Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp518426pxy; Fri, 30 Apr 2021 10:07:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyEswSOeg5Y45FPw8jzW9WYWvprwXPdiRM9GEoztU1NHVMozPdINGZu9nbBKEifo3Wfeg1q X-Received: by 2002:a5d:678d:: with SMTP id v13mr8290887wru.85.1619802457689; Fri, 30 Apr 2021 10:07:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619802457; cv=none; d=google.com; s=arc-20160816; b=WVFh85KQW9gU2RF7p6MJbKXVTBXkS+gRGLe2kyUHFRBcxi+WCMQxtOl8ApEfR6otb3 Yfstn5ohjwNALCsjBO/eImJixvX7xTnk0oYnMvZAa200P1JAyq4XC+W4Hn+fDAabdtFm iTdDu3vdPvVAnAW1ujyhHoL6/q1APCxmWeIxVsFQFyMA/yl7XaqGm++xN/75dVoSaOFu Ld4xaDjY+DSUtIrc4uv5uMovmUmouvMuWM42md01qLfIyFhChsgQGBZiduEs+/OwJorc 3l+sTBsdB0pFRzX76e+sLYuTG9iIEkYhU0AjuApciXO+wTazlRfGbfllCQ2EzA0/Ol5D IJLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=Z8kFvpjiVgYsI0Kmr1FzJ0a+tsXGSZR3/ky0I+eumuM=; b=ppHlYoVIyW4cB3DPhNaQKS5+sxLX2kpc9JF5tQXg0EjV1OIMFeugu0C7XLQlkLLaQM 1sxQZsFHuE6ehsw55Mz2yKMq//ziSSw7azlmjhl5Q3u2Y7zXOMz9TVshgL+Kj+N+b9Yh HvBA0uWN+KY17wiTrC3Q9X99YQtkGkHdVadZojDGiuKp5HN8bXxUYSKOJejwdnTzYazE Rp3sglMW0ZfUtVHrP2e/sxWOsE0k/5p5tWTrpttbGXRjLjcO2b5rWV2og6O6hsk+TYTT 18nXwI3ar/w+/34Ee2/f4hP3yzheimYje2bIGK+AaNHK3PheRomdJHBt1LUSK+jTGAFo 7TSg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q25si2266179edt.39.2021.04.30.10.07.13; Fri, 30 Apr 2021 10:07:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230475AbhD3REQ (ORCPT + 99 others); Fri, 30 Apr 2021 13:04:16 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:38233 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229750AbhD3REP (ORCPT ); Fri, 30 Apr 2021 13:04:15 -0400 Received: from 1.general.cking.uk.vpn ([10.172.193.212] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1lcWXf-0001yL-Cp; Fri, 30 Apr 2021 17:03:03 +0000 From: Colin King To: Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H . Peter Anvin" , Nathan Tempelman , kvm@vger.kernel.org Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH][next] KVM: x86: Fix potential fput on a null source_kvm_file Date: Fri, 30 Apr 2021 18:03:03 +0100 Message-Id: <20210430170303.131924-1-colin.king@canonical.com> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King The fget can potentially return null, so the fput on the error return path can cause a null pointer dereference. Fix this by checking for a null source_kvm_file before doing a fput. Addresses-Coverity: ("Dereference null return") Fixes: 54526d1fd593 ("KVM: x86: Support KVM VMs sharing SEV context") Signed-off-by: Colin Ian King --- arch/x86/kvm/svm/sev.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/x86/kvm/svm/sev.c b/arch/x86/kvm/svm/sev.c index 1356ee095cd5..8b11c711a0e4 100644 --- a/arch/x86/kvm/svm/sev.c +++ b/arch/x86/kvm/svm/sev.c @@ -1764,7 +1764,8 @@ int svm_vm_copy_asid_from(struct kvm *kvm, unsigned int source_fd) e_source_unlock: mutex_unlock(&source_kvm->lock); e_source_put: - fput(source_kvm_file); + if (source_kvm_file) + fput(source_kvm_file); return ret; } -- 2.30.2