diff options
author | Miquel Raynal <miquel.raynal@bootlin.com> | 2018-08-05 18:53:06 +0200 |
---|---|---|
committer | Tom Rini <trini@konsulko.com> | 2018-08-13 14:04:04 -0400 |
commit | fd973ca6969e556bfeb74e69c5a6867785c9ea5c (patch) | |
tree | e013a1108cfa3ae14d3c27741a60b86da1efad55 /arch | |
parent | ce18baf911340f8adbf2b63cd910a3d3346135e5 (diff) |
tpm: sandbox: fix wrong check on pcr_map
The second check on pcr_map in sandbox_tpm2_xfer() is wrong. It should
check for pcr_map not being empty. Instead, it is a pure copy/paste of
the first check which is redundant.
This has been found thanks to a Coverity Scan report:
CID 183370: Memory - illegal accesses (UNINIT)
Using uninitialized value "pcr_index".
put_unaligned_be32(tpm->pcr_extensions[pcr_index], recv);
This is because pcr_index is initialized only if the user input is
correct, ie. at least one valid bit is set in pcr_map.
Fix the second check and also initialize pcr_index to 0 (which is
harmless in case of error) to make Coverity Scan happy.
Reported-by: Tom Rini <trini@konsulko.com>
Signed-off-by: Miquel Raynal <miquel.raynal@bootlin.com>
Reviewed-by: Simon Glass <sjg@chromium.org>
Diffstat (limited to 'arch')
0 files changed, 0 insertions, 0 deletions