* [PATCH] staging: ks7010: Add null pointer check for skb
@ 2018-09-27 15:05 Aymen Qader
2018-09-27 15:09 ` [PATCH v2] " Aymen Qader
0 siblings, 1 reply; 2+ messages in thread
From: Aymen Qader @ 2018-09-27 15:05 UTC (permalink / raw)
Cc: Wolfram Sang, Aymen Qader, Greg Kroah-Hartman, devel, linux-kernel
Add a null pointer check for the socket buffer in ks_hostif.c to avoid a
possible null pointer deference.
Signed-off-by: Aymen Qader <qader.aymen@gmail.com>
---
drivers/staging/ks7010/ks_hostif.c | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/drivers/staging/ks7010/ks_hostif.c b/drivers/staging/ks7010/ks_hostif.c
index 0e554e3359b5..4a5bc7858ef7 100644
--- a/drivers/staging/ks7010/ks_hostif.c
+++ b/drivers/staging/ks7010/ks_hostif.c
@@ -1011,6 +1011,11 @@ int hostif_data_request(struct ks_wlan_private *priv, struct sk_buff *skb)
size_t size;
int ret;
+ if(!skb) {
+ ret = -ENOMEM;
+ goto err_kfree;
+ }
+
skb_len = skb->len;
if (skb_len > ETH_FRAME_LEN) {
netdev_err(priv->net_dev, "bad length skb_len=%d\n", skb_len);
--
2.17.1
^ permalink raw reply related [flat|nested] 2+ messages in thread
* [PATCH v2] staging: ks7010: Add null pointer check for skb
2018-09-27 15:05 [PATCH] staging: ks7010: Add null pointer check for skb Aymen Qader
@ 2018-09-27 15:09 ` Aymen Qader
0 siblings, 0 replies; 2+ messages in thread
From: Aymen Qader @ 2018-09-27 15:09 UTC (permalink / raw)
Cc: Wolfram Sang, Aymen Qader, Greg Kroah-Hartman, devel, linux-kernel
Add a null pointer check for the socket buffer in ks_hostif.c to avoid a
possible null pointer deference, and remove a later now-redundant null
pointer check.
Signed-off-by: Aymen Qader <qader.aymen@gmail.com>
---
v2: Remove redundant pointer check
drivers/staging/ks7010/ks_hostif.c | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/drivers/staging/ks7010/ks_hostif.c b/drivers/staging/ks7010/ks_hostif.c
index 0e554e3359b5..fdfee760a54f 100644
--- a/drivers/staging/ks7010/ks_hostif.c
+++ b/drivers/staging/ks7010/ks_hostif.c
@@ -1011,6 +1011,11 @@ int hostif_data_request(struct ks_wlan_private *priv, struct sk_buff *skb)
size_t size;
int ret;
+ if(!skb) {
+ ret = -ENOMEM;
+ goto err_kfree;
+ }
+
skb_len = skb->len;
if (skb_len > ETH_FRAME_LEN) {
netdev_err(priv->net_dev, "bad length skb_len=%d\n", skb_len);
@@ -1023,7 +1028,6 @@ int hostif_data_request(struct ks_wlan_private *priv, struct sk_buff *skb)
priv->wpa.mic_failure.stop) {
if (netif_queue_stopped(priv->net_dev))
netif_wake_queue(priv->net_dev);
- if (skb)
dev_kfree_skb(skb);
return 0;
--
2.17.1
^ permalink raw reply related [flat|nested] 2+ messages in thread
end of thread, other threads:[~2018-09-27 15:09 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-09-27 15:05 [PATCH] staging: ks7010: Add null pointer check for skb Aymen Qader
2018-09-27 15:09 ` [PATCH v2] " Aymen Qader
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.