From mboxrd@z Thu Jan 1 00:00:00 1970 From: Yuanhan Liu Subject: Re: [PATCH] net/virtio-user: check value returned from malloc Date: Sat, 28 Jan 2017 21:26:21 +0800 Message-ID: <20170128132621.GB20916@yliu-dev.sh.intel.com> References: <1485399942-94705-1-git-send-email-jianfeng.tan@intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: dev@dpdk.org, john.mcnamara@intel.com To: Jianfeng Tan Return-path: Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by dpdk.org (Postfix) with ESMTP id 9EBDB98 for ; Sat, 28 Jan 2017 14:23:58 +0100 (CET) Content-Disposition: inline In-Reply-To: <1485399942-94705-1-git-send-email-jianfeng.tan@intel.com> List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" On Thu, Jan 26, 2017 at 03:05:42AM +0000, Jianfeng Tan wrote: > Value returned from malloc is not checked for errors before being used. > This patch fixes following coverity issue. > > static struct vhost_memory_kernel * > prepare_vhost_memory_kernel(void) > { > ... > vm = malloc(sizeof(struct vhost_memory_kernel) + > max_regions * > sizeof(struct vhost_memory_region)); > ... > >>> CID 140744: (NULL_RETURNS) > >>> Dereferencing a null pointer "vm". > mr = &vm->regions[k++]; > > Fixes: e3b434818bbb ("net/virtio-user: support kernel vhost") > Coverity issue: 140744 > > Signed-off-by: Jianfeng Tan Applied to dpdk-next-virtio. --yliu