aboutsummaryrefslogtreecommitdiffstats
path: root/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71/2146-drm-amd-powerplay-suppress-KASAN-out-of-bounds-warni.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71/2146-drm-amd-powerplay-suppress-KASAN-out-of-bounds-warni.patch')
-rw-r--r--meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71/2146-drm-amd-powerplay-suppress-KASAN-out-of-bounds-warni.patch34
1 files changed, 34 insertions, 0 deletions
diff --git a/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71/2146-drm-amd-powerplay-suppress-KASAN-out-of-bounds-warni.patch b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71/2146-drm-amd-powerplay-suppress-KASAN-out-of-bounds-warni.patch
new file mode 100644
index 00000000..e147d27e
--- /dev/null
+++ b/meta-amd-bsp/recipes-kernel/linux/linux-yocto-4.14.71/2146-drm-amd-powerplay-suppress-KASAN-out-of-bounds-warni.patch
@@ -0,0 +1,34 @@
+From b043bdf5a67a657f5391a9bdfd4e4030719356be Mon Sep 17 00:00:00 2001
+From: Evan Quan <evan.quan@amd.com>
+Date: Mon, 6 Nov 2017 10:33:45 +0800
+Subject: [PATCH 2146/4131] drm/amd/powerplay: suppress KASAN out of bounds
+ warning in vega10_populate_all_memory_levels
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+Change-Id: I437e3e08cd48943de277c5d3eefdbaf21fd6a489
+Signed-off-by: Evan Quan <evan.quan@amd.com>
+Tested-and-Acked-by: Christian König <christian.koenig@amd.com>
+---
+ drivers/gpu/drm/amd/powerplay/hwmgr/vega10_hwmgr.c | 4 ++++
+ 1 file changed, 4 insertions(+)
+
+diff --git a/drivers/gpu/drm/amd/powerplay/hwmgr/vega10_hwmgr.c b/drivers/gpu/drm/amd/powerplay/hwmgr/vega10_hwmgr.c
+index 9d3516c..629806d 100644
+--- a/drivers/gpu/drm/amd/powerplay/hwmgr/vega10_hwmgr.c
++++ b/drivers/gpu/drm/amd/powerplay/hwmgr/vega10_hwmgr.c
+@@ -1807,6 +1807,10 @@ static int vega10_populate_all_memory_levels(struct pp_hwmgr *hwmgr)
+ mem_channels = (cgs_read_register(hwmgr->device, reg) &
+ DF_CS_AON0_DramBaseAddress0__IntLvNumChan_MASK) >>
+ DF_CS_AON0_DramBaseAddress0__IntLvNumChan__SHIFT;
++ PP_ASSERT_WITH_CODE(mem_channels < ARRAY_SIZE(channel_number),
++ "Mem Channel Index Exceeded maximum!",
++ return -1);
++
+ pp_table->NumMemoryChannels = cpu_to_le16(mem_channels);
+ pp_table->MemoryChannelWidth =
+ cpu_to_le16(HBM_MEMORY_CHANNEL_WIDTH *
+--
+2.7.4
+