Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp499828ybh; Wed, 18 Mar 2020 04:01:48 -0700 (PDT) X-Google-Smtp-Source: ADFU+vt6Ad44fHDHNgnhzxlUQEO1KR511wyrccf+bDphfjwaEfZ9JQEBLdZmD9DH14iwQS8fz518 X-Received: by 2002:a9d:c69:: with SMTP id 96mr3477711otr.77.1584529307984; Wed, 18 Mar 2020 04:01:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584529307; cv=none; d=google.com; s=arc-20160816; b=ohBt125zFlXnH46zaYm5LoqHFCkroceCrlULqfRgc0oL9mCgQiwdjZl5B2qqIfhmQz bV6shLTtMqccQLhMkDvyE6NXcGqiMKwEiKCIN1vRfl/hmkM8FXqpWk/I4xFRI3SXOrYj UBr5Ox892KeIvMW6v6at5aZKf7wAgC7g354gFGp8vddHVpL9TMe4jFNWZPdkh9vWzT+U F/88h2OJ+pp5DzazJlWpzsQRx3VWRmdk0+83UgHoiy3sgEf/u+cowFEp8ypULl14o+1Q AS+B67iWiQ5JjFhy3OtiiAnNfWYEIIQ4ehJwzxvPVoGSILrQrAQXvbok4q0bJUXZ/fyD lRoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=8hg2skaFeBi3KZbtLtGGSo/yodfbxIR//v7I9eoofLo=; b=DL1QAXdpQ28YUd1tWQdEBWjSBppbV4omXSCsffSagpKBm3AXru6Qv2d2XJv+4D0cJK ZKfamHXZoJLaL4aO2yewJJDcJ1++AIooDYm7aTHr38zD1opSeHd1cr6ctAAeKSBwMDA9 Nb2krFOQDqUonoZCd2sBUiMcm5FrRC88Bz61cSBWaUCgqWhAhDnsxTWRCD3mAOn5KV68 BjgzOkDhtijyUSd+s90784My47QB2Q3a+F+lKyCjnRcGqXVeR97rbkrZLOfpSccRLiZH TVIvhjiLF6jbqghiyMiCByaHhWlnK7K0BoadpitrEIsQkCZ/xmXYqO0mhNsVsDtIsV4S GpZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QwvR6Opw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v9si3197539oig.174.2020.03.18.04.01.35; Wed, 18 Mar 2020 04:01:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QwvR6Opw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727113AbgCRLBL (ORCPT + 99 others); Wed, 18 Mar 2020 07:01:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:47588 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726550AbgCRLBL (ORCPT ); Wed, 18 Mar 2020 07:01:11 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6B8B42076D; Wed, 18 Mar 2020 11:01:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1584529270; bh=M8URaHMyLbOAuXYgTHwd0O8zOnmlQoi9wjYDbhAlz30=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=QwvR6OpwEeUWcjwMeYQZiyEmBLKi4CCnoeD3n0R/6HoPfpigLoZRIw5RA0jLBnorN XTdG5fo+Kjy8ETKhQZuZzuhgchcq9iPlf9NVcbCXFCIL5jeOTrcWRL2LCr3i4Qcs/s gN/OnsWSidwGOuiNMzDFmNgZv9qXNN4B1wiQlstw= Date: Wed, 18 Mar 2020 12:01:08 +0100 From: Greg Kroah-Hartman To: Xiyu Yang Cc: Arnd Bergmann , Vishnu DASA , Xin Tan , Allison Randal , Thomas Gleixner , linux-kernel@vger.kernel.org, yuanxzhang@fudan.edu.cn, kjlu@umn.edu Subject: Re: [PATCH] VMCI: Fix potential NULL pointer dereference when acquire a lock Message-ID: <20200318110108.GA2305113@kroah.com> References: <1584376610-11979-1-git-send-email-xiyuyang19@fudan.edu.cn> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1584376610-11979-1-git-send-email-xiyuyang19@fudan.edu.cn> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 17, 2020 at 12:36:47AM +0800, Xiyu Yang wrote: > A NULL pointer can be returned by vmci_ctx_get(). Thus add a > corresponding check so that a NULL pointer dereference will > be avoided when acquire a lock in spin_lock. > > Signed-off-by: Xiyu Yang > Signed-off-by: Xin Tan > --- > drivers/misc/vmw_vmci/vmci_context.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/drivers/misc/vmw_vmci/vmci_context.c b/drivers/misc/vmw_vmci/vmci_context.c > index 16695366ec92..a20878fba374 100644 > --- a/drivers/misc/vmw_vmci/vmci_context.c > +++ b/drivers/misc/vmw_vmci/vmci_context.c > @@ -898,6 +898,8 @@ void vmci_ctx_rcv_notifications_release(u32 context_id, > bool success) > { > struct vmci_ctx *context = vmci_ctx_get(context_id); > + if (context == NULL) > + return; But, if you look at the code, context_id is guaranteed to point to a valid context, right? Or can this somehow get dropped between the last "get" and this one? Anyway, the coding style is wrong here, always run checkpatch.pl on your patches please. thanks, greg k-h