Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp2987913ybt; Mon, 29 Jun 2020 12:12:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwFFtdL3qfHHBkVJhg9BfspaOQMwlv1yC0+aQaGvFrszdpiyW3qCOqTWNKZScgxZmYJE1gj X-Received: by 2002:a17:906:7c3:: with SMTP id m3mr14820980ejc.30.1593457951436; Mon, 29 Jun 2020 12:12:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593457951; cv=none; d=google.com; s=arc-20160816; b=wy1J1crAlv3UEnmpDL3h2anM7BLKZmJtdOWISn73aloGg4yYfml1XadK8TO0RdDI8H h5hGLcT3do3UAzTwKHGbfgLNpaFxbwN764MWZfVYoe0TGlEkSzjx6zd55R74mUDlPDm8 yjlcSmrNCkMdHSKbhm5AdcFdDSzE4mJvLFFsDXcxsX03xN2H2gDGagYpCdM2TFot9lls xh7EoBWUYggtaiVMjEG0HTCZnSFyuDmXdZ18FtUvGo7Oqrrg89XWszlLrQ8n2ypwcIS3 ZpUZg6hD6pfU3s2F+y1xlUPBH07wcmWw6zLlVOZkfpDc4ctWOKmSFVwfbppczspW0o51 NoUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=LsB3vf6MVw2vdVbaObpkA0TxjzYE/GEEwWWmP1J9wvA=; b=pJNi6Ef43ykXRu6SZyHuc63oiBQqdnVcfuWUeSqFJzZRjo7B3b+n9ds0zsTHcg62pw p2Qyz+1H38rYFEoH92Ep5mmDk8KiMx1i9/LfNAr8taKbLYN14FV6Y+hVNFW8Ipcb+dMN dRwkqrP5YiAanKrQTTt1ZFRFLL8vehnrRhjQ4w0mvsTLZYvogsyXdrzBRpHlRacVZkUF iqafLThnqe6IAlx+OG+R1wdvthLEnToO6MIuX1pgoobtXId0sOg/iq+hBQV+BUjs6J+E IVAj4bVNt5OVqJFgkbrl3PF0IRf2IyXWGPjwQaRSvxPGTO01kdpT9Lpyv0+dgLpYbgwr FPNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gj5si300141ejb.49.2020.06.29.12.12.07; Mon, 29 Jun 2020 12:12:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730780AbgF2TMD (ORCPT + 99 others); Mon, 29 Jun 2020 15:12:03 -0400 Received: from mslow2.mail.gandi.net ([217.70.178.242]:46628 "EHLO mslow2.mail.gandi.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730529AbgF2TMC (ORCPT ); Mon, 29 Jun 2020 15:12:02 -0400 X-Greylist: delayed 1030 seconds by postgrey-1.27 at vger.kernel.org; Mon, 29 Jun 2020 15:12:01 EDT Received: from relay9-d.mail.gandi.net (unknown [217.70.183.199]) by mslow2.mail.gandi.net (Postfix) with ESMTP id D75E93AB679 for ; Mon, 29 Jun 2020 14:00:33 +0000 (UTC) X-Originating-IP: 84.44.14.226 Received: from nexussix.ar.arcelik (unknown [84.44.14.226]) (Authenticated sender: cengiz@kernel.wtf) by relay9-d.mail.gandi.net (Postfix) with ESMTPSA id 53A10FF80E; Mon, 29 Jun 2020 14:00:09 +0000 (UTC) From: Cengiz Can To: Jason Wessel , Daniel Thompson , Douglas Anderson Cc: kgdb-bugreport@lists.sourceforge.net, linux-kernel@vger.kernel.org, Sumit Garg , Petr Mladek , Andy Shevchenko , Cengiz Can Subject: [PATCH] kdb: prevent possible null deref in kdb_msg_write Date: Mon, 29 Jun 2020 16:59:24 +0300 Message-Id: <20200629135923.14912-1-cengiz@kernel.wtf> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org `kdb_msg_write` operates on a global `struct kgdb_io *` called `dbg_io_ops`. Although it is initialized in `debug_core.c`, there's a null check in `kdb_msg_write` which implies that it can be null whenever we dereference it in this function call. Coverity scanner caught this as CID 1465042. I have modified the function to bail out if `dbg_io_ops` is not properly initialized. Signed-off-by: Cengiz Can --- kernel/debug/kdb/kdb_io.c | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/kernel/debug/kdb/kdb_io.c b/kernel/debug/kdb/kdb_io.c index 683a799618ad..85e579812458 100644 --- a/kernel/debug/kdb/kdb_io.c +++ b/kernel/debug/kdb/kdb_io.c @@ -549,14 +549,15 @@ static void kdb_msg_write(const char *msg, int msg_len) if (msg_len == 0) return; - if (dbg_io_ops) { - const char *cp = msg; - int len = msg_len; + if (!dbg_io_ops) + return; - while (len--) { - dbg_io_ops->write_char(*cp); - cp++; - } + const char *cp = msg; + int len = msg_len; + + while (len--) { + dbg_io_ops->write_char(*cp); + cp++; } for_each_console(c) { -- 2.27.0