ACK [PATCH 1/3] UBUNTU: SAUCE: opennsl: bcm-knet: check for null sinfo to avoid a null pointer dereference

Juerg Haefliger juerg.haefliger at canonical.com
Thu Sep 21 05:59:15 UTC 2017



On 09/20/2017 12:27 PM, Colin King wrote:
> From: Colin Ian King <colin.king at canonical.com>
> 
> BugLink: https://launchpad.net/bugs/1718388
> 
> sinfo can potentially be null, so add a null check to avoid a null
> pointer deference on sinfo->info_id.
> 
> Detected by CoverityScan CID#1456902 ("Dereference before null check")
> 
> Signed-off-by: Colin Ian King <colin.king at canonical.com>
> ---
>  .../systems/linux/kernel/modules/bcm-knet/bcm-knet.c                   | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
> 
> diff --git a/ubuntu/opennsl/OpenNSL/sdk-6.4.10-gpl-modules/systems/linux/kernel/modules/bcm-knet/bcm-knet.c b/ubuntu/opennsl/OpenNSL/sdk-6.4.10-gpl-modules/systems/linux/kernel/modules/bcm-knet/bcm-knet.c
> index 9dc94b3..9aed5dc 100644
> --- a/ubuntu/opennsl/OpenNSL/sdk-6.4.10-gpl-modules/systems/linux/kernel/modules/bcm-knet/bcm-knet.c
> +++ b/ubuntu/opennsl/OpenNSL/sdk-6.4.10-gpl-modules/systems/linux/kernel/modules/bcm-knet/bcm-knet.c
> @@ -5605,7 +5605,8 @@ bkn_get_next_dma_event(kcom_msg_dma_info_t *kmsg)
>              sinfo = bkn_sinfo_from_unit(dev_no);
>          }
>  
> -        if ((sinfo->inst_id != 0) && ((sinfo->inst_id & (1 << dev_evt)) == 0)){
> +        if (sinfo && (sinfo->inst_id != 0) &&
> +	    ((sinfo->inst_id & (1 << dev_evt)) == 0)) {
>              DBG_INST((" %s skip dev(%d)\n",__FUNCTION__,dev_evt));
>              continue;
>          }
> 

Acked-by: Juerg Haefliger <juerg.haefliger at canonical.com>




More information about the kernel-team mailing list