Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3614734pxb; Mon, 24 Jan 2022 13:33:59 -0800 (PST) X-Google-Smtp-Source: ABdhPJwgM1PrhmGxpfbE/O6o2yE9YfwoGgIWFAWtUIab47ASHW4gpNbs+FGMs7SlSFyflez9kQ6O X-Received: by 2002:a17:902:bd4b:b0:149:4c30:6dd2 with SMTP id b11-20020a170902bd4b00b001494c306dd2mr16111434plx.93.1643060039587; Mon, 24 Jan 2022 13:33:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643060039; cv=none; d=google.com; s=arc-20160816; b=uHclaRr/KR772ONudLhS2ElLpv6aH4hB9uWtGzQACDVLIgPk9Svc5g2Ot0zMH9SeyG 5geEqEtIJtmkwQPRL/iTaegwKMvAzHeiY8Dx7BrkjBFRqHh7Ulixi/bzspZcAMspund0 sugJozGJzsaI6I0ixZZOO+SzoOmfezkNE5DnTJAFPd4iZGrwHdzJoctmP4EWbzLtSPJR XmHY+XM27byIsJ1K33RNzNA2mF3vecOcmH+Rw3eb6xFzWqxSH5WcPhQtyKdWbvn5gy9W +trIQsgId/fRAcc0Hj8uBd6foS4/xMxVls2bCshnKf1VddRPU86pgnHOaDu0L84iSHkr 5qtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ziwLpZ1yIc5syE8xkyKo7uy1DJsnCVvv+ZgiLTXt7Ts=; b=ER/DdTonx5as3krjHrpu2aDHoywjS3lqW0fK6rhn6k5mvdFz3y2ub83SjsiFo4eWLB uelMYjlJkB76b0wvGcvJNuUyjkUHM/3nXLpqEZRCfvC1SpGfN2R8Os6z7003dCnoP6XX dUXtULKBPg0p8a+1HM4vWv6ZULriAmE23K4lQZOcpfA0JW60+tHjS23qJb4fZSqhhdNe LreBxnY9DIbc9c4bx2pCox2PdKRTX8Q3rqm52wJw4jB5PhIXtKLsGn27ftafo2+ZIKt9 V+2Hk9gZx2INFY3gCZfz/clns5FRzvIL1yLZ0X7FYeCCo4biHEkzwfNdwCRgG+dVqA5y wkIw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pDgWWbaD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bk9si8051628pgb.669.2022.01.24.13.33.46; Mon, 24 Jan 2022 13:33:59 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pDgWWbaD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1446898AbiAXVJi (ORCPT + 99 others); Mon, 24 Jan 2022 16:09:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41684 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1355870AbiAXUk6 (ORCPT ); Mon, 24 Jan 2022 15:40:58 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 191B1C045929; Mon, 24 Jan 2022 11:51:56 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id B1EBCB81188; Mon, 24 Jan 2022 19:51:55 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C7FE6C340E5; Mon, 24 Jan 2022 19:51:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643053914; bh=XvsuaybxONItoAZe5a0vX9UxPNEjPcRQlzwFZKwiE4I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pDgWWbaDTkK3k0RylsjsaRY0oB/xipg/+HE3d3O6Pvzec53Y+QDDSuiGtN9PsQrKo D10pTl1ReFbD33iNNhiVyNz9jTSFNFh8Kdnjkckk/1Wgh/AFphONdOTxAdsUcvTSUq bP+FLxLW3vUz293WHs+A5i0Yh8M+CEa4xQyb4CVc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiasheng Jiang , "David S. Miller" , Sasha Levin Subject: [PATCH 5.10 211/563] fsl/fman: Check for null pointer after calling devm_ioremap Date: Mon, 24 Jan 2022 19:39:36 +0100 Message-Id: <20220124184031.739722328@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184024.407936072@linuxfoundation.org> References: <20220124184024.407936072@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jiasheng Jiang [ Upstream commit d5a73ec96cc57cf67e51b12820fc2354e7ca46f8 ] As the possible failure of the allocation, the devm_ioremap() may return NULL pointer. Take tgec_initialization() as an example. If allocation fails, the params->base_addr will be NULL pointer and will be assigned to tgec->regs in tgec_config(). Then it will cause the dereference of NULL pointer in set_mac_address(), which is called by tgec_init(). Therefore, it should be better to add the sanity check after the calling of the devm_ioremap(). Fixes: 3933961682a3 ("fsl/fman: Add FMan MAC driver") Signed-off-by: Jiasheng Jiang Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/freescale/fman/mac.c | 21 ++++++++++++++++----- 1 file changed, 16 insertions(+), 5 deletions(-) diff --git a/drivers/net/ethernet/freescale/fman/mac.c b/drivers/net/ethernet/freescale/fman/mac.c index 901749a7a318b..6eeccc11b76ef 100644 --- a/drivers/net/ethernet/freescale/fman/mac.c +++ b/drivers/net/ethernet/freescale/fman/mac.c @@ -94,14 +94,17 @@ static void mac_exception(void *handle, enum fman_mac_exceptions ex) __func__, ex); } -static void set_fman_mac_params(struct mac_device *mac_dev, - struct fman_mac_params *params) +static int set_fman_mac_params(struct mac_device *mac_dev, + struct fman_mac_params *params) { struct mac_priv_s *priv = mac_dev->priv; params->base_addr = (typeof(params->base_addr)) devm_ioremap(priv->dev, mac_dev->res->start, resource_size(mac_dev->res)); + if (!params->base_addr) + return -ENOMEM; + memcpy(¶ms->addr, mac_dev->addr, sizeof(mac_dev->addr)); params->max_speed = priv->max_speed; params->phy_if = mac_dev->phy_if; @@ -112,6 +115,8 @@ static void set_fman_mac_params(struct mac_device *mac_dev, params->event_cb = mac_exception; params->dev_id = mac_dev; params->internal_phy_node = priv->internal_phy_node; + + return 0; } static int tgec_initialization(struct mac_device *mac_dev) @@ -123,7 +128,9 @@ static int tgec_initialization(struct mac_device *mac_dev) priv = mac_dev->priv; - set_fman_mac_params(mac_dev, ¶ms); + err = set_fman_mac_params(mac_dev, ¶ms); + if (err) + goto _return; mac_dev->fman_mac = tgec_config(¶ms); if (!mac_dev->fman_mac) { @@ -169,7 +176,9 @@ static int dtsec_initialization(struct mac_device *mac_dev) priv = mac_dev->priv; - set_fman_mac_params(mac_dev, ¶ms); + err = set_fman_mac_params(mac_dev, ¶ms); + if (err) + goto _return; mac_dev->fman_mac = dtsec_config(¶ms); if (!mac_dev->fman_mac) { @@ -218,7 +227,9 @@ static int memac_initialization(struct mac_device *mac_dev) priv = mac_dev->priv; - set_fman_mac_params(mac_dev, ¶ms); + err = set_fman_mac_params(mac_dev, ¶ms); + if (err) + goto _return; if (priv->max_speed == SPEED_10000) params.phy_if = PHY_INTERFACE_MODE_XGMII; -- 2.34.1