Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2433531imj; Mon, 18 Feb 2019 06:02:18 -0800 (PST) X-Google-Smtp-Source: AHgI3IZjq9mAyJG7NcaJ/DkSUG5LvJUaZJPdDitPVQawU5JxSfxWdjoo+q7J33aumVjdiw77mznl X-Received: by 2002:a17:902:2c83:: with SMTP id n3mr25698912plb.104.1550498538022; Mon, 18 Feb 2019 06:02:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550498538; cv=none; d=google.com; s=arc-20160816; b=f9tRG+mQI/Hqk0yWqPtZPx4f+/vNNoT4pHDjoWtSAJaSqo69KEFD7Q3O41CJg0Yx6A z2BYlAZU1I3xECqiZ3AXzmJGIxn0oMiExt852ttOM3ldGBuhq8dWNpFZKWkJQbK/9jdQ eToFZkTPaVgcq+KEyscH8hjOTX8Op7tVxk4RBxNujDFOAwbwRRAQGKKa35ncJdJh+Z6H pKBu1LZgBKf1e2xr/whDdoNnEaZ9BzIKatIrbpoT3FiUF9KZqrZrRAk23DsW0OsSSFBc orYpQ1qtemtbYDRKl6PrD/DfE+UM496Z29sCLRHKSrTfDVlh7bLn5IYNyka4hiAILULi 3EHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PKgpZFj1ncV4HGvkWXnPsb1DdK8Qbl6gBAYBr7SY5fA=; b=MPAmCyHWaWSIAV75OiuPvei6cVIqnq1NMyQnuJCLD3wm4mduF93ihOuwcO/7lF/7N4 oLDidq3FDOSGTa5kpx55o6Q2WuW7JTDzUcsv/YtrVXePyEc0Ffi0DKKC68cKK8kbO0o3 ASjUadMlTdVQ26SxJBOA+AhPZMbSVfHckkq4fBKvHuiTgNylj0Arv03UF0qfqi5xqn1d pdLU5Xh1Yj+rq98p/AQ9FcMGl/ehnl92X9Ozw+p4ZAim+kBMCi2jCjrviIIXeCrZxTmg nmFOscyJJtHwYpKJhPsS1VIQB5V1HA/Y2BkIh/v3DD6hhs4yK1RmlG4ugI2Q8H9C9liN mi7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cQ4KkIHH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 32si14409464pls.84.2019.02.18.06.02.01; Mon, 18 Feb 2019 06:02:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cQ4KkIHH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389000AbfBROBK (ORCPT + 99 others); Mon, 18 Feb 2019 09:01:10 -0500 Received: from mail.kernel.org ([198.145.29.99]:42472 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731415AbfBROBG (ORCPT ); Mon, 18 Feb 2019 09:01:06 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3B0FE20842; Mon, 18 Feb 2019 14:01:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550498465; bh=SPMAG4igAdygU6BU963VciuVoilrWvG8nV0EQdLiI/8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cQ4KkIHHoCU7AAMMs2MM9R0dBf4ry9dzl8onIZ0lHQR2o0vb8TyQje9iKRLdJokB3 +1vVpMtCwre8fKAnri/5JnWFygk71R6TFwxu3x/MYJG1Fl3NlIcg8Mr1bdkITjO4OE ruAlxxdvmm6VMhEwIrU7Z6Ndx3+HvpUrThBqKXdY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , Pierre-Louis Bossart , Mark Brown , Sasha Levin Subject: [PATCH 4.4 003/143] ASoC: Intel: mrfld: fix uninitialized variable access Date: Mon, 18 Feb 2019 14:42:11 +0100 Message-Id: <20190218133529.250159588@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190218133529.099444112@linuxfoundation.org> References: <20190218133529.099444112@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 1539c7f23f256120f89f8b9ec53160790bce9ed2 ] Randconfig testing revealed a very old bug, with gcc-8: sound/soc/intel/atom/sst/sst_loader.c: In function 'sst_load_fw': sound/soc/intel/atom/sst/sst_loader.c:357:5: error: 'fw' may be used uninitialized in this function [-Werror=maybe-uninitialized] if (fw == NULL) { ^ sound/soc/intel/atom/sst/sst_loader.c:354:25: note: 'fw' was declared here const struct firmware *fw; We must check the return code of request_firmware() before we look at the pointer result that may be uninitialized when the function fails. Fixes: 9012c9544eea ("ASoC: Intel: mrfld - Add DSP load and management") Signed-off-by: Arnd Bergmann Acked-by: Pierre-Louis Bossart Signed-off-by: Mark Brown Signed-off-by: Sasha Levin --- sound/soc/intel/atom/sst/sst_loader.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/sound/soc/intel/atom/sst/sst_loader.c b/sound/soc/intel/atom/sst/sst_loader.c index 33917146d9c4..054b1d514e8a 100644 --- a/sound/soc/intel/atom/sst/sst_loader.c +++ b/sound/soc/intel/atom/sst/sst_loader.c @@ -354,14 +354,14 @@ static int sst_request_fw(struct intel_sst_drv *sst) const struct firmware *fw; retval = request_firmware(&fw, sst->firmware_name, sst->dev); - if (fw == NULL) { - dev_err(sst->dev, "fw is returning as null\n"); - return -EINVAL; - } if (retval) { dev_err(sst->dev, "request fw failed %d\n", retval); return retval; } + if (fw == NULL) { + dev_err(sst->dev, "fw is returning as null\n"); + return -EINVAL; + } mutex_lock(&sst->sst_lock); retval = sst_cache_and_parse_fw(sst, fw); mutex_unlock(&sst->sst_lock); -- 2.19.1