Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754156AbcLNSHF (ORCPT ); Wed, 14 Dec 2016 13:07:05 -0500 Received: from mail-pg0-f66.google.com ([74.125.83.66]:35030 "EHLO mail-pg0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753905AbcLNSHD (ORCPT ); Wed, 14 Dec 2016 13:07:03 -0500 Subject: Re: [v2] net:ethernet:cavium:octeon:octeon_mgmt: Handle return NULL error from devm_ioremap To: David Daney , peter.chen@nxp.com, fw@strlen.de, david.daney@cavium.com References: <1481732732-6892-1-git-send-email-arvind.yadav.cs@gmail.com> <3c3d5968-bc41-e1b7-6fda-78e92e7a9d56@caviumnetworks.com> Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org From: arvind Yadav Message-ID: <0be48286-2656-84b4-4cd8-93bea5fbc6f0@gmail.com> Date: Wed, 14 Dec 2016 23:36:21 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: <3c3d5968-bc41-e1b7-6fda-78e92e7a9d56@caviumnetworks.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1971 Lines: 57 Yes, I have seen this error. We have a device with very less memory. Basically it's OMAP2 board. We have to port Android L on this. It's has 3.10 kernel version. In this device, we were getting Page allocation failure. Vmalloc size was not enough to run all application. So we have decide to increase vmalloc reserve space. once we increases Vmalloc space. We start getting ioremap falilure. Kernel is getting NULL-pointer dereference error. Here, It's just check to avoid any kernel crash because of ioremap failure. We can keep this check to avoid this kind of scenario. Thanks -Arvind On Wednesday 14 December 2016 11:02 PM, David Daney wrote: > On 12/14/2016 08:25 AM, Arvind Yadav wrote: >> Here, If devm_ioremap will fail. It will return NULL. >> Kernel can run into a NULL-pointer dereference. >> This error check will avoid NULL pointer dereference. >> > i > Have you ever seen this failure in the wild? > > How was the patch tested? > > Thanks, > David Daney > > >> Signed-off-by: Arvind Yadav >> --- >> drivers/net/ethernet/cavium/octeon/octeon_mgmt.c | 6 ++++++ >> 1 file changed, 6 insertions(+) >> >> diff --git a/drivers/net/ethernet/cavium/octeon/octeon_mgmt.c >> b/drivers/net/ethernet/cavium/octeon/octeon_mgmt.c >> index 4ab404f..33c2fec 100644 >> --- a/drivers/net/ethernet/cavium/octeon/octeon_mgmt.c >> +++ b/drivers/net/ethernet/cavium/octeon/octeon_mgmt.c >> @@ -1479,6 +1479,12 @@ static int octeon_mgmt_probe(struct >> platform_device *pdev) >> p->agl = (u64)devm_ioremap(&pdev->dev, p->agl_phys, p->agl_size); >> p->agl_prt_ctl = (u64)devm_ioremap(&pdev->dev, p->agl_prt_ctl_phys, >> p->agl_prt_ctl_size); >> + if (!p->mix || !p->agl || !p->agl_prt_ctl) { >> + dev_err(&pdev->dev, "failed to map I/O memory\n"); >> + result = -ENOMEM; >> + goto err; >> + } >> + >> spin_lock_init(&p->lock); >> >> skb_queue_head_init(&p->tx_list); >> >