From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 616C03BFE48; Thu, 15 Jan 2026 17:15:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768497347; cv=none; b=oDe/NH58pHi7WgXI+jgvrOkunhD5WpevgfqshQ3TSAK6F4nmnFKe/ubTGs5qFI2JzzSmC2pIVsz+NgVB8z5NxM8FyAqQFh3RZQGaKgOWlu2p7RHuIOdcQRg0afI/4HPCxGv+B8jYb9BaBc7Ywzn162tDAPI4+UjFSHjj+OWrjbU= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768497347; c=relaxed/simple; bh=fa14E+wsUpMjdkVQkYZ7uWGRk5Xqf7zpCAutkbQJJyI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=M+zsVVVBTKrAahC/JvEnOo6QnNflOt7Dx1te7rEifIR3OiqXndBZVfiOnanXrl3/LbsangnWqCV52NjyL2ionUC0pxIGalpPFRd7sTnIJGvbRGcNLqlArhxufM8aHdWXM7XsHajQ/IbjG05Yw08d1aaPq2yDQlI4dfgzPpHx+GM= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=0iknXRhB; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="0iknXRhB" Received: by smtp.kernel.org (Postfix) with ESMTPSA id E1FD2C116D0; Thu, 15 Jan 2026 17:15:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1768497347; bh=fa14E+wsUpMjdkVQkYZ7uWGRk5Xqf7zpCAutkbQJJyI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0iknXRhBQjnoe6sCPOh+agSaj21NjcRTtYVKBpDeJnoJRqYyNGl3hUmH+ShZ5sEZo WENIcaXsGkjqFDabxjYQGCxu9+9PBLjcBm/WbT8bIae+s+ZCf1vbZRDxkZY0QG18Ib 7m4RqX/kmNcUmIAaw5ZmxAb73UxQJyvDYw68uAM0= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Li Qiang , Sasha Levin Subject: [PATCH 5.15 049/554] uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe Date: Thu, 15 Jan 2026 17:41:55 +0100 Message-ID: <20260115164248.020563292@linuxfoundation.org> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260115164246.225995385@linuxfoundation.org> References: <20260115164246.225995385@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 5.15-stable review patch. If anyone has any objections, please let me know. ------------------ From: Li Qiang [ Upstream commit d48fb15e6ad142e0577428a8c5028136e10c7b3d ] devm_kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. Fixes: d57801c45f53e ("uio: uio_fsl_elbc_gpcm: use device-managed allocators") Signed-off-by: Li Qiang Link: https://patch.msgid.link/20251015064020.56589-1-liqiang01@kylinos.cn Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/uio/uio_fsl_elbc_gpcm.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/drivers/uio/uio_fsl_elbc_gpcm.c b/drivers/uio/uio_fsl_elbc_gpcm.c index 7d8eb9dc20681..db4e64550f121 100644 --- a/drivers/uio/uio_fsl_elbc_gpcm.c +++ b/drivers/uio/uio_fsl_elbc_gpcm.c @@ -384,6 +384,11 @@ static int uio_fsl_elbc_gpcm_probe(struct platform_device *pdev) /* set all UIO data */ info->mem[0].name = devm_kasprintf(&pdev->dev, GFP_KERNEL, "%pOFn", node); + if (!info->mem[0].name) { + ret = -ENODEV; + goto out_err3; + } + info->mem[0].addr = res.start; info->mem[0].size = resource_size(&res); info->mem[0].memtype = UIO_MEM_PHYS; @@ -423,6 +428,8 @@ static int uio_fsl_elbc_gpcm_probe(struct platform_device *pdev) out_err2: if (priv->shutdown) priv->shutdown(info, true); + +out_err3: iounmap(info->mem[0].internal_addr); return ret; } -- 2.51.0