diff options
author | Colin Ian King <colin.king@canonical.com> | 2017-12-22 12:51:50 -0500 |
---|---|---|
committer | Jens Wiklander <jens.wiklander@linaro.org> | 2017-12-28 16:20:10 -0500 |
commit | c94f31b526fe658c25dd2d07c90486a85437f01c (patch) | |
tree | 7742a74048136041c64b869d4ea0aae6650a51b8 | |
parent | 80ec6f5de60b6934f145b2f7e5369592bcab85f3 (diff) |
tee: shm: don't put_page on null shm->pages
In the case that shm->pages fails to allocate, the current exit
error path will try to put_page on a null shm->pages and cause
a null pointer dereference when accessing shm->pages[n]. Fix this
by only performing the put_page and kfree on shm->pages if it
is not null.
Detected by CoverityScan, CID#1463283 ("Dereference after null check")
Fixes: 033ddf12bcf5 ("tee: add register user memory")
Signed-off-by: Colin Ian King <colin.king@canonical.com>
Signed-off-by: Jens Wiklander <jens.wiklander@linaro.org>
-rw-r--r-- | drivers/tee/tee_shm.c | 8 |
1 files changed, 5 insertions, 3 deletions
diff --git a/drivers/tee/tee_shm.c b/drivers/tee/tee_shm.c index 511eb298949b..6f36da9ee412 100644 --- a/drivers/tee/tee_shm.c +++ b/drivers/tee/tee_shm.c | |||
@@ -335,9 +335,11 @@ err: | |||
335 | idr_remove(&teedev->idr, shm->id); | 335 | idr_remove(&teedev->idr, shm->id); |
336 | mutex_unlock(&teedev->mutex); | 336 | mutex_unlock(&teedev->mutex); |
337 | } | 337 | } |
338 | for (n = 0; n < shm->num_pages; n++) | 338 | if (shm->pages) { |
339 | put_page(shm->pages[n]); | 339 | for (n = 0; n < shm->num_pages; n++) |
340 | kfree(shm->pages); | 340 | put_page(shm->pages[n]); |
341 | kfree(shm->pages); | ||
342 | } | ||
341 | } | 343 | } |
342 | kfree(shm); | 344 | kfree(shm); |
343 | teedev_ctx_put(ctx); | 345 | teedev_ctx_put(ctx); |