Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp330434pxu; Wed, 25 Nov 2020 04:28:04 -0800 (PST) X-Google-Smtp-Source: ABdhPJxWmadF8rp/dJ+Med0q2VtL56ul/d6xbMumaY+Sa4HrZXA9Q2oKzFUMrpTN+Lj8UyBiHYU0 X-Received: by 2002:a05:6402:c95:: with SMTP id cm21mr3173528edb.372.1606307283785; Wed, 25 Nov 2020 04:28:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606307283; cv=none; d=google.com; s=arc-20160816; b=YTiIEu4DPQ/pnKpwdgamjcuGdkIFdWuRmqDtSSg/poPU/OL8GS9mWdfu68Ujxw9kKQ YmL+6sjRFY/E1E3jYmTjOjS4HVDXD0P9/9i6ozL+sdDcCRC/lCJJObwqE9vi8/sUhz33 4WDDAaRwuB6urYT/t5/nx2yTLKYZQRMVv3BhJmf0/jNbIvgmq/0lbCK8+XUl3H5I7z12 sX8tsHEVlOaIJSUOaaCfwxzRlc+heLLXeFFuwwQ8ayiOkKSmXRaliTJpGhnVvriLyZ5V Uj01HCmHdw5paABu+5scawKC5SEJtO97A2grg+wKdpCvIEbwrqyO9hqC6kes1n+FNiPT j1Tg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=v1MntOQThEdAo1Ml1j1udV8f7de62Q8PH1pV8RKe5Ao=; b=IJTHHZ3Mr8sTnb/MqQnp99/tGrsNzZ04QX1UNaHKAdhgnIj3zWx4nLd00u805/GPKZ aCsOhCs56u/SEcygKaX7PPMICAhdFL8c1q+H7/SSQSydI14Wxeay8W99u14D+RBCGSK/ U4duP0Q0OHdLim3qvyLEBbbY+h0qZ2o5ELq0taTCXNBRJ2A5eAhl4Hfjav2kii9cb1Vh bJA1oPUYBtH0lCfLCfbLS1vXRnJhcbmAlYLylKMCLBqfv/poM5v5fJiAgxZ8KGBHWCfh IwKoY5ZmLyyk9cYjlRRyE0iA7s8JTFL82eadhS9WrCdV57BClFJQ4YHDSkC/Eud22iJr Tdgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v15si1063387ejx.615.2020.11.25.04.27.41; Wed, 25 Nov 2020 04:28:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729302AbgKYM0A (ORCPT + 99 others); Wed, 25 Nov 2020 07:26:00 -0500 Received: from www262.sakura.ne.jp ([202.181.97.72]:59539 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729299AbgKYMZ7 (ORCPT ); Wed, 25 Nov 2020 07:25:59 -0500 Received: from fsav402.sakura.ne.jp (fsav402.sakura.ne.jp [133.242.250.101]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 0APCPaGY003175; Wed, 25 Nov 2020 21:25:36 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav402.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav402.sakura.ne.jp); Wed, 25 Nov 2020 21:25:36 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav402.sakura.ne.jp) Received: from [192.168.1.9] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 0APCPa0Z003171 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Wed, 25 Nov 2020 21:25:36 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Subject: Re: [PATCH] tomoyo: Avoid potential null pointer access To: Zheng Zengkai Cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, jmorris@namei.org, serge@hallyn.com References: <20201125121043.107662-1-zhengzengkai@huawei.com> From: Tetsuo Handa Message-ID: Date: Wed, 25 Nov 2020 21:25:37 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0 MIME-Version: 1.0 In-Reply-To: <20201125121043.107662-1-zhengzengkai@huawei.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, Zheng. Thank you for a patch, but I won't apply this patch. Expected behavior is that tomoyo_warn_oom() is called if tomoyo_memory_ok() is called with entry == NULL. Adding __GFP_NOWARN might be OK, but returning without tomoyo_warn_oom() is NG. On 2020/11/25 21:10, Zheng Zengkai wrote: > Calls to kzalloc() should be null-checked in order to avoid > any potential failures or unnecessary code execution. > Fix this by adding null checks for _entry_ right after allocation. > > Fixes: 57c2590fb7fd ("TOMOYO: Update profile structure") > Reported-by: Hulk Robot > Signed-off-by: Zheng Zengkai Nacked-by: Tetsuo Handa > --- > security/tomoyo/common.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/security/tomoyo/common.c b/security/tomoyo/common.c > index 4bee32bfe16d..99b4fafcb100 100644 > --- a/security/tomoyo/common.c > +++ b/security/tomoyo/common.c > @@ -499,6 +499,8 @@ static struct tomoyo_profile *tomoyo_assign_profile > if (ptr) > return ptr; > entry = kzalloc(sizeof(*entry), GFP_NOFS); > + if (!entry) > + return NULL; > if (mutex_lock_interruptible(&tomoyo_policy_lock)) > goto out; > ptr = ns->profile_ptr[profile]; >