Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp745565ybl; Fri, 24 Jan 2020 08:48:53 -0800 (PST) X-Google-Smtp-Source: APXvYqyEzpW4dpRspZJvG85tDHxPp7mkoUHE0M/Y2v/ngiyQ9HykMuD+wfvYZm/QO7Wu1jbbz3YV X-Received: by 2002:a05:6830:1d5b:: with SMTP id p27mr3136459oth.263.1579884533566; Fri, 24 Jan 2020 08:48:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579884533; cv=none; d=google.com; s=arc-20160816; b=N+jGbSj/fgZwF5rxpOBfi8WDfJEKgJ1ZFYCpe1vB30zmm1FB5Pd72lQFcbbQ/Zw0e8 xCZK9jxBuY2KmtGPgxqHlv5h95BNYCYOMxO0IP3oFmOeW0rVSE5lQtZIC7Km3vN79Pbx SMAObgLsjxz4oP7PzV93cIKY1xeqsOBabbyo+L0nNs+/Eaw3UuN3410PXjruo0G44FJh VZsuYbGoTIuE49aXCxVuLNQZj5ZwOjUx5buLK7F/nNNvYNav8sHGITaoBhrA130EDrLV 7YUfjoGhDWlivaGwVU+7s6ZR3hFtyThSjexS2LB3izJaWVQ3RzOS2BxW96Ccy6ac6sdI cZYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1ol1fNeZn1p/Qc6VW6LqZ/EsBzVRM1N0BTQZ1Uj6VBo=; b=Yu2FloZC9F7Sx4Mb/2XcdfLU1VPyDxfD1hIFU006EM44dAqCRqV/12gAv6QsCY/Cgz Vn58MS8lysdjbLj/SVFEEihBLsT3HGCV9OLZLxye73qQ2yN+YiFwh+dXys4DF4vC6kgL P8y3Lq67Pv2ooUG4WqKFeku2qD69WzRJRgPFPpNcDqd1YFcDjHkSxnUjpYk0TJ+lY5AR ooLbkSchNCJ1Q6Ql3/VyY4/5tIkwW19EKlSUxBeNgiyEH86jav3Lt2N3kFCoyNjp5Co/ pZ6Q3ThGCuRzW5P5+2TopNWfW54u94t1dfNYziUXfWxT1xfEQzwyELTbNTQ1mRrUV6GI gFjw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BHJfOM6D; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c21si3115605oto.176.2020.01.24.08.48.37; Fri, 24 Jan 2020 08:48:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=BHJfOM6D; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389748AbgAXLJL (ORCPT + 99 others); Fri, 24 Jan 2020 06:09:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:44672 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729188AbgAXLJJ (ORCPT ); Fri, 24 Jan 2020 06:09:09 -0500 Received: from localhost (ip-213-127-102-57.ip.prioritytelecom.net [213.127.102.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8450A20663; Fri, 24 Jan 2020 11:09:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579864148; bh=4B+Bx8aWsAdssjEKaRL6rcWLwOShkfKSLgK9/93fxKE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BHJfOM6DEiGtHOje/ruZUa5qOmMTDZeArAzesE+xvFkU+mJ1KUM/iPFEQURv0L9UO c7Km/BfJhq3geIP1D8dvq9JN4tAxbbW7yo+5ek3GR9O8eGONRL9gIv7/umO2A3BDFO Zn6tgaBJAcrvPjfRoe7p27EcF2sjwELMirXtw1FY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicholas Mc Guire , Corey Minyard , Haiyue Wang , Sasha Levin Subject: [PATCH 4.19 185/639] ipmi: kcs_bmc: handle devm_kasprintf() failure case Date: Fri, 24 Jan 2020 10:25:55 +0100 Message-Id: <20200124093110.312418669@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200124093047.008739095@linuxfoundation.org> References: <20200124093047.008739095@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicholas Mc Guire [ Upstream commit 42c7c6ef1e6fa5fc0425120f06f045190b1dda2d ] devm_kasprintf() may return NULL if internal allocation failed so this assignment is not safe. Moved the error exit path and added the !NULL which then allows the devres manager to take care of cleanup. Signed-off-by: Nicholas Mc Guire Fixes: cd2315d471f4 ("ipmi: kcs_bmc: don't change device name") Signed-off-by: Corey Minyard Reviewed-by: Haiyue Wang Signed-off-by: Sasha Levin --- drivers/char/ipmi/kcs_bmc.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/drivers/char/ipmi/kcs_bmc.c b/drivers/char/ipmi/kcs_bmc.c index e6124bd548df2..ed4dc3b1843e3 100644 --- a/drivers/char/ipmi/kcs_bmc.c +++ b/drivers/char/ipmi/kcs_bmc.c @@ -440,12 +440,13 @@ struct kcs_bmc *kcs_bmc_alloc(struct device *dev, int sizeof_priv, u32 channel) kcs_bmc->data_in = devm_kmalloc(dev, KCS_MSG_BUFSIZ, GFP_KERNEL); kcs_bmc->data_out = devm_kmalloc(dev, KCS_MSG_BUFSIZ, GFP_KERNEL); kcs_bmc->kbuffer = devm_kmalloc(dev, KCS_MSG_BUFSIZ, GFP_KERNEL); - if (!kcs_bmc->data_in || !kcs_bmc->data_out || !kcs_bmc->kbuffer) - return NULL; kcs_bmc->miscdev.minor = MISC_DYNAMIC_MINOR; kcs_bmc->miscdev.name = devm_kasprintf(dev, GFP_KERNEL, "%s%u", DEVICE_NAME, channel); + if (!kcs_bmc->data_in || !kcs_bmc->data_out || !kcs_bmc->kbuffer || + !kcs_bmc->miscdev.name) + return NULL; kcs_bmc->miscdev.fops = &kcs_bmc_fops; return kcs_bmc; -- 2.20.1