Add a null pointer check for the socket buffer in ks_hostif.c to avoid a
possible null pointer deference.

Signed-off-by: Aymen Qader <qader.ay...@gmail.com>
---
 drivers/staging/ks7010/ks_hostif.c | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/drivers/staging/ks7010/ks_hostif.c 
b/drivers/staging/ks7010/ks_hostif.c
index 0e554e3359b5..4a5bc7858ef7 100644
--- a/drivers/staging/ks7010/ks_hostif.c
+++ b/drivers/staging/ks7010/ks_hostif.c
@@ -1011,6 +1011,11 @@ int hostif_data_request(struct ks_wlan_private *priv, 
struct sk_buff *skb)
        size_t size;
        int ret;
 
+       if(!skb) {
+               ret = -ENOMEM;
+               goto err_kfree;
+       }
+
        skb_len = skb->len;
        if (skb_len > ETH_FRAME_LEN) {
                netdev_err(priv->net_dev, "bad length skb_len=%d\n", skb_len);
-- 
2.17.1

_______________________________________________
devel mailing list
de...@linuxdriverproject.org
http://driverdev.linuxdriverproject.org/mailman/listinfo/driverdev-devel

Reply via email to