Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp2462617imd; Fri, 2 Nov 2018 11:50:15 -0700 (PDT) X-Google-Smtp-Source: AJdET5fM6MYXuBDwBD76TlDyTfjVNjeqePGnWeSe4OXV/KtggnfmzOgnfV2S+a+LxqxvcjAqvkkq X-Received: by 2002:a63:24c2:: with SMTP id k185mr11506175pgk.406.1541184615567; Fri, 02 Nov 2018 11:50:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541184615; cv=none; d=google.com; s=arc-20160816; b=vM8otbcIXnYqMuaU8gNbxhBbhMSx6uPcBHNgZNUThG8qJnA03EewWSigig0CnJOOw6 aHwXHH6LkxAFsSk+0Jba23ybRkpr94t/4PPcVA2Scs+nlzbKVS8gIiFubU8vmc47ETD/ npuqWUzX24DrnJLQwln6Okar9TNbevi7SKHg+T0S7ND6YJzGsjJ4dzaOLO7ctL5JeNgg YQn/lGeMboBoUSDsyloDR0YOyFqiS3gDePUHTWa/PTihDqY/Y1Ux1uYOOP1yRcG4MUei HdWXwOL42ADnxHYlr2BMvmeuJc1+VApZ+rjI2SA46p5nJu+MzDZFirtvALGVLsJy0SuK Jm6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KybOfAazxgrV3nxrOwYV0jzCLfCsZEdZKZJTeekQOEg=; b=bP33TEuIMTt+Nf6AQKUzxJDKg2iaNIj+BRPWVwdjsRVRkygsA1d+7RNSc4SxXsEqzf jMIMr77H1XnUbV3icH3+vMkt5wJU0r2qKluVZfQVkWbMme8O52LSTjOcqhYWQj3Wipl/ crq6P+ADaJvXn+V2ABnNSdPz2uC8NdK9o3zGcx9bdZp6e5tPcmQvrx6Y5f6GUmrnDcaI tqn9Jfz4Gl8hab5WBDXipfdV7q8L/PRSzmhXdjrYV0zXwYOSOgXAJGLbhasOv45CUhmD LPs5F3HLxJ1aX3tHylqHcfhcbf1MDy1iL2ZVCDeS02KyQ26HEpinST+mnn0hX59qJESQ TyEw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zA3GqGRq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t69si4577023pgb.365.2018.11.02.11.50.00; Fri, 02 Nov 2018 11:50:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zA3GqGRq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730434AbeKCD4U (ORCPT + 99 others); Fri, 2 Nov 2018 23:56:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:51864 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727629AbeKCD4T (ORCPT ); Fri, 2 Nov 2018 23:56:19 -0400 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 19E4420843; Fri, 2 Nov 2018 18:48:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541184485; bh=BNUxFlzULZHtux2juxJWbCHEEDlLTeHy1i8WFKhOOMM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zA3GqGRqR/O5tUFYjjjt6iZs9pTL8VtoN7PUocaaPpBrn5dN0r6VLXY6qdjqaLzWC BSzp6V3iDOfYHQuRa3/htPXJCVCFHowBYF0fTAqlfD4IpD8ix5iSMhgmUM96eitGVu WRIN1xf5Xn9yMcqYPw4zyhjEia583RGIdtFYybJ8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexandre Belloni , Roy Pledge , Li Yang , Olof Johansson , Sasha Levin Subject: [PATCH 4.14 018/143] soc: fsl: qbman: qman: avoid allocating from non existing gen_pool Date: Fri, 2 Nov 2018 19:33:23 +0100 Message-Id: <20181102182858.535831390@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181102182857.064326086@linuxfoundation.org> References: <20181102182857.064326086@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 64e9e22e68512da8df3c9a7430f07621e48db3c2 ] If the qman driver didn't probe, calling qman_alloc_fqid_range, qman_alloc_pool_range or qman_alloc_cgrid_range (as done in dpaa_eth) will pass a NULL pointer to gen_pool_alloc, leading to a NULL pointer dereference. Signed-off-by: Alexandre Belloni Reviewed-by: Roy Pledge Signed-off-by: Li Yang (cherry picked from commit f72487a2788aa70c3aee1d0ebd5470de9bac953a) Signed-off-by: Olof Johansson Signed-off-by: Sasha Levin --- drivers/soc/fsl/qbman/qman.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/soc/fsl/qbman/qman.c b/drivers/soc/fsl/qbman/qman.c index 0c6065dba48a..4f27e95efcdd 100644 --- a/drivers/soc/fsl/qbman/qman.c +++ b/drivers/soc/fsl/qbman/qman.c @@ -2699,6 +2699,9 @@ static int qman_alloc_range(struct gen_pool *p, u32 *result, u32 cnt) { unsigned long addr; + if (!p) + return -ENODEV; + addr = gen_pool_alloc(p, cnt); if (!addr) return -ENOMEM; -- 2.17.1