Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2718340pxv; Sun, 11 Jul 2021 23:42:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzAE4OpRykmMbifFBFuKRCBQQ4Cww2J8yP/+qyvZ3LLlocx61F8rM5J1t6rro+Mhib1hkJA X-Received: by 2002:a17:906:cec1:: with SMTP id si1mr32606113ejb.18.1626072150484; Sun, 11 Jul 2021 23:42:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626072150; cv=none; d=google.com; s=arc-20160816; b=SbMcAxfk3fTh3OVC0SeoepF9BJREuJIn2Qiydm29XJRCcCunR3GQX1JJOXpPqjDG5V r4JHDr0NQK3WAgIH4OyjiRmhqWFnOTn33STcY8wj63v1zG6mAKX5QnEZIZBQIOKNQttz IYhfmHI5EjMWwJe5zr/DPOYGt0VmqpdUiNs9lmU29EkrtyPdHQT1UX5tG9TtHMK+Ew9P +FzZOSmfmBgDzLjMWUNBVpSkandd2AIN69SOxgrRpfA2/JZIjichQ9hLu6uU/b7V8gh3 hD60uZ2/JSqRGfc97RgQCrz+KfXE7A2WSq1CnBL7w8SoSnvz/pp3ige+MF9++3XYrltC 3o8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=UcDcJQUv7OHEzZzO87HrORlmnGoFKMGCv/Rt1BIweIw=; b=eD51YcBidzuq1e4BTJwef0WqEIrUvwqmaeDpgZ+mAeNTs9vLk/0V/kfUdq36trloJM 2GyRNt5lyxXVQ6au3In5Njp4ytknugYK8lTFJNl3louUNsp2AWK9INA/xBcMzNrLgM1u 7GC/HK1OuRzcGQebtwAb7Fnq34zdT+AhMp6ZJMSpyUtr+8Qiq6VSGJAgOqWopeHHCEq9 yZ0IHIJwqdjPrrjNG6KrN7eF+Xlx2rguq05v/Q9LDU5CI23xd7uhA1hzgGbuh1XRrK3T JXosSfavvqhPwRkObjJNdDVKnjAljUk1Vuvu/4cGAoBhAW0X9Bk8LsKM67K+mMjlnkAe XA/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=YQREsowF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i8si20001379ejj.636.2021.07.11.23.42.07; Sun, 11 Jul 2021 23:42:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=YQREsowF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238126AbhGLGni (ORCPT + 99 others); Mon, 12 Jul 2021 02:43:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:55532 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237652AbhGLGen (ORCPT ); Mon, 12 Jul 2021 02:34:43 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 97D7E61166; Mon, 12 Jul 2021 06:31:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626071469; bh=WZZT5w4Bkeo+YwtsfIDG7WBHhky+Y/drB2kLyflO1ig=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YQREsowF4c2vDN6bD7K4bmvdzFZ2a3z16CPm8dhpHaSQxa+O9tRUrKHTxGqPzGjeI iBrnk5hcwvkHz8oLtcL0Z7zXRMOmd4+4WvMRjifm+sXsfmGx5hLfiRhmE2TXi+gYMZ KMoLuVY5i5/BtkWMM++wRgF9hT1Vci2OBW3Yhk28= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Michael=20B=C3=BCsch?= , Kalle Valo Subject: [PATCH 5.10 083/593] ssb: sdio: Dont overwrite const buffer if block_write fails Date: Mon, 12 Jul 2021 08:04:03 +0200 Message-Id: <20210712060852.282055310@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210712060843.180606720@linuxfoundation.org> References: <20210712060843.180606720@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michael Buesch commit 47ec636f7a25aa2549e198c48ecb6b1c25d05456 upstream. It doesn't make sense to clobber the const driver-side buffer, if a write-to-device attempt failed. All other SSB variants (PCI, PCMCIA and SoC) also don't corrupt the buffer on any failure in block_write. Therefore, remove this memset from the SDIO variant. Signed-off-by: Michael Büsch Cc: stable@vger.kernel.org Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/20210515210252.318be2ba@wiggum Signed-off-by: Greg Kroah-Hartman --- drivers/ssb/sdio.c | 1 - 1 file changed, 1 deletion(-) --- a/drivers/ssb/sdio.c +++ b/drivers/ssb/sdio.c @@ -411,7 +411,6 @@ static void ssb_sdio_block_write(struct sdio_claim_host(bus->host_sdio); if (unlikely(ssb_sdio_switch_core(bus, dev))) { error = -EIO; - memset((void *)buffer, 0xff, count); goto err_out; } offset |= bus->sdio_sbaddr & 0xffff;