A security audit revealed that several functions were not checking return value of allocation functions. These allocations may return NULL which may lead to NULL pointer dereferences and crashes or security concerns. Fix this by properly checking the return value and handling the error appropriately. Signed-off-by: Laura Abbott <lauraa@xxxxxxxxxxxxxx> --- fs/buffer.c | 17 +++++++++++------ 1 files changed, 11 insertions(+), 6 deletions(-) diff --git a/fs/buffer.c b/fs/buffer.c index 4d74335..b53f863 100644 --- a/fs/buffer.c +++ b/fs/buffer.c @@ -1561,6 +1561,9 @@ void create_empty_buffers(struct page *page, struct buffer_head *bh, *head, *tail; head = alloc_page_buffers(page, blocksize, 1); + if (head == NULL) + return; + bh = head; do { bh->b_state |= b_state; @@ -3008,16 +3011,18 @@ int _submit_bh(int rw, struct buffer_head *bh, unsigned long bio_flags) BUG_ON(buffer_unwritten(bh)); /* - * Only clear out a write error when rewriting - */ - if (test_set_buffer_req(bh) && (rw & WRITE)) - clear_buffer_write_io_error(bh); - - /* * from here on down, it's all bio -- do the initial mapping, * submit_bio -> generic_make_request may further map this bio around */ bio = bio_alloc(GFP_NOIO, 1); + if (bio == NULL) + return -ENOMEM; + + /* + * Only clear out a write error when rewriting + */ + if (test_set_buffer_req(bh) && (rw & WRITE)) + clear_buffer_write_io_error(bh); bio->bi_sector = bh->b_blocknr * (bh->b_size >> 9); bio->bi_bdev = bh->b_bdev; -- The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, hosted by The Linux Foundation -- To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html