From: Junjie Cao Date: Thu, 14 Aug 2025 06:06:05 +0000 (+0800) Subject: lkdtm: fortify: Fix potential NULL dereference on kmalloc failure X-Git-Tag: v6.18-rc1~214^2~7 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=01c7344e21c2140e72282d9d16d79a61f840fc20;p=thirdparty%2Fkernel%2Fstable.git lkdtm: fortify: Fix potential NULL dereference on kmalloc failure Add missing NULL pointer checks after kmalloc() calls in lkdtm_FORTIFY_STR_MEMBER() and lkdtm_FORTIFY_MEM_MEMBER() functions. Signed-off-by: Junjie Cao Link: https://lore.kernel.org/r/20250814060605.5264-1-junjie.cao@intel.com Signed-off-by: Kees Cook --- diff --git a/drivers/misc/lkdtm/fortify.c b/drivers/misc/lkdtm/fortify.c index 0159276656780..00ed2147113e6 100644 --- a/drivers/misc/lkdtm/fortify.c +++ b/drivers/misc/lkdtm/fortify.c @@ -44,6 +44,9 @@ static void lkdtm_FORTIFY_STR_MEMBER(void) char *src; src = kmalloc(size, GFP_KERNEL); + if (!src) + return; + strscpy(src, "over ten bytes", size); size = strlen(src) + 1; @@ -109,6 +112,9 @@ static void lkdtm_FORTIFY_MEM_MEMBER(void) char *src; src = kmalloc(size, GFP_KERNEL); + if (!src) + return; + strscpy(src, "over ten bytes", size); size = strlen(src) + 1;