From nobody Sat Oct 4 17:30:15 2025 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EEF981BCA0E for ; Thu, 14 Aug 2025 06:06:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.8 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755151587; cv=none; b=Af3JVdzeZgilPPFXbir5OsliWIYnAReu70J/GDr1+dW8s90+W6OGzXDEWIO/6zIWYq6+fgvmK28WU7KiWYQ2vk5Ob6W1ZEGxwcUtFAF1wZi7zcWJbvzTiqkKzQcoT1gRp9yOQLuEHMGfNr2Q1JRpOzrmdjcAeumkFIe7h8qX2WI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1755151587; c=relaxed/simple; bh=JuVy2DkCmG2B2BgRQdaH/IlofMa6+gNOQGrReSzMNvU=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=pJU0DqshvzfC2lrf3K+EiIEVjb+036kfifVifLEHGllybsSJmOTZmM7aM9hMmtDUJqBsGQrpobO3oQPjTv5Nwr0j8xUnsu1dyNnzaa1/LCTaaR5iN22O1oz4OpCHgPsB1iJ1tw2w8shUo+bHoaxifngzpWzU0Kql5KHo/lix05I= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=GH5H8SnS; arc=none smtp.client-ip=192.198.163.8 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="GH5H8SnS" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1755151586; x=1786687586; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=JuVy2DkCmG2B2BgRQdaH/IlofMa6+gNOQGrReSzMNvU=; b=GH5H8SnSG0XNDvJy/Ww9gIrN0aQuuwao/THIZ5kwBXAdgmcuqNF112GN exOn9pwKeG07bll0j7LVZf4ItEbrp3b1znQwfw/zK86ihzKSXUCprGITR EX1yxuu4I4ekdqlel7Mi7c1WGDs9Yfm12ONUdsQqwrKldo5rCpd0LHl9X W1blLtxJ87BWIBHHmm8f3TE6zbkGttgB2OqGN/oPLuNoIkuLGb+VEkKX4 OQx9WlNdqwcLoVdgBeT7T6Y9UvPn8poDqP5FoFUCcqV99J6qI7igtRuqG NjVvYt/EBgGD13TQPZDof+vSC4Ml9eHOFLQEMNY1LUcKNuVylo1Hxmxez w==; X-CSE-ConnectionGUID: 0pC/k0KqTHCstoqR3oqEpw== X-CSE-MsgGUID: CuNar7kuSTa0WQtLsgr8mw== X-IronPort-AV: E=McAfee;i="6800,10657,11520"; a="75030876" X-IronPort-AV: E=Sophos;i="6.17,287,1747724400"; d="scan'208";a="75030876" Received: from orviesa001.jf.intel.com ([10.64.159.141]) by fmvoesa102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Aug 2025 23:06:25 -0700 X-CSE-ConnectionGUID: 8WLOKHulSQqEW63NL1ds7A== X-CSE-MsgGUID: HmKqnN+mTRmnP7P66Yb6aA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.17,287,1747724400"; d="scan'208";a="203862579" Received: from junjie-nuc.bj.intel.com ([10.238.156.159]) by smtpauth.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Aug 2025 23:06:23 -0700 From: Junjie Cao To: Kees Cook Cc: Arnd Bergmann , Greg Kroah-Hartman , linux-kernel@vger.kernel.org, Junjie Cao Subject: [PATCH] lkdtm: fortify: Fix potential NULL dereference on kmalloc failure Date: Thu, 14 Aug 2025 14:06:05 +0800 Message-ID: <20250814060605.5264-1-junjie.cao@intel.com> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add missing NULL pointer checks after kmalloc() calls in lkdtm_FORTIFY_STR_MEMBER() and lkdtm_FORTIFY_MEM_MEMBER() functions. Signed-off-by: Junjie Cao --- drivers/misc/lkdtm/fortify.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/drivers/misc/lkdtm/fortify.c b/drivers/misc/lkdtm/fortify.c index 015927665678..715598226037 100644 --- a/drivers/misc/lkdtm/fortify.c +++ b/drivers/misc/lkdtm/fortify.c @@ -44,6 +44,10 @@ static void lkdtm_FORTIFY_STR_MEMBER(void) char *src; =20 src =3D kmalloc(size, GFP_KERNEL); + + if (src =3D=3D NULL) + return; + strscpy(src, "over ten bytes", size); size =3D strlen(src) + 1; =20 @@ -109,6 +113,10 @@ static void lkdtm_FORTIFY_MEM_MEMBER(void) char *src; =20 src =3D kmalloc(size, GFP_KERNEL); + + if (src =3D=3D NULL) + return; + strscpy(src, "over ten bytes", size); size =3D strlen(src) + 1; =20 --=20 2.43.0