diff options
author | John Zhao <john.zhao@intel.com> | 2019-05-28 16:48:14 -0700 |
---|---|---|
committer | Felix Held <felix-coreboot@felixheld.de> | 2019-06-05 11:43:39 +0000 |
commit | 2ba303e49d03b3e0a77a6b2adde07e38a3aa5c1a (patch) | |
tree | 1f9adeadc87fb2c9a1b9917c638c57a53b4180a1 /src/mainboard/google/rambi | |
parent | 742df5ad34c0ad4d2bae2373ace6440c4cb6b792 (diff) |
src/arch/x86: Prevent attack on null pointer dereference
Clang Static Analyzer version 8.0.0 detects null pointer argument
in call to memory copy function. Add sanity check for pointer header
to prevent null pointer dereference.
TEST=Built and boot up to kernel.
Change-Id: I7027b7cae3009a5481048bfa0536a6cbd9bef683
Signed-off-by: John Zhao <john.zhao@intel.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/33051
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Lance Zhao <lance.zhao@gmail.com>
Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
Diffstat (limited to 'src/mainboard/google/rambi')
0 files changed, 0 insertions, 0 deletions