From: "J. Bruce Fields" <bfie...@redhat.com>

If we ignore the error we'll hit a null dereference a little later.

Reported-by: syzbot+4b98281f2401ab849...@syzkaller.appspotmail.com
Signed-off-by: J. Bruce Fields <bfie...@redhat.com>
---
 net/sunrpc/rpcb_clnt.c | 8 ++++++++
 1 file changed, 8 insertions(+)

diff --git a/net/sunrpc/rpcb_clnt.c b/net/sunrpc/rpcb_clnt.c
index c526f8fb37c9..82c120e51d64 100644
--- a/net/sunrpc/rpcb_clnt.c
+++ b/net/sunrpc/rpcb_clnt.c
@@ -771,6 +771,12 @@ void rpcb_getport_async(struct rpc_task *task)
        case RPCBVERS_3:
                map->r_netid = xprt->address_strings[RPC_DISPLAY_NETID];
                map->r_addr = rpc_sockaddr2uaddr(sap, GFP_ATOMIC);
+               if (!map->r_addr) {
+                       status = -ENOMEM;
+                       dprintk("RPC: %5u %s: no memory available\n",
+                               task->tk_pid, __func__);
+                       goto bailout_free_args;
+               }
                map->r_owner = "";
                break;
        case RPCBVERS_2:
@@ -793,6 +799,8 @@ void rpcb_getport_async(struct rpc_task *task)
        rpc_put_task(child);
        return;
 
+bailout_free_args:
+       kfree(map);
 bailout_release_client:
        rpc_release_client(rpcb_clnt);
 bailout_nofree:
-- 
2.17.0

Reply via email to