Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1423463ybi; Sat, 8 Jun 2019 09:23:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqzItocleyxH7RM4RTi0Cu4v5X8+QlPZ0YN/u+Ja7f5EOFniHn47cMfQS6W3nWIrNSAirfl6 X-Received: by 2002:aa7:9342:: with SMTP id 2mr56391240pfn.241.1560010984141; Sat, 08 Jun 2019 09:23:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560010984; cv=none; d=google.com; s=arc-20160816; b=i3gamt9Lov32k5phSMcUTyXuXaHPOQHTB6ubPyA89/iDtCl3u9gYdi+T24dSEOVyJB VXU5sf8wAKJ5JoXlvyG9Z2uYnOiibGlY9waQLseXahml9l3GTv/kK4cjUnfQBIXeVmsi VYUgnzdAaVaQAlIrg+bawaW2b+QyHExOz8X89GjHlhejKa9g6+8fn2qoUnXCS8lPSn2a 1Vnid2RQF9GfvlwiEeTdNJ7a/1ar0e+lYJ1/dYqxzeWIiz88sAJxEXNrEqgvsuv6Fba1 YchxCUIzoYlijDMza5vUnVW+/TUqsXQPqdbNxxh+Hri69ya527KSiNkAeUqVPXbw2ndo Vs5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=aMgq7QfIy/7W88eIHYMF2BHPSsVbISvPdEUxTebEQl0=; b=Q6vhZcmNd81fHaud6NOsWS1ASN6f1pr2oiauD466v2HUVSWMBFO1DAHcU7QnE/TwCI +c/E/uou4QJW0IzcdZ9DwOqVDkBgu4KXo26Pqg+/7S3LsxIy0CGYN1VAoTQDkHJyiCi/ PuKm6IRk49TASEeZDgXfIYGoGqC4k8kw0DDey0zj/yGX1Y8JPmIblz0z4XAbCXGNTQZ3 +iuWV8YswhE1Z0V+SM0GF1R8SiZphB/DQa6A4PN0buB6b5PwKugUMFhgDblCn5SNLLO8 ry56BJzt/8+wIoaR8e6X1X0zzntYcCymP9wm1aycYWaWSVHJzDQPKTdK2eoKGhOzD8B/ ppDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fCIfTap4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f17si4779143pgv.338.2019.06.08.09.22.44; Sat, 08 Jun 2019 09:23:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fCIfTap4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727236AbfFHQVb (ORCPT + 99 others); Sat, 8 Jun 2019 12:21:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:50468 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727160AbfFHQVa (ORCPT ); Sat, 8 Jun 2019 12:21:30 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9B7C52089E; Sat, 8 Jun 2019 16:21:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560010890; bh=P7J7wCkGbdCVpd8rhVmHJj60h1hBJqwwaY1Op60Tc1E=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=fCIfTap4OH1+SNuDtGA0Amdtpp+emh5QnyhaZTsuLVaCVFuX9dcQ3phO2y5uxaOMH ZXj0Uaviuh9KMgBgy7brPmCgGXZlruLSf4X4VPFNeaaiom6Qioqxyg8fF7cv5mHH3e r5Dr7SNqw3opUu0Rvca+611Q2U21DYhR1NTqGafs= Date: Sat, 8 Jun 2019 18:21:27 +0200 From: Greg KH To: Gen Zhang Cc: jslaby@suse.com, nico@fluxnic.net, kilobyte@angband.pl, textshell@uchuujin.de, mpatocka@redhat.com, daniel.vetter@ffwll.ch, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3] vt: Fix a missing-check bug in con_init() Message-ID: <20190608162127.GA11699@kroah.com> References: <20190528004529.GA12388@zhanggen-UX430UQ> <20190608160138.GA3840@zhanggen-UX430UQ> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190608160138.GA3840@zhanggen-UX430UQ> User-Agent: Mutt/1.12.0 (2019-05-25) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jun 09, 2019 at 12:01:38AM +0800, Gen Zhang wrote: > On Tue, May 28, 2019 at 08:45:29AM +0800, Gen Zhang wrote: > > In function con_init(), the pointer variable vc_cons[currcons].d, vc and > > vc->vc_screenbuf is allocated by kzalloc(). And they are used in the > > following codes. However, kzalloc() returns NULL when fails, and null > > pointer dereference may happen. And it will cause the kernel to crash. > > Therefore, we should check the return value and handle the error. > > > > Further, since the allcoation is in a loop, we should free all the > > allocated memory in a loop. > > > > Signed-off-by: Gen Zhang > > Reviewed-by: Nicolas Pitre > > --- > > diff --git a/drivers/tty/vt/vt.c b/drivers/tty/vt/vt.c > > index fdd12f8..d50f68f 100644 > > --- a/drivers/tty/vt/vt.c > > +++ b/drivers/tty/vt/vt.c > > @@ -3350,10 +3350,14 @@ static int __init con_init(void) > > > > for (currcons = 0; currcons < MIN_NR_CONSOLES; currcons++) { > > vc_cons[currcons].d = vc = kzalloc(sizeof(struct vc_data), GFP_NOWAIT); > > + if (!vc) > > + goto fail1; > > INIT_WORK(&vc_cons[currcons].SAK_work, vc_SAK); > > tty_port_init(&vc->port); > > visual_init(vc, currcons, 1); > > vc->vc_screenbuf = kzalloc(vc->vc_screenbuf_size, GFP_NOWAIT); > > + if (!vc->vc_screenbuf) > > + goto fail2; > > vc_init(vc, vc->vc_rows, vc->vc_cols, > > currcons || !vc->vc_sw->con_save_screen); > > } > > @@ -3375,6 +3379,16 @@ static int __init con_init(void) > > register_console(&vt_console_driver); > > #endif > > return 0; > > +fail1: > > + while (currcons > 0) { > > + currcons--; > > + kfree(vc_cons[currcons].d->vc_screenbuf); > > +fail2: > > + kfree(vc_cons[currcons].d); > > + vc_cons[currcons].d = NULL; > > + } > > + console_unlock(); > > + return -ENOMEM; > > } > > console_initcall(con_init); > > > > --- > Can anyone look into this patch? It's already reviewed by Nicolas Pitre > . It's in my queue. But note, given the previous history of your patches, it's really low on my piority list at the moment :( greg k-h