It will cause null-ptr-deref when using 'res', if platform_get_resource()
returns NULL, so move using 'res' after devm_ioremap_resource() that
will check it to avoid null-ptr-deref.
And use devm_platform_get_and_ioremap_resource() to simplify code.

Fixes: 9648cbc9625b ("iommu/arm-smmu: Make use of the iommu_register interface")
Signed-off-by: Yang Yingliang <yangyingli...@huawei.com>
---
 drivers/iommu/arm/arm-smmu/arm-smmu.c | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu.c 
b/drivers/iommu/arm/arm-smmu/arm-smmu.c
index 568cce590ccc..52b71f6aee3f 100644
--- a/drivers/iommu/arm/arm-smmu/arm-smmu.c
+++ b/drivers/iommu/arm/arm-smmu/arm-smmu.c
@@ -2092,11 +2092,10 @@ static int arm_smmu_device_probe(struct platform_device 
*pdev)
        if (err)
                return err;
 
-       res = platform_get_resource(pdev, IORESOURCE_MEM, 0);
-       ioaddr = res->start;
-       smmu->base = devm_ioremap_resource(dev, res);
+       smmu->base = devm_platform_get_and_ioremap_resource(pdev, 0, &res);
        if (IS_ERR(smmu->base))
                return PTR_ERR(smmu->base);
+       ioaddr = res->start;
        /*
         * The resource size should effectively match the value of SMMU_TOP;
         * stash that temporarily until we know PAGESIZE to validate it with.
-- 
2.25.1

_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

Reply via email to