[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20180927150934.17207-1-qader.aymen@gmail.com>
Date: Thu, 27 Sep 2018 16:09:34 +0100
From: Aymen Qader <qader.aymen@...il.com>
To: unlisted-recipients:; (no To-header on input)
Cc: Wolfram Sang <wsa@...-dreams.de>,
Aymen Qader <qader.aymen@...il.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
devel@...verdev.osuosl.org, linux-kernel@...r.kernel.org
Subject: [PATCH v2] staging: ks7010: Add null pointer check for skb
Add a null pointer check for the socket buffer in ks_hostif.c to avoid a
possible null pointer deference, and remove a later now-redundant null
pointer check.
Signed-off-by: Aymen Qader <qader.aymen@...il.com>
---
v2: Remove redundant pointer check
drivers/staging/ks7010/ks_hostif.c | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/drivers/staging/ks7010/ks_hostif.c b/drivers/staging/ks7010/ks_hostif.c
index 0e554e3359b5..fdfee760a54f 100644
--- a/drivers/staging/ks7010/ks_hostif.c
+++ b/drivers/staging/ks7010/ks_hostif.c
@@ -1011,6 +1011,11 @@ int hostif_data_request(struct ks_wlan_private *priv, struct sk_buff *skb)
size_t size;
int ret;
+ if(!skb) {
+ ret = -ENOMEM;
+ goto err_kfree;
+ }
+
skb_len = skb->len;
if (skb_len > ETH_FRAME_LEN) {
netdev_err(priv->net_dev, "bad length skb_len=%d\n", skb_len);
@@ -1023,7 +1028,6 @@ int hostif_data_request(struct ks_wlan_private *priv, struct sk_buff *skb)
priv->wpa.mic_failure.stop) {
if (netif_queue_stopped(priv->net_dev))
netif_wake_queue(priv->net_dev);
- if (skb)
dev_kfree_skb(skb);
return 0;
--
2.17.1
Powered by blists - more mailing lists