diff options
| author | Junjie Cao <junjie.cao@intel.com> | 2025-08-14 14:06:05 +0800 |
|---|---|---|
| committer | Kees Cook <kees@kernel.org> | 2025-09-08 20:15:36 -0700 |
| commit | 01c7344e21c2140e72282d9d16d79a61f840fc20 (patch) | |
| tree | 7da28576a7e86810f4f1d982643a408ff85300f2 | |
| parent | c17b750b3ad9f45f2b6f7e6f7f4679844244f0b9 (diff) | |
lkdtm: fortify: Fix potential NULL dereference on kmalloc failure
Add missing NULL pointer checks after kmalloc() calls in
lkdtm_FORTIFY_STR_MEMBER() and lkdtm_FORTIFY_MEM_MEMBER() functions.
Signed-off-by: Junjie Cao <junjie.cao@intel.com>
Link: https://lore.kernel.org/r/20250814060605.5264-1-junjie.cao@intel.com
Signed-off-by: Kees Cook <kees@kernel.org>
| -rw-r--r-- | drivers/misc/lkdtm/fortify.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/drivers/misc/lkdtm/fortify.c b/drivers/misc/lkdtm/fortify.c index 015927665678..00ed2147113e 100644 --- a/drivers/misc/lkdtm/fortify.c +++ b/drivers/misc/lkdtm/fortify.c @@ -44,6 +44,9 @@ static void lkdtm_FORTIFY_STR_MEMBER(void) char *src; src = kmalloc(size, GFP_KERNEL); + if (!src) + return; + strscpy(src, "over ten bytes", size); size = strlen(src) + 1; @@ -109,6 +112,9 @@ static void lkdtm_FORTIFY_MEM_MEMBER(void) char *src; src = kmalloc(size, GFP_KERNEL); + if (!src) + return; + strscpy(src, "over ten bytes", size); size = strlen(src) + 1; |
