Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp7354222yba; Thu, 2 May 2019 08:30:17 -0700 (PDT) X-Google-Smtp-Source: APXvYqxNfQ3SJPyujtzg5Tbe/21HwEgUualo4gpB1+48Vr7SIfEAMFW//pjI2pZz7HSJXLtKmGjf X-Received: by 2002:a17:902:7c93:: with SMTP id y19mr4438426pll.55.1556811017020; Thu, 02 May 2019 08:30:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556811017; cv=none; d=google.com; s=arc-20160816; b=ys4jMlp+vbcni+Ga7TGIoaIHSHIXr1oq9Ph3ENOW9YaNPdWN+xou6S1wTtR73iI+0E l1/IIoc/ODD6HTY16SaSRRiGYq/nNt2tIO7MxeaDJ8JaP+QNlpaHd1c0BRlxOhSbA7tk eTNcTksn5lKZdfm5tA3e93IRiBlgY7xn9Kx3K8+IVoe4uWlxmYIq+fYwEVNgJzO6qt13 Ju4NGsmI8j4hQdw/jZgjjOwLiz0a5DFFkb5P5KPbbBPxRp1KYf1IzMnc0DuTjV2Tyn+p PXTNP1EOkx+gTaVPejIfvlvOxtFeNuWpqTU6VkZIlAl19gss4blgFt5ddYgBR0B6jin6 8OlQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=xCY9mFoGFTmGrfaoIObcWsTJ3WZ/Wa+pcoqOumhJnY4=; b=EmKI1Snxl5OVjfoeEAEZNapr1FNWYlK59YllJnA3E88HQIBOZGuY8bNLveVsO7HrVb 5wO6L5F0BvbnLXmvOxnwRUhPkrrJ/rObbX3H+EjARt1JOTKhseXrxrRG5cPZRvyFLDJZ Koi+MuAv3gEp/SpxrW36r3JfqbIysjZ2V3pk4Wt7VBA4nRI1wGtljo94kVjYHtSM3/jC /e2mzJGCqCmAk+ukbfDkKvs2ERmelsk0ci6wX5/ojC+0UgTFEtKuHmpSDxPhZgE7IjId EC1cTj9yji/Nv5WLWvlwOi+OKfiP2UQpaJCVxVSvo7nyeiBmlETZKDyLbLnLr5dvPPaG qTMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dGcsj5Lz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z1si27211226pgb.581.2019.05.02.08.30.00; Thu, 02 May 2019 08:30:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dGcsj5Lz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727705AbfEBP2j (ORCPT + 99 others); Thu, 2 May 2019 11:28:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:45912 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727403AbfEBP2g (ORCPT ); Thu, 2 May 2019 11:28:36 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EDF0020675; Thu, 2 May 2019 15:28:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556810916; bh=bX/q7qkLSeJnBfh86gMhWCiYqGgWCc51M0T+sqV7Au0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dGcsj5LzcdgzPHbQvpiH5pBuSQT5YdyZjjG4RCXwJd/vbTocBLSS7A0h2JQTb510q 1UdqP9KwPC63lJnAbXUQRH4gsUbxY/J2p5HKc628ARwD0/nerFLpUNIv2HhrnO+wGu GJnt0Q9/nnT0EjiK7uzzumOFjpdv4IETZNpRClRc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Aditya Pakki , Richard Leitner , "Sasha Levin (Microsoft)" Subject: [PATCH 4.19 57/72] usb: usb251xb: fix to avoid potential NULL pointer dereference Date: Thu, 2 May 2019 17:21:19 +0200 Message-Id: <20190502143337.920245890@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190502143333.437607839@linuxfoundation.org> References: <20190502143333.437607839@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 41f00e6e9e55546390031996b773e7f3c1d95928 ] of_match_device in usb251xb_probe can fail and returns a NULL pointer. The patch avoids a potential NULL pointer dereference in this scenario. Signed-off-by: Aditya Pakki Reviewed-by: Richard Leitner Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin (Microsoft) --- drivers/usb/misc/usb251xb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/usb/misc/usb251xb.c b/drivers/usb/misc/usb251xb.c index a6efb9a72939..5f7734c729b1 100644 --- a/drivers/usb/misc/usb251xb.c +++ b/drivers/usb/misc/usb251xb.c @@ -601,7 +601,7 @@ static int usb251xb_probe(struct usb251xb *hub) dev); int err; - if (np) { + if (np && of_id) { err = usb251xb_get_ofdata(hub, (struct usb251xb_data *)of_id->data); if (err) { -- 2.19.1