Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp268416ybi; Wed, 29 May 2019 21:02:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqxshC1xCsThKUGyTInpahMaER8UFhV3R27Xod2QgRQgE65L3Zjar8wKpnOM4gZYuDRzhhWT X-Received: by 2002:a17:90a:d3c6:: with SMTP id d6mr1488703pjw.25.1559188950923; Wed, 29 May 2019 21:02:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559188950; cv=none; d=google.com; s=arc-20160816; b=dMbSvp+ciiz+2FNTzoBZ+NxgLRQZAwZGOSfaQD05sCynw+vGlDAPYpu9LXmF4nhUcQ 305lnzyHFeeUDD0VV4e19qOmFLm/KuvgDV/03d1fqfkPY0g6rLwXOW9RoMUOXtPdbdnS q/Xj2AIh/V49MbzxelxuiC9bwCd6vR21PXUHnnICngoWrF6Bqoxc6AvYCHvlaMZX4ZmM GfnHUF9UfJ9gf+mnTZ01x1DN5LhGW7fUGX02njm69czOKGoCGj9SMKIz0MA22lWyFO13 AwaGq4CBFFnoNuofDCHc6tPJ3FKg4raBiUCs4A/gfF4GfW+RybVFiKLR3hegZ16YiMI+ qG2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0yVYHBgA2SGrPGi7CLfIXCX2EWcTygVEhSwAgsB7Y3E=; b=RSp9V+0wUU1fMqdyKNKN36GvtvKniCB9pXaD0K9xGGQ1ZauFFtCE1QKwTKxkJ4DZyj TZddzqsgwjEluZTxYMMMLFAHiBYaFdLNVu9W0VkpXXHoQI3dyoS0X+gni/h6s3KoCHFP NRy00pCZ0ZKxuEEqyA5gv3kBQovkLqH/hSPUrVvZLj2+TqzHL7v3CcPH3Mjw9hsbaJM8 +XYPuozzUHeF9fmh0Nac/k51rpL2o4qzLgHF5gOj8yCMAE7BcrfAPIu9LiKi1QVK4tqR /wiwVhNhEE/EP2cqyCVIAMEX8ebr2ZqvqDDi658l3qP7UBP0RNPsrpM9fXesoYIPuWew CodA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0N0DwvY5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l7si1879224plg.222.2019.05.29.21.02.14; Wed, 29 May 2019 21:02:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0N0DwvY5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731957AbfE3EBN (ORCPT + 99 others); Thu, 30 May 2019 00:01:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:50268 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731458AbfE3DSL (ORCPT ); Wed, 29 May 2019 23:18:11 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3853024782; Thu, 30 May 2019 03:18:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186291; bh=wNIIGNdY+3Ff5ByT6wZINYkqc6SV4Xy+MelFjAUT/GE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0N0DwvY51vqTd+5tnDQc4qHGXfxMmtqFJ66UCygrXpyEQjSyleYpotaD725f0Mp71 mmzjVp5kAP2gqwNfXdoyRF5lvsMeRiTFyhq7vIqIbxFKrWN/mUvQ9BV+qGxK6M3jPc dIOLnczAZyTNlKpk962OKCug8a6469jdeVoADIis= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kangjie Lu , Matthias Schwarzott , Sean Young , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 4.19 249/276] media: si2165: fix a missing check of return value Date: Wed, 29 May 2019 20:06:47 -0700 Message-Id: <20190530030540.713606171@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030523.133519668@linuxfoundation.org> References: <20190530030523.133519668@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 0ab34a08812a3334350dbaf69a018ee0ab3d2ddd ] si2165_readreg8() may fail. Looking into si2165_readreg8(), we will find that "val_tmp" will be an uninitialized value when regmap_read() fails. "val_tmp" is then assigned to "val". So if si2165_readreg8() fails, "val" will be a random value. Further use will lead to undefined behaviors. The fix checks if si2165_readreg8() fails, and if so, returns its error code upstream. Signed-off-by: Kangjie Lu Reviewed-by: Matthias Schwarzott Tested-by: Matthias Schwarzott Signed-off-by: Sean Young Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/dvb-frontends/si2165.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/drivers/media/dvb-frontends/si2165.c b/drivers/media/dvb-frontends/si2165.c index feacd8da421da..d55d8f169dca6 100644 --- a/drivers/media/dvb-frontends/si2165.c +++ b/drivers/media/dvb-frontends/si2165.c @@ -275,18 +275,20 @@ static u32 si2165_get_fe_clk(struct si2165_state *state) static int si2165_wait_init_done(struct si2165_state *state) { - int ret = -EINVAL; + int ret; u8 val = 0; int i; for (i = 0; i < 3; ++i) { - si2165_readreg8(state, REG_INIT_DONE, &val); + ret = si2165_readreg8(state, REG_INIT_DONE, &val); + if (ret < 0) + return ret; if (val == 0x01) return 0; usleep_range(1000, 50000); } dev_err(&state->client->dev, "init_done was not set\n"); - return ret; + return -EINVAL; } static int si2165_upload_firmware_block(struct si2165_state *state, -- 2.20.1