libbpf: Fix memory leak in bpf_program__attach_uprobe_multi
authorJiri Olsa <jolsa@kernel.org>
Fri, 15 Nov 2024 11:58:43 +0000 (12:58 +0100)
committerAndrii Nakryiko <andrii@kernel.org>
Fri, 15 Nov 2024 19:29:12 +0000 (11:29 -0800)
Andrii reported memory leak detected by Coverity on error path
in bpf_program__attach_uprobe_multi. Fixing that by moving
the check earlier before the offsets allocations.

Reported-by: Andrii Nakryiko <andrii@kernel.org>
Signed-off-by: Jiri Olsa <jolsa@kernel.org>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20241115115843.694337-1-jolsa@kernel.org
tools/lib/bpf/libbpf.c

index 07d5de8..66173dd 100644 (file)
@@ -12006,6 +12006,8 @@ bpf_program__attach_uprobe_multi(const struct bpf_program *prog,
        ref_ctr_offsets = OPTS_GET(opts, ref_ctr_offsets, NULL);
        cookies = OPTS_GET(opts, cookies, NULL);
        cnt = OPTS_GET(opts, cnt, 0);
+       retprobe = OPTS_GET(opts, retprobe, false);
+       session  = OPTS_GET(opts, session, false);
 
        /*
         * User can specify 2 mutually exclusive set of inputs:
@@ -12034,6 +12036,9 @@ bpf_program__attach_uprobe_multi(const struct bpf_program *prog,
                        return libbpf_err_ptr(-EINVAL);
        }
 
+       if (retprobe && session)
+               return libbpf_err_ptr(-EINVAL);
+
        if (func_pattern) {
                if (!strchr(path, '/')) {
                        err = resolve_full_path(path, full_path, sizeof(full_path));
@@ -12057,12 +12062,6 @@ bpf_program__attach_uprobe_multi(const struct bpf_program *prog,
                offsets = resolved_offsets;
        }
 
-       retprobe = OPTS_GET(opts, retprobe, false);
-       session  = OPTS_GET(opts, session, false);
-
-       if (retprobe && session)
-               return libbpf_err_ptr(-EINVAL);
-
        attach_type = session ? BPF_TRACE_UPROBE_SESSION : BPF_TRACE_UPROBE_MULTI;
 
        lopts.uprobe_multi.path = path;