Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp2754841ybh; Mon, 5 Aug 2019 06:20:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqxJDyobVpnL8BsC5nL0vn7nqiejmyCCmZAmfWHm7LMGEI+4ZZgoWSw6web3+95qM1Jfslzf X-Received: by 2002:a65:4509:: with SMTP id n9mr82901432pgq.133.1565011207239; Mon, 05 Aug 2019 06:20:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565011207; cv=none; d=google.com; s=arc-20160816; b=GdvdUSfBWj750xI1Tnhj0qIG9mJTywMFNHh9Q3vLyljI+p8zvY2Z1Eyf9DJqJxw7kr 6wIp87VMSQPS5uWaHa/QMgkqWgHmpy+6bUBJaEHyf47Wef8dwlsocmf+x71eLE0o07vU 35DxgYhMsviFrZ27LQKK9QW8WnagwD6Dje3FMHXHNo11F9ks2++4HaqRxpsZGoGS/XAo jUq6M4ivYExJ+gIL2jv+ILWM0lO6E41Gq1hZeij/zDfS2y6KcDArtiUU76gw3PU35k+K k+6qGZ6UG+U+UTfsnoDys6ir4TvXIap3Mh0ziZ8S1ZM84Je7p07fgyLwMBwzdPVLu6gi AkBA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bsQ7a/iRViWeItsMMyQpOYItVj5ZkJyTlFgXoUN8xe0=; b=ZJQujTOVvICmjssivOwWVNioAS8nwvyLh4D6atZ9fMGySRGUUA+GfFgDfNUKBiL6rv e00CzuP9aPmALAi19mhQ2l++BT2tTKciJ3ibCULxUejaAJm09igvHjmuPGUGrsaQn9k5 4KOzOW/IzkEAbE8LOvZH4bbbkApygDb5TfOR+F62vnsYQfN8sD1tXq/1wqmUkJRijScE LBdORmNRWeVMBfsckQnJ+tnf9hAe+nNltguGSEw7vYpC9WvOfCX9m7KO7BvJfLz2GCne ptWVd40ur/qFspa5fXJE6RYZeImZMojBzfG/hpjeEL4kEgCFlWon7tBxYAYeQ5HtqkmI 3Vfw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=h0rM7K5v; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j12si12643751pgp.261.2019.08.05.06.19.51; Mon, 05 Aug 2019 06:20:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=h0rM7K5v; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728974AbfHENTW (ORCPT + 99 others); Mon, 5 Aug 2019 09:19:22 -0400 Received: from mail.kernel.org ([198.145.29.99]:55334 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729037AbfHENTV (ORCPT ); Mon, 5 Aug 2019 09:19:21 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1483B2067D; Mon, 5 Aug 2019 13:19:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565011160; bh=nR7y+Z/S1jfDe+QP4ZiufHTF5YdixtriuCdRpE1dqD0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=h0rM7K5vfMtqo/680VjaB97diru9atxKDPKk55WxHiPkxtiSqQIdbktteBoZ+ke2U ENo8MDfpmmc7dujvMG2FHe3/5k4jdXcNcrF1oR8hxkrBaIDh3qbhi+6NO57nZ+Mxei OeCRyfKw4lZF18THFBawsOuxRI9DKk4jOBDMrCkc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mike Marciniszyn , John Fleck , Jason Gunthorpe Subject: [PATCH 4.19 67/74] IB/hfi1: Check for error on call to alloc_rsm_map_table Date: Mon, 5 Aug 2019 15:03:20 +0200 Message-Id: <20190805124941.223572336@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190805124935.819068648@linuxfoundation.org> References: <20190805124935.819068648@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: John Fleck commit cd48a82087231fdba0e77521102386c6ed0168d6 upstream. The call to alloc_rsm_map_table does not check if the kmalloc fails. Check for a NULL on alloc, and bail if it fails. Fixes: 372cc85a13c9 ("IB/hfi1: Extract RSM map table init from QOS") Link: https://lore.kernel.org/r/20190715164521.74174.27047.stgit@awfm-01.aw.intel.com Cc: Reviewed-by: Mike Marciniszyn Signed-off-by: John Fleck Signed-off-by: Mike Marciniszyn Signed-off-by: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/hw/hfi1/chip.c | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) --- a/drivers/infiniband/hw/hfi1/chip.c +++ b/drivers/infiniband/hw/hfi1/chip.c @@ -14586,7 +14586,7 @@ void hfi1_deinit_vnic_rsm(struct hfi1_de clear_rcvctrl(dd, RCV_CTRL_RCV_RSM_ENABLE_SMASK); } -static void init_rxe(struct hfi1_devdata *dd) +static int init_rxe(struct hfi1_devdata *dd) { struct rsm_map_table *rmt; u64 val; @@ -14595,6 +14595,9 @@ static void init_rxe(struct hfi1_devdata write_csr(dd, RCV_ERR_MASK, ~0ull); rmt = alloc_rsm_map_table(dd); + if (!rmt) + return -ENOMEM; + /* set up QOS, including the QPN map table */ init_qos(dd, rmt); init_user_fecn_handling(dd, rmt); @@ -14621,6 +14624,7 @@ static void init_rxe(struct hfi1_devdata val |= ((4ull & RCV_BYPASS_HDR_SIZE_MASK) << RCV_BYPASS_HDR_SIZE_SHIFT); write_csr(dd, RCV_BYPASS, val); + return 0; } static void init_other(struct hfi1_devdata *dd) @@ -15163,7 +15167,10 @@ struct hfi1_devdata *hfi1_init_dd(struct goto bail_cleanup; /* set initial RXE CSRs */ - init_rxe(dd); + ret = init_rxe(dd); + if (ret) + goto bail_cleanup; + /* set initial TXE CSRs */ init_txe(dd); /* set initial non-RXE, non-TXE CSRs */