Skip to content

Commit

Permalink
common/cpt: fix possible null dereference
Browse files Browse the repository at this point in the history
[ upstream commit 01c6500 ]

Coverity complains that ctrl_flags is set to NULL at the start
of the function and it may not have been set before there is a
jump to fc_success and it is dereferenced.

Check for NULL before dereference.

312fc_success:
   CID 344983 (#1 of 1): Explicit null dereferenced
   (FORWARD_NULL)7. var_deref_op: Dereferencing null pointer ctrl_flags.
313        *ctrl_flags = rte_cpu_to_be_64(*ctrl_flags);

Coverity issue: 344983
Fixes: 6cc5409 ("crypto/octeontx: add supported sessions")

Signed-off-by: Kevin Traynor <ktraynor@redhat.com>
Reviewed-by: David Marchand <david.marchand@redhat.com>
  • Loading branch information
kevintraynor committed Dec 10, 2019
1 parent 3605059 commit 3f6ffc1
Showing 1 changed file with 2 additions and 1 deletion.
3 changes: 2 additions & 1 deletion drivers/common/cpt/cpt_ucode.h
Expand Up @@ -315,7 +315,8 @@ cpt_fc_ciph_set_key(void *ctx, cipher_type_t type, uint8_t *key,
memcpy(fctx->enc.encr_key, key, key_len);

fc_success:
*ctrl_flags = rte_cpu_to_be_64(*ctrl_flags);
if (ctrl_flags != NULL)
*ctrl_flags = rte_cpu_to_be_64(*ctrl_flags);

success:
cpt_ctx->enc_cipher = type;
Expand Down

0 comments on commit 3f6ffc1

Please sign in to comment.