Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3838738pxv; Mon, 19 Jul 2021 09:58:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzQn5GCFhdVhoI+odreFibyF/eMowwN9qVdh33mgrat3ckSYwjzQXrS/3wYhJMnXK9hLnFR X-Received: by 2002:a17:906:13d4:: with SMTP id g20mr28051376ejc.337.1626713915326; Mon, 19 Jul 2021 09:58:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626713915; cv=none; d=google.com; s=arc-20160816; b=ID/jbO+0SuN3M6oBlbgSLND8DimjHEHyMuFJXBkraWqaTX0vR8sa2sj7/N3S+Lz2KK VfPRBoqGs6ov0+xGJjtU2fZh0jA1ZTDB6LwHbQBDuFq+4x34RpDjCzMdIccKEQJgDMok inCgGl+1kE+T8BEgtmvs/AQ7U1Q9bSTIemrGL1xB9YNIxBQfi1xaCZo5+HqlGU/nSoxM szUvAcA1Xcy2FcqzBTaPo/NR6NsOGCv7blojsGXsrK2JLCHuz65jAry5DhrdS9lIo5VL nval/WBd+28/5p+V8KadEnQA0JbstGoocMSMwH2rsKq0IsD5s5QqCLaASBRqgHqZnXIV zcPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KmAol5glX/PBHEh95r2F20K4CtRzv+/P9KPhdt71bM0=; b=vQUCbtD0dahbi4OmM34Uj5eSko2G3g0b8m37wdeFPWjEPksu2eSHLgl3s9kyY9iTAa uEnN2XJTE28tPz3dPUvDatynf3wKwFIufNvpSp48+RcqeqGnnW8B+DEZyGYd3W2faZAe kQ7V4lLzIxwEpU7HV4kTGkE2Dlg+oJP6uS/3ggIsD/xWtt9WrYEPQ7rJT9p5bEe8/hFv mcMIG+lNcxDXWQEn89FoK9ewle780GoZHZnZLONdITkwX4uqEEH+hUrfvK7uE0JRLtvv E+owR1RbJNTgZ1jtSc9sopH1qe2qJZH5Y41g6deMDOFi6DQIpQXbElo+epfbxwTFAigj De8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0N9oGlGG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z16si26888015edm.47.2021.07.19.09.58.12; Mon, 19 Jul 2021 09:58:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0N9oGlGG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350783AbhGSQMK (ORCPT + 99 others); Mon, 19 Jul 2021 12:12:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:39054 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345100AbhGSPHz (ORCPT ); Mon, 19 Jul 2021 11:07:55 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 12CDE6120A; Mon, 19 Jul 2021 15:47:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626709678; bh=hwI9xTL2ebUdO0DmxdC1jpzwPPvsqSev3UsSzitDOfE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0N9oGlGGLXNnvwyqEsY9ZnuOEUxHk9TMYOGp5KtQmkNH8Ugn+RdTM3L6Dj11LUQbO 41tzcboa8ibEzpzCj166DwBQm77cSWBhswNgguprQuATWZn+Z8E/cRnzcrBMNpi+7q zcpK9yPLfqEM91cp+C2Dznh5f0dT6M424NhZ/3VE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yizhuo , Dmitry Torokhov , Sasha Levin Subject: [PATCH 5.4 053/149] Input: hideep - fix the uninitialized use in hideep_nvm_unlock() Date: Mon, 19 Jul 2021 16:52:41 +0200 Message-Id: <20210719144913.980281995@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144901.370365147@linuxfoundation.org> References: <20210719144901.370365147@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yizhuo Zhai [ Upstream commit cac7100d4c51c04979dacdfe6c9a5e400d3f0a27 ] Inside function hideep_nvm_unlock(), variable "unmask_code" could be uninitialized if hideep_pgm_r_reg() returns error, however, it is used in the later if statement after an "and" operation, which is potentially unsafe. Signed-off-by: Yizhuo Signed-off-by: Dmitry Torokhov Signed-off-by: Sasha Levin --- drivers/input/touchscreen/hideep.c | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-) diff --git a/drivers/input/touchscreen/hideep.c b/drivers/input/touchscreen/hideep.c index ddad4a82a5e5..e9547ee29756 100644 --- a/drivers/input/touchscreen/hideep.c +++ b/drivers/input/touchscreen/hideep.c @@ -361,13 +361,16 @@ static int hideep_enter_pgm(struct hideep_ts *ts) return -EIO; } -static void hideep_nvm_unlock(struct hideep_ts *ts) +static int hideep_nvm_unlock(struct hideep_ts *ts) { u32 unmask_code; + int error; hideep_pgm_w_reg(ts, HIDEEP_FLASH_CFG, HIDEEP_NVM_SFR_RPAGE); - hideep_pgm_r_reg(ts, 0x0000000C, &unmask_code); + error = hideep_pgm_r_reg(ts, 0x0000000C, &unmask_code); hideep_pgm_w_reg(ts, HIDEEP_FLASH_CFG, HIDEEP_NVM_DEFAULT_PAGE); + if (error) + return error; /* make it unprotected code */ unmask_code &= ~HIDEEP_PROT_MODE; @@ -384,6 +387,8 @@ static void hideep_nvm_unlock(struct hideep_ts *ts) NVM_W_SFR(HIDEEP_NVM_MASK_OFS, ts->nvm_mask); SET_FLASH_HWCONTROL(); hideep_pgm_w_reg(ts, HIDEEP_FLASH_CFG, HIDEEP_NVM_DEFAULT_PAGE); + + return 0; } static int hideep_check_status(struct hideep_ts *ts) @@ -462,7 +467,9 @@ static int hideep_program_nvm(struct hideep_ts *ts, u32 addr = 0; int error; - hideep_nvm_unlock(ts); + error = hideep_nvm_unlock(ts); + if (error) + return error; while (ucode_len > 0) { xfer_len = min_t(size_t, ucode_len, HIDEEP_NVM_PAGE_SIZE); -- 2.30.2