Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3080457ybt; Mon, 29 Jun 2020 14:49:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxBTV7pzvbjU08or56BK0BXTfNY9hoVeuP9cq+g4mJYu05ZxQ7stshVHQEJH0ZTal1sn1ZZ X-Received: by 2002:a17:906:a84d:: with SMTP id dx13mr10167076ejb.246.1593467398722; Mon, 29 Jun 2020 14:49:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593467398; cv=none; d=google.com; s=arc-20160816; b=uaT4gA+BFCNAckrmOpygoz6Te44wN+qdWoBx/jr53b1Dm/Yq3ipvFTPwLxhQIxa88U 4h61s5gZjzDBJMk1yAshR/o6xHYBv7reXACrZBXOe5CP+EpaC68y07DZTxhXnq9WXFju 9PZiw7HeNdqeTe7EhHnm2ZVdDvRyzyGqWu7UT+/JSXIg9fUhhv5nPMQmHgTmbeBq2D2J YKjiv1zYl9g4uhOxx9JEuCcF0V9wWHxwWfNwrLVHA6tkyRTL4BCD3WrJT42u9+MeYQ9T EpMzuAtkQbT3U5qSnnapAjzrZB6aOzpjP6DWX4FsILYUCi9Ihf2Na+eL3yYlG5URKuzJ g8sQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=qoxtZKa5kIZ+rElyBJEtepw3AbuD8d9SCynJcMf6MVQ=; b=l+uWkSP2U3n9/yUA6MviwUs7mZ56C66Trxb9wR+7a7iJWpQ8b1XnyQ+r/dQKWDBvSq N4Dpup1etOQ8SYPzgYsW1/X/f/R4RJt8npn7+HQBvVe/zCaH87SLXvwhf0oFbAEktCrh J9h+gk7eLdToFJomK5LPi0Eb9dSjIvx9iL/aNrgF3fclHajbLMDmgmR3ftZaM+h4DXab FmfZmb+yC4gEzLJ4S4BhTyrs0vnpmPPrVCb7VbZh/0w/l+9knGYsT2eGw72RDG79zkc5 MpP3uiefhTRn/5TQgIaZjDiZv8iRfs+HhvJs5qlw+onU6dH3nB7xrdoRNkHi4glYy4h0 nsuA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kpMHe1Lp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i7si463312edb.116.2020.06.29.14.49.36; Mon, 29 Jun 2020 14:49:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kpMHe1Lp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404157AbgF2Vqd (ORCPT + 99 others); Mon, 29 Jun 2020 17:46:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:56892 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726768AbgF2Sft (ORCPT ); Mon, 29 Jun 2020 14:35:49 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 43B9B246C5; Mon, 29 Jun 2020 15:20:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593444018; bh=AqD3HPzojRlR/llzWs9yZ1D23zxzY8tYgsTamKWyrBk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kpMHe1LpuYwy2YUifU7Emn/a4Y+IXuhiDiALau+bEtUxXyDpqFCDHif1+6yTzLZ5K k7HsPqN18zvxWLiHw7vhrAGe20FBLEeJvfX8bMucJiZTNN6Fn1QPgHj/rk75B+YDiW J1tu2cDhqcUkRVuUWeJsnivspUL8CWGqVG9nC6TY= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Dan Carpenter , Borislav Petkov , Reinette Chatre , Fenghua Yu , Sasha Levin Subject: [PATCH 5.7 124/265] x86/resctrl: Fix a NULL vs IS_ERR() static checker warning in rdt_cdp_peer_get() Date: Mon, 29 Jun 2020 11:15:57 -0400 Message-Id: <20200629151818.2493727-125-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629151818.2493727-1-sashal@kernel.org> References: <20200629151818.2493727-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.7.7-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.7.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.7.7-rc1 X-KernelTest-Deadline: 2020-07-01T15:14+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter [ Upstream commit cc5277fe66cf3ad68f41f1c539b2ef0d5e432974 ] The callers don't expect *d_cdp to be set to an error pointer, they only check for NULL. This leads to a static checker warning: arch/x86/kernel/cpu/resctrl/rdtgroup.c:2648 __init_one_rdt_domain() warn: 'd_cdp' could be an error pointer This would not trigger a bug in this specific case because __init_one_rdt_domain() calls it with a valid domain that would not have a negative id and thus not trigger the return of the ERR_PTR(). If this was a negative domain id then the call to rdt_find_domain() in domain_add_cpu() would have returned the ERR_PTR() much earlier and the creation of the domain with an invalid id would have been prevented. Even though a bug is not triggered currently the right and safe thing to do is to set the pointer to NULL because that is what can be checked for when the caller is handling the CDP and non-CDP cases. Fixes: 52eb74339a62 ("x86/resctrl: Fix rdt_find_domain() return value and checks") Signed-off-by: Dan Carpenter Signed-off-by: Borislav Petkov Acked-by: Reinette Chatre Acked-by: Fenghua Yu Link: https://lkml.kernel.org/r/20200602193611.GA190851@mwanda Signed-off-by: Sasha Levin --- arch/x86/kernel/cpu/resctrl/rdtgroup.c | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/kernel/cpu/resctrl/rdtgroup.c b/arch/x86/kernel/cpu/resctrl/rdtgroup.c index 5a359d9fcc055..29a3878ab3c01 100644 --- a/arch/x86/kernel/cpu/resctrl/rdtgroup.c +++ b/arch/x86/kernel/cpu/resctrl/rdtgroup.c @@ -1117,6 +1117,7 @@ static int rdt_cdp_peer_get(struct rdt_resource *r, struct rdt_domain *d, _d_cdp = rdt_find_domain(_r_cdp, d->id, NULL); if (WARN_ON(IS_ERR_OR_NULL(_d_cdp))) { _r_cdp = NULL; + _d_cdp = NULL; ret = -EINVAL; } -- 2.25.1