From: Sinan Kaya <ok...@kernel.org>

In memzone_lookup_thread_unsafe result of call to rte_fbarray_get
is dereferenced here and may be null.

Signed-off-by: Sinan Kaya <ok...@kernel.org>
---
 lib/eal/common/eal_common_memzone.c | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

diff --git a/lib/eal/common/eal_common_memzone.c 
b/lib/eal/common/eal_common_memzone.c
index 860fb5fb64..8d472505eb 100644
--- a/lib/eal/common/eal_common_memzone.c
+++ b/lib/eal/common/eal_common_memzone.c
@@ -41,7 +41,7 @@ memzone_lookup_thread_unsafe(const char *name)
        i = rte_fbarray_find_next_used(arr, 0);
        while (i >= 0) {
                mz = rte_fbarray_get(arr, i);
-               if (mz->addr != NULL &&
+               if ((mz != NULL) && (mz->addr != NULL) &&
                                !strncmp(name, mz->name, RTE_MEMZONE_NAMESIZE))
                        return mz;
                i = rte_fbarray_find_next_used(arr, i + 1);
@@ -358,6 +358,10 @@ dump_memzone(const struct rte_memzone *mz, void *arg)
        fprintf(f, "physical segments used:\n");
        ms_idx = RTE_PTR_DIFF(mz->addr, msl->base_va) / page_sz;
        ms = rte_fbarray_get(&msl->memseg_arr, ms_idx);
+       if (ms == NULL) {
+               RTE_LOG(DEBUG, EAL, "Skipping bad memzone\n");
+               return;
+       }
 
        do {
                fprintf(f, "  addr: %p iova: 0x%" PRIx64 " "
-- 
2.25.1

Reply via email to