Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp681121ybh; Tue, 10 Mar 2020 06:22:50 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvamuYidI4C9KwbFwRFGS2ykiXEfMY/sR1xfzMSLLgxiCN7aZ6iIBzXeW6SmFSnNjTKky8s X-Received: by 2002:a9d:6c0b:: with SMTP id f11mr10528769otq.182.1583846570359; Tue, 10 Mar 2020 06:22:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583846570; cv=none; d=google.com; s=arc-20160816; b=sFJXNVGOE+jM5PPkgob2EiBKbhUm5aqEtxm6U4W8FwUoo4rC+UGupIoceXKsj6L+oP NVJRBNGoq+fa1PZFx+End4HaDJr/J9GIOb2K1OUBCt6vp+y7S0b6ywBIit29Dt+tLiv6 SoMhMONeRzK6lzqzj6+witsuxkF5ggdnmlK5X20Wo2l0St7p8c+ON8/+y2a9awpEkhDx 6X8QGk2xXXl4orTql8Y+A42xYNBufmhhojbbh5vt6KXTlIcjVquafzw57EXZJDlfPcGw jH1e4DcdNT4YMO4DVyWhoEh7xVLsV6GmCdRDU3803K6RFO5/sekT/j7okhBP8NK+DuS2 3ulA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=fiIKOuORB3zENGOCXQ74a42gZrl0JoTLkjLR+WbRNBc=; b=lFg73bcNRMgSSMdw/gPS02n7HSqgBPVY8XkALb7noYvlBLTuWCDDt+x1DEACaLNuk/ m77c3uW7tf6NvKTeXTDF4+gjOwKTMvNKsu3dFC6sCmiJlMtA+NgLIs7yTnGE4rZ9vmjq VN1GKOAeGcV3D1n8rvKx9Ye59Hxkla/j7J20DIEjZ9VrL3UzT6skWGPVrT09YE7IIPSP LnzaZx/dlQtq0f9K9LXEEcXbH2hc5QXLd7IH0IGlEtClvGQIfP8wsE142HHOfNjetkNT SZ1R5z8pu2W2OS2tDBJo7qknxX8YGAFvRLv1rqRQU1i7vukr/mwptED9N84UzgAepIBD e7jQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nXOGxE2I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m11si7430737otl.297.2020.03.10.06.22.37; Tue, 10 Mar 2020 06:22:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nXOGxE2I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730403AbgCJNF7 (ORCPT + 99 others); Tue, 10 Mar 2020 09:05:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:51092 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730607AbgCJNFq (ORCPT ); Tue, 10 Mar 2020 09:05:46 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 110D3208E4; Tue, 10 Mar 2020 13:05:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583845545; bh=YtPBR0nkaVCMtqMjv17lPUpNC7kM+qkgKQDoZjkHLQg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nXOGxE2I6ByKvTV4B9xbh1n6X5X7mLxdkUfbc0d02UK63nPQo4vGXkoyF4cULLfkj WF5pxFY08jaqgRmI7YXYa+F3VNkgm7ePwQNrevDZ40QQSHXOdzoUqep5NYimJupctv k8esjvov/Z+2RUFVyOWzgLtpgbwGvhzy8I0sO8AA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, kbuild test robot , Corey Minyard , Sasha Levin Subject: [PATCH 4.14 006/126] ipmi:ssif: Handle a possible NULL pointer reference Date: Tue, 10 Mar 2020 13:40:27 +0100 Message-Id: <20200310124204.266551658@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200310124203.704193207@linuxfoundation.org> References: <20200310124203.704193207@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Corey Minyard [ Upstream commit 6b8526d3abc02c08a2f888e8c20b7ac9e5776dfe ] In error cases a NULL can be passed to memcpy. The length will always be zero, so it doesn't really matter, but go ahead and check for NULL, anyway, to be more precise and avoid static analysis errors. Reported-by: kbuild test robot Signed-off-by: Corey Minyard Signed-off-by: Sasha Levin --- drivers/char/ipmi/ipmi_ssif.c | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/drivers/char/ipmi/ipmi_ssif.c b/drivers/char/ipmi/ipmi_ssif.c index 941bffd9b49cd..0146bc3252c5a 100644 --- a/drivers/char/ipmi/ipmi_ssif.c +++ b/drivers/char/ipmi/ipmi_ssif.c @@ -750,10 +750,14 @@ static void msg_done_handler(struct ssif_info *ssif_info, int result, flags = ipmi_ssif_lock_cond(ssif_info, &oflags); msg = ssif_info->curr_msg; if (msg) { + if (data) { + if (len > IPMI_MAX_MSG_LENGTH) + len = IPMI_MAX_MSG_LENGTH; + memcpy(msg->rsp, data, len); + } else { + len = 0; + } msg->rsp_size = len; - if (msg->rsp_size > IPMI_MAX_MSG_LENGTH) - msg->rsp_size = IPMI_MAX_MSG_LENGTH; - memcpy(msg->rsp, data, msg->rsp_size); ssif_info->curr_msg = NULL; } -- 2.20.1