Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753146AbdFLWxQ (ORCPT ); Mon, 12 Jun 2017 18:53:16 -0400 Received: from gateway30.websitewelcome.com ([192.185.160.12]:13940 "EHLO gateway30.websitewelcome.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752871AbdFLWxP (ORCPT ); Mon, 12 Jun 2017 18:53:15 -0400 X-Greylist: delayed 1505 seconds by postgrey-1.27 at vger.kernel.org; Mon, 12 Jun 2017 18:53:14 EDT Date: Mon, 12 Jun 2017 17:28:05 -0500 Message-ID: <20170612172805.Horde.AUST5RGJfhNVnchxoXV3U2C@gator4166.hostgator.com> From: "Gustavo A. R. Silva" To: Guenter Roeck Cc: Samuel Ortiz , "David S. Miller" , linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: nfc: nci: fix potential NULL pointer dereference References: <20170612220223.GA6326@embeddedgus> <20170612222155.GA18302@roeck-us.net> In-Reply-To: <20170612222155.GA18302@roeck-us.net> User-Agent: Horde Application Framework 5 Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes MIME-Version: 1.0 Content-Disposition: inline X-AntiAbuse: This header was added to track abuse, please include it with any abuse report X-AntiAbuse: Primary Hostname - gator4166.hostgator.com X-AntiAbuse: Original Domain - vger.kernel.org X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12] X-AntiAbuse: Sender Address Domain - embeddedor.com X-BWhitelist: no X-Source-IP: 108.167.133.22 X-Exim-ID: 1dKXob-003ab9-EA X-Source: X-Source-Args: X-Source-Dir: X-Source-Sender: gator4166.hostgator.com [108.167.133.22]:25825 X-Source-Auth: garsilva@embeddedor.com X-Email-Count: 12 X-Source-Cap: Z3V6aWRpbmU7Z3V6aWRpbmU7Z2F0b3I0MTY2Lmhvc3RnYXRvci5jb20= Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1884 Lines: 68 Hi Guenter, Please, see my comments below Quoting Guenter Roeck : > On Mon, Jun 12, 2017 at 05:02:23PM -0500, Gustavo A. R. Silva wrote: >> NULL check at line 76: if (conn_info) {, implies that pointer conn_info >> might be NULL, but this pointer is being previously dereferenced, >> which might cause a NULL pointer dereference. >> >> Add NULL check before dereferencing pointer conn_info in order to >> avoid a potential NULL pointer dereference. >> >> Addresses-Coverity-ID: 1362349 >> Signed-off-by: Gustavo A. R. Silva >> --- >> net/nfc/nci/core.c | 11 +++++------ >> 1 file changed, 5 insertions(+), 6 deletions(-) >> >> diff --git a/net/nfc/nci/core.c b/net/nfc/nci/core.c >> index 61fff42..d2198ce 100644 >> --- a/net/nfc/nci/core.c >> +++ b/net/nfc/nci/core.c >> @@ -70,14 +70,13 @@ int >> nci_get_conn_info_by_dest_type_params(struct nci_dev *ndev, u8 >> dest_type, >> struct nci_conn_info *conn_info; >> >> list_for_each_entry(conn_info, &ndev->conn_info_list, list) { > > conn_info is set in list_for_each_entry() using container_of(), > which is never NULL. Plus, it is dereferenced there as well. > The check is unnecessary. > Thanks for clarifying. > Guenter > >> - if (conn_info->dest_type == dest_type) { >> + if (conn_info && conn_info->dest_type == dest_type) { >> if (!params) >> return conn_info->conn_id; >> - if (conn_info) { So, this NULL check could be removed as it seems it is not useful at all ? >> - if (params->id == conn_info->dest_params->id && >> - params->protocol == conn_info->dest_params->protocol) >> - return conn_info->conn_id; >> - } >> + >> + if (params->id == conn_info->dest_params->id && >> + params->protocol == conn_info->dest_params->protocol) >> + return conn_info->conn_id; >> } >> } >> Thank you -- Gustavo A. R. Silva