lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20221209100550.30470-1-abelova@astralinux.ru> Date: Fri, 9 Dec 2022 13:05:50 +0300 From: Anastasia Belova <abelova@...ralinux.ru> To: Thomas Bogendoerfer <tsbogend@...ha.franken.de> Cc: Anastasia Belova <abelova@...ralinux.ru>, Randy Dunlap <rdunlap@...radead.org>, Florian Fainelli <f.fainelli@...il.com>, Jonathan Cameron <Jonathan.Cameron@...wei.com>, Ralf Baechle <ralf@...ux-mips.org>, Maxime Bizon <mbizon@...ebox.fr>, linux-mips@...r.kernel.org, linux-kernel@...r.kernel.org, lvc-project@...uxtesting.org Subject: [PATCH v3] MIPS: BCM63xx: Add check for NULL for clk in clk_enable Check clk for NULL before calling clk_enable_unlocked where clk is dereferenced. There is such check in other implementations of clk_enable. Found by Linux Verification Center (linuxtesting.org) with SVACE. Fixes: e7300d04bd08 ("MIPS: BCM63xx: Add support for the Broadcom BCM63xx family of SOCs.") Signed-off-by: Anastasia Belova <abelova@...ralinux.ru> --- v2: Fix errors reported by kernel test robot <lkp@...el.com>. v3: Merge several patches into single one. arch/mips/bcm63xx/clk.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/mips/bcm63xx/clk.c b/arch/mips/bcm63xx/clk.c index 6e6756e8fa0a..86a6e2590866 100644 --- a/arch/mips/bcm63xx/clk.c +++ b/arch/mips/bcm63xx/clk.c @@ -361,6 +361,8 @@ static struct clk clk_periph = { */ int clk_enable(struct clk *clk) { + if (!clk) + return 0; mutex_lock(&clocks_mutex); clk_enable_unlocked(clk); mutex_unlock(&clocks_mutex); -- 2.30.2
Powered by blists - more mailing lists