summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorColin Ian King <colin.king@canonical.com>2017-12-22 12:51:50 -0500
committerJens Wiklander <jens.wiklander@linaro.org>2017-12-28 16:20:10 -0500
commitc94f31b526fe658c25dd2d07c90486a85437f01c (patch)
tree7742a74048136041c64b869d4ea0aae6650a51b8
parent80ec6f5de60b6934f145b2f7e5369592bcab85f3 (diff)
tee: shm: don't put_page on null shm->pages
In the case that shm->pages fails to allocate, the current exit error path will try to put_page on a null shm->pages and cause a null pointer dereference when accessing shm->pages[n]. Fix this by only performing the put_page and kfree on shm->pages if it is not null. Detected by CoverityScan, CID#1463283 ("Dereference after null check") Fixes: 033ddf12bcf5 ("tee: add register user memory") Signed-off-by: Colin Ian King <colin.king@canonical.com> Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
-rw-r--r--drivers/tee/tee_shm.c8
1 files changed, 5 insertions, 3 deletions
diff --git a/drivers/tee/tee_shm.c b/drivers/tee/tee_shm.c
index 511eb298949b..6f36da9ee412 100644
--- a/drivers/tee/tee_shm.c
+++ b/drivers/tee/tee_shm.c
@@ -335,9 +335,11 @@ err:
335 idr_remove(&teedev->idr, shm->id); 335 idr_remove(&teedev->idr, shm->id);
336 mutex_unlock(&teedev->mutex); 336 mutex_unlock(&teedev->mutex);
337 } 337 }
338 for (n = 0; n < shm->num_pages; n++) 338 if (shm->pages) {
339 put_page(shm->pages[n]); 339 for (n = 0; n < shm->num_pages; n++)
340 kfree(shm->pages); 340 put_page(shm->pages[n]);
341 kfree(shm->pages);
342 }
341 } 343 }
342 kfree(shm); 344 kfree(shm);
343 teedev_ctx_put(ctx); 345 teedev_ctx_put(ctx);