Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp275176ybi; Wed, 29 May 2019 21:10:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqzZb8N5LLFMeZZ6utXUXdGG88VxQRxfxEYEEfQkplbdeLhv7ZNfRyJeDmHmzYKkRy786a+W X-Received: by 2002:a17:90a:d803:: with SMTP id a3mr1604329pjv.48.1559189433883; Wed, 29 May 2019 21:10:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559189433; cv=none; d=google.com; s=arc-20160816; b=K29oVuMUX97K5z1//xv9rrAtprDVeVqW2gbpilglGGJyC1r61C/b+ToNNDgeTMKDYN ozAARGeEItMrt4pT97Vc6LEI27mQZ9pv4NiJRBm9qouqgFRCR7Qjig5wTXhgQ932QkrE Fsbcux5mrEkMnNhoZ1Dnsqbj/I5vESjRI23Zynha26zlGj6VdYkLV63XIDTKspezUfPH DWo/g7dG8fWUZswp1sd/3x8Iu3NAKK5djyAqbK623KF+GqQQpg/FlbTJgfiFrHuahKBI DhoMK2qvGdPyYwDvMclxHihjxJWqP9wpuT5+QQ8vvNT85/SBOOVEIWFCrh/jtLZoO64k bh3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=YcjdcL4j5Ul0utqh6YThVgKTbLuOTXtW5VFjBtP5cQk=; b=vjbtk11v/TNgj4kddkOo4LP/r/09/xuhNiwwGrvA+frsRjbsv3pn0CPQq0aicAi/U9 GWGZjvb0QYZxitedLiWUyY3kL3cD40LMsx52ZigP74flFSbapDQhxsZomFv1OUPaQC05 TC38RK/HXeF0grs+95XpyV4NlDmFA3BHSLAKr/pcZUrVMuUijMuxzwfXTFcCdXwIt2mo Uk5soQw+FJr/g01zPsyo8Uh2N+Uuaj+2IhYFx+3keoXGwgJqvUrGAiLfdh1D3Dq91YAR aSt49sliqLTTS+D01+bKyKYx7BQqeqGXwXYnzK34PzwmLiCDjl2HxWUk/3AlRT5jCwET IWZQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JiDB2jvn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s2si2086251pgg.225.2019.05.29.21.10.17; Wed, 29 May 2019 21:10:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JiDB2jvn; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726819AbfE3EJO (ORCPT + 99 others); Thu, 30 May 2019 00:09:14 -0400 Received: from mail.kernel.org ([198.145.29.99]:45532 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730967AbfE3DRN (ORCPT ); Wed, 29 May 2019 23:17:13 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0D18224685; Thu, 30 May 2019 03:17:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186233; bh=dgVPfRnNrS9sF00eZQGA8PRNy4LT4oN8ILxqoCCnE5Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JiDB2jvnI88PhcQeZybE2V2jnnpmm0ORtlJJbXzyV6PDGxvAM1AAnMXxg2QVGNACX C+pRnTK89vQpO+5JhIOQCNpfE5TT9KX00kKOCXdNtXCJ+VinmcTQvWsTzermfRmBV3 EpwbyhYnG6A/L9d+JVaNsFy4413dugPsZ6ePts2A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicholas Mc Guire , kbuild test robot , Stefan Wahren , Sasha Levin Subject: [PATCH 4.19 139/276] staging: vc04_services: handle kzalloc failure Date: Wed, 29 May 2019 20:04:57 -0700 Message-Id: <20190530030534.392200891@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030523.133519668@linuxfoundation.org> References: <20190530030523.133519668@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit a5112277872a56017b777770e2fd4324d4a6c866 ] The kzalloc here was being used without checking the return - if the kzalloc fails return VCHIQ_ERROR. The call-site of vchiq_platform_init_state() vchiq_init_state() was not responding to an allocation failure so checks for != VCHIQ_SUCCESS and pass VCHIQ_ERROR up to vchiq_platform_init() which then will fail with -EINVAL. Signed-off-by: Nicholas Mc Guire Reported-by: kbuild test robot Acked-By: Stefan Wahren Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- .../staging/vc04_services/interface/vchiq_arm/vchiq_2835_arm.c | 3 +++ drivers/staging/vc04_services/interface/vchiq_arm/vchiq_core.c | 2 ++ 2 files changed, 5 insertions(+) diff --git a/drivers/staging/vc04_services/interface/vchiq_arm/vchiq_2835_arm.c b/drivers/staging/vc04_services/interface/vchiq_arm/vchiq_2835_arm.c index e767209030642..c7c8ef67b67fa 100644 --- a/drivers/staging/vc04_services/interface/vchiq_arm/vchiq_2835_arm.c +++ b/drivers/staging/vc04_services/interface/vchiq_arm/vchiq_2835_arm.c @@ -208,6 +208,9 @@ vchiq_platform_init_state(VCHIQ_STATE_T *state) struct vchiq_2835_state *platform_state; state->platform_state = kzalloc(sizeof(*platform_state), GFP_KERNEL); + if (!state->platform_state) + return VCHIQ_ERROR; + platform_state = (struct vchiq_2835_state *)state->platform_state; platform_state->inited = 1; diff --git a/drivers/staging/vc04_services/interface/vchiq_arm/vchiq_core.c b/drivers/staging/vc04_services/interface/vchiq_arm/vchiq_core.c index 7642ced314364..63ce567eb6b75 100644 --- a/drivers/staging/vc04_services/interface/vchiq_arm/vchiq_core.c +++ b/drivers/staging/vc04_services/interface/vchiq_arm/vchiq_core.c @@ -2537,6 +2537,8 @@ vchiq_init_state(VCHIQ_STATE_T *state, VCHIQ_SLOT_ZERO_T *slot_zero, local->debug[DEBUG_ENTRIES] = DEBUG_MAX; status = vchiq_platform_init_state(state); + if (status != VCHIQ_SUCCESS) + return VCHIQ_ERROR; /* bring up slot handler thread -- 2.20.1