diff options
author | Catalin Vasile <cata.vasile@nxp.com> | 2016-05-06 16:18:53 +0300 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2016-05-10 17:49:21 +0800 |
commit | e930c765ca5c6b039cd22ebfb4504ea7b5dab43d (patch) | |
tree | a19b084027b5c9160b934bb962888370ceda184b /drivers/crypto/caam | |
parent | 5ca55738201c7ae1b556ad87bbb22c139ecc01dd (diff) | |
download | linux-e930c765ca5c6b039cd22ebfb4504ea7b5dab43d.tar.gz linux-e930c765ca5c6b039cd22ebfb4504ea7b5dab43d.tar.bz2 linux-e930c765ca5c6b039cd22ebfb4504ea7b5dab43d.zip |
crypto: caam - fix caam_jr_alloc() ret code
caam_jr_alloc() used to return NULL if a JR device could not be
allocated for a session. In turn, every user of this function used
IS_ERR() function to verify if anything went wrong, which does NOT look
for NULL values. This made the kernel crash if the sanity check failed,
because the driver continued to think it had allocated a valid JR dev
instance to the session and at some point it tries to do a caam_jr_free()
on a NULL JR dev pointer.
This patch is a fix for this issue.
Cc: <stable@vger.kernel.org>
Signed-off-by: Catalin Vasile <cata.vasile@nxp.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'drivers/crypto/caam')
-rw-r--r-- | drivers/crypto/caam/jr.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/drivers/crypto/caam/jr.c b/drivers/crypto/caam/jr.c index 6fd63a600614..5ef4be22eb80 100644 --- a/drivers/crypto/caam/jr.c +++ b/drivers/crypto/caam/jr.c @@ -248,7 +248,7 @@ static void caam_jr_dequeue(unsigned long devarg) struct device *caam_jr_alloc(void) { struct caam_drv_private_jr *jrpriv, *min_jrpriv = NULL; - struct device *dev = NULL; + struct device *dev = ERR_PTR(-ENODEV); int min_tfm_cnt = INT_MAX; int tfm_cnt; |