Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp117602ybm; Tue, 26 May 2020 12:12:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxvLsDitIfutQFNzJ+sZOkDZgdvbwbwd91l4DiEeTv4562hg6u7esf/UU5mIJqXYTMAuuo2 X-Received: by 2002:a50:ec8d:: with SMTP id e13mr22412981edr.8.1590520357193; Tue, 26 May 2020 12:12:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590520357; cv=none; d=google.com; s=arc-20160816; b=kTHRpRi/Gpk+QwuAulyjhxrdnCmpjXB+a0QWfHzkDTrCg1KhD2cZIbF0Ihvk4wjiIK 6PNYH7Db3xPtFgwvd4Qc9oHJjFj9Ejxm4Udj4xJ0eAKXQVN20qcK8sSzDFIVHK7P/z5c PN4WLctrtqEygoGODbpW4xKBGnLQR54kb/VgzjkowQDAe52GYTg9IUuvCsFn1jV/TNNA F2N6uWPsKMjCOWan/AN9anrjtoifStJs+S6nTGv2pFJ5ac25D0ah/sX5qshVuzqlfr3O pL2zpAzZ5UqfpsOGCjQcrb/kzldjcsJY26Dd9fqKzOrL2qXBot8Rq568lTnJROmFaWsA iw3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JmpupgcMdRiC74BtaHOgr4/1IgGVRP4DU1LrhIP7Lus=; b=snFo5U4h6CMLkgnxIiq3kiCp1Db7hWYxC6qrE845i6XnoZxXlq6xREFCEp2XiuZdzF XyR3a79ogou2aEt+NTdI+3X085GDtnNQg2nR5lhU8sETwbGYGPLQULidtqwaGozy34he bGw2HmKN9kc4aQimrUuMi4AlSF2vXvtz0TYdkH/m2s7zxqzWXZJnY4UC5uGMGdr31rXP d1MUpfHPoXwBeEY5m4bqzRO2BLHlEOOXALg8/Z4MFLooyrtHr7LE/sELlOPt4drtyeUM bly1vxlzzZNBy5x6MYOpOf70ZSyq+5hqu5dDWdpI17Sbj86Qvbo/HHh1MW2cL1vu7gi4 QnMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Qb/o+04D"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z8si401068eja.225.2020.05.26.12.12.12; Tue, 26 May 2020 12:12:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="Qb/o+04D"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391049AbgEZTHf (ORCPT + 99 others); Tue, 26 May 2020 15:07:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:36236 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391604AbgEZTHb (ORCPT ); Tue, 26 May 2020 15:07:31 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6579A208A7; Tue, 26 May 2020 19:07:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590520050; bh=oD6QkaIiaB6T+NAYwiJNPKDUYhK9EsRqwVgi97qBXfM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Qb/o+04Dw7kGmgwvbeawwp7+5AcLoXWLAGQjUg2VKtJmyeEjEDyWnyj7RCHdYo0uS N0nBE+0KAQHIjqXsGs3euU+9X+fPb0HE97UsykTl4Slks1P3RmL/6qurFlnWLRuNHp w8JAvMzvHsI0z8rnWUxz0MFdXm33LfhqUzgeO760= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Maxim Petrov , "David S. Miller" , Sasha Levin Subject: [PATCH 5.4 040/111] stmmac: fix pointer check after utilization in stmmac_interrupt Date: Tue, 26 May 2020 20:52:58 +0200 Message-Id: <20200526183936.724509476@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200526183932.245016380@linuxfoundation.org> References: <20200526183932.245016380@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Maxim Petrov [ Upstream commit f42234ffd531ca6b13d9da02faa60b72eccf8334 ] The paranoidal pointer check in IRQ handler looks very strange - it really protects us only against bogus drivers which request IRQ line with null pointer dev_id. However, the code fragment is incorrect because the dev pointer is used before the actual check which leads to undefined behavior. Remove the check to avoid confusing people with incorrect code. Signed-off-by: Maxim Petrov Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/stmicro/stmmac/stmmac_main.c | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c b/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c index 89a6ae2b17e3..1623516efb17 100644 --- a/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c +++ b/drivers/net/ethernet/stmicro/stmmac/stmmac_main.c @@ -3832,7 +3832,7 @@ static int stmmac_set_features(struct net_device *netdev, /** * stmmac_interrupt - main ISR * @irq: interrupt number. - * @dev_id: to pass the net device pointer. + * @dev_id: to pass the net device pointer (must be valid). * Description: this is the main driver interrupt service routine. * It can call: * o DMA service routine (to manage incoming frame reception and transmission @@ -3856,11 +3856,6 @@ static irqreturn_t stmmac_interrupt(int irq, void *dev_id) if (priv->irq_wake) pm_wakeup_event(priv->device, 0); - if (unlikely(!dev)) { - netdev_err(priv->dev, "%s: invalid dev pointer\n", __func__); - return IRQ_NONE; - } - /* Check if adapter is up */ if (test_bit(STMMAC_DOWN, &priv->state)) return IRQ_HANDLED; -- 2.25.1