP9cP/R10z/hqLVv5OXWPOcpqNfeQb4x4Rh4j h/jS9yjes4uudEYU5xvLJ9UXr0wp6mJ7g7CgjWNxNTQAN5ydtacM0emvRJzPEEyujduesuGy a+O6dNgi+ywFm0HhpUmO4sgs9SWeEWprt9tWrRlCNuJX+u3aMEQ12b2lslnoaOelghwBs8IJ r998vj9JBFJgdeiEaKJLjLmMFOYrmW197As7DTZ+R7Ef4gkWusYFcNKDqfZKDGef740Xfh9d yb2mJrDeYqwgKb7SF02Hhp8ZnohZXw8ba16ihUOnh1iKH77Ff9dLzMEJzU73DifOU/aArOWp JZuGJamJ9EkEVrha0B4lN1dh3fuP8EjhFZaGfLDtoA80aPffK0Yc1R/pGjb+O2Pi0XXL9AVe qMkb/AaOl21F9u1SOosciy98800mr/3nynvid0AKJ2VZIfOP46nboqlsWebA07SmyJSyeG8c XA87+8BuXdGxHn7RGj6G+zZwSZC6/2v9sOUJ+nOna3dwr6uHFSqKw7HwNl/PUGeRqgJEVu++ +T7sv9+iY+e0Y+SolyJgTxMYeRnDWE6S77g6gzYYHmcQOWP7ZMX+MtD4SKlf0+Q8li/F9GUL p0rw8op9f0p1+YAhyAd+dXWNKf7zIfZ2ME+0qKpbQnr1oizLHuJX/Telo8KMmHter28DPJ03 lT9Q Organization: Canonical In-Reply-To: <20231127175904.156583-1-pchelkin@ispras.ru> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Tue, 28 Nov 2023 06:29:53 -0800 (PST) On 11/27/23 09:59, Fedor Pchelkin wrote: > policy_db objects are allocated with kzalloc() inside aa_alloc_pdb() and > are not cleared in the corresponding aa_free_pdb() function causing leak: > > unreferenced object 0xffff88801f0a1400 (size 192): > comm "apparmor_parser", pid 1247, jiffies 4295122827 (age 2306.399s) > hex dump (first 32 bytes): > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [] __kmem_cache_alloc_node+0x1e2/0x2d0 > [] kmalloc_trace+0x25/0xc0 > [] aa_alloc_pdb+0x82/0x140 > [] unpack_pdb+0xc7/0x2700 > [] unpack_profile+0x450/0x4960 > [] aa_unpack+0x309/0x15e0 > [] aa_replace_profiles+0x213/0x33c0 > [] policy_update+0x261/0x370 > [] profile_replace+0x20e/0x2a0 > [] vfs_write+0x2af/0xe00 > [] ksys_write+0x126/0x250 > [] do_syscall_64+0x46/0xf0 > [] entry_SYSCALL_64_after_hwframe+0x6e/0x76 > > Free the pdbs inside aa_free_pdb(). While at it, rename the variable > representing an aa_policydb object to make the function more unified with > aa_pdb_free_kref() and aa_alloc_pdb(). > > Found by Linux Verification Center (linuxtesting.org). > > Fixes: 98b824ff8984 ("apparmor: refcount the pdb") > Signed-off-by: Fedor Pchelkin ouch, lgtm, I am going to pull this into my tree and throw some testing on this asap Acked-by: John Johansen > --- > security/apparmor/policy.c | 13 +++++++------ > 1 file changed, 7 insertions(+), 6 deletions(-) > > diff --git a/security/apparmor/policy.c b/security/apparmor/policy.c > index ed4c9803c8fa..957654d253dd 100644 > --- a/security/apparmor/policy.c > +++ b/security/apparmor/policy.c > @@ -99,13 +99,14 @@ const char *const aa_profile_mode_names[] = { > }; > > > -static void aa_free_pdb(struct aa_policydb *policy) > +static void aa_free_pdb(struct aa_policydb *pdb) > { > - if (policy) { > - aa_put_dfa(policy->dfa); > - if (policy->perms) > - kvfree(policy->perms); > - aa_free_str_table(&policy->trans); > + if (pdb) { > + aa_put_dfa(pdb->dfa); > + if (pdb->perms) > + kvfree(pdb->perms); > + aa_free_str_table(&pdb->trans); > + kfree(pdb); > } > } >