Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4574944imu; Tue, 29 Jan 2019 04:04:48 -0800 (PST) X-Google-Smtp-Source: ALg8bN7tsmZw1TRnsl6q8trwULj6w9uNTgqY4JjflkaTV8aswLq7Y7ATfJi+a82RE8Uh3mo2NhbL X-Received: by 2002:a17:902:27e6:: with SMTP id i35mr25187646plg.222.1548763488358; Tue, 29 Jan 2019 04:04:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548763488; cv=none; d=google.com; s=arc-20160816; b=RixwkPcQSmfwtrIF/FMnr14LSfh9okdQjdax2pmU247DiW1DR+6DSUfChIoh0w8KW4 HOUpr9L/VXIYFfH/1FWqn9gRubAthMefF9604YvcXiWj9TMUlMlkI0l/MzFFQ2pwd/PN EeMKE7P2HZOyd4RRZpnyVmzabfhZttd2bS3YjuazniBTC/Z196c6Z4LrAIxLJ3CAw/w/ uMDkamkg01UKdGxQ+KxpOTsz1mXiKMYxMtoMH8O25oWo/KreDsEP5iVUKMTHzX+6sC5b pT4fVaqVPkWNTPpdXmSdN4ZyX2Mf9CXeI+nH5Nexlk6bRc0ecQdaqLE1F59JeCut/hEo PMQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=21LdgzwAINoWo946kl+lDH629vbDc0oImTkf372mZEI=; b=CKSMNrBW5dI1VEnIhgy2TQm1XwbfiReckjiWb8/wZwdtt4pIOPbQeTobuJ6G0x9Vgb tGr9TfpI1sc4wiyyNzTNLB0I/TRg8YnoxmMJHk5Mbwce+Ocd01pjNWrjqMn+OznhpQO1 eKqLyAju5CTzkvTLHjemNaL583RfIfgxq2i/LpHHN50tzjeAgIOiSmMqjFb6LkBPiC66 K6rquABJ1pYisFJExXlxfx1U/n9+Jy/oNVI6d51HwqEdQ+r2fYNhaufYwtOFmunCNoA3 5U95qS5DpeOrMaHl4fT3/6WbcmvWhZnUzKhXWjW8LFct4JJvmu0q763sRXIm0hgDtMBx Z5yQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JN8zWqUP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m7si2151800pgi.547.2019.01.29.04.04.32; Tue, 29 Jan 2019 04:04:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JN8zWqUP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730520AbfA2LoO (ORCPT + 99 others); Tue, 29 Jan 2019 06:44:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:34444 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729702AbfA2LoM (ORCPT ); Tue, 29 Jan 2019 06:44:12 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6E97420882; Tue, 29 Jan 2019 11:44:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548762251; bh=hLG6m1Cll7A+u+DTvcliCvHm858fEWGiioFa9uFioaQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JN8zWqUP9EpHkHgGiPJSbfVmMJ9TVCMQBnQikFGfvSRBXgcvU4zkNq2maZZ8EZZqa JQMeX6DRefRpkT91uKzFSwy5aX0M9v39465HbC8hfYoOFnO6DwS9pKu6E4nQ8X4nRg joGIs+F5YysAqVv6DTfh14Y9uhMVizw8kzq78grI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Gustavo A. R. Silva" Subject: [PATCH 4.19 042/103] misc: ibmvsm: Fix potential NULL pointer dereference Date: Tue, 29 Jan 2019 12:35:19 +0100 Message-Id: <20190129113202.021208510@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190129113159.567154026@linuxfoundation.org> References: <20190129113159.567154026@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Gustavo A. R. Silva commit e25df7812c91f62581301f9a7ac102acf92e4937 upstream. There is a potential NULL pointer dereference in case kzalloc() fails and returns NULL. Fix this by adding a NULL check on *session* Also, update the function header with information about the expected return on failure and remove unnecessary variable rc. This issue was detected with the help of Coccinelle. Fixes: 0eca353e7ae7 ("misc: IBM Virtual Management Channel Driver (VMC)") Cc: stable@vger.kernel.org Signed-off-by: Gustavo A. R. Silva Signed-off-by: Greg Kroah-Hartman --- drivers/misc/ibmvmc.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) --- a/drivers/misc/ibmvmc.c +++ b/drivers/misc/ibmvmc.c @@ -820,21 +820,24 @@ static int ibmvmc_send_msg(struct crq_se * * Return: * 0 - Success + * Non-zero - Failure */ static int ibmvmc_open(struct inode *inode, struct file *file) { struct ibmvmc_file_session *session; - int rc = 0; pr_debug("%s: inode = 0x%lx, file = 0x%lx, state = 0x%x\n", __func__, (unsigned long)inode, (unsigned long)file, ibmvmc.state); session = kzalloc(sizeof(*session), GFP_KERNEL); + if (!session) + return -ENOMEM; + session->file = file; file->private_data = session; - return rc; + return 0; } /**