Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp207337yba; Sat, 4 May 2019 00:24:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqySkQ1X2TAmuoLmpodub6PfXy4JJ3pTY1Hs3ff0PKyF2Hp6jsNhc2LJd/nuK+EzLQJLZosI X-Received: by 2002:a62:e10f:: with SMTP id q15mr17500248pfh.56.1556954647194; Sat, 04 May 2019 00:24:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556954647; cv=none; d=google.com; s=arc-20160816; b=BkkSY4XrGlOITWHFCo+wwJj6dxt5wPr43bfaYafIc6OmBqUGe10sYqRoaoXJ2RHOoP prAtarGckbmjZCim8xhA+gCkrWgcGhKE1yAmj6TRnEvx/EEvsu7YPBjnT2xDaULcID11 ItCjN9FYWEHGxmB/kV4bk0c5LpCEHdXOdBdxcd7TNBWmRt78CVJlL9KsQa3oAjgu6Dv+ bfJYqE9Mehg3D1NTMksWHBg2PTgpeAl0FIDUJkTAJXxQrcOXjeTvg5MMy7TBsTi+fBVf VdTOXPA8nsPSgOWJeJZZMuD/2M7k3IIa9wyM5A1TXYw1djjqb3UMl2dduXwCZkSV9lDU 6CXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=CufNwU/qVlPedKNXZEFFSFTx3AAZ1NnfGnKxwKa2LzA=; b=V0zAjQUoio8nPDJK8o3NMAK8XrAd87KIb6JR2/2nS3nLLUpDLIsmdBigW+DHsm4Zbs YWyvQeU1FnrYAEzcumPB3lvoYiaN9ylDzvzy9Zk+KEzm7es9zHDAQl/cgInfLKAWX0Bi ailejai0t0Du+TCHHr9fCSO049j4bxfolvwW/JmyWstTGjMIi02Na3x8LskGjqOqrpY0 WHonlgx2Y1dVI1u2bNesQBA5DyGYFm7wLdPjvLpKJ4eOw38fsru4cJ5k7nqlbsGOmboa 5QUaqi/eseMzLfAw+tQcKLXJg6Ys9hRHFk0aA3X3VEU9KRzgJLbvrfaAMxGLB6iJnvJA wqbA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="uPZNCo/d"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e14si5384238pgv.210.2019.05.04.00.23.51; Sat, 04 May 2019 00:24:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="uPZNCo/d"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726579AbfEDGpa (ORCPT + 99 others); Sat, 4 May 2019 02:45:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:46346 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725802AbfEDGpa (ORCPT ); Sat, 4 May 2019 02:45:30 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 37AA920675; Sat, 4 May 2019 06:45:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556952329; bh=LGCs4gvPTmGr/6mh5CkkCOnBvPtC6U3fKyL7tODsf90=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=uPZNCo/dsELO/HxHPmYaPXapjZsBEx9NDHyE0uCgKGEdT6skj1Gfyo8zMiXMqucyv Sq8BkeDRmOfSGn5tLAXB8P2ppTVjQNm4WMKAI+HCXMZ91wmzbrGNHN2btMVuKGCN+H mU7/cQgYNETeGJ6kp//UsfYu2feKn6YBDrwALo7M= Date: Sat, 4 May 2019 08:45:27 +0200 From: Greg Kroah-Hartman To: Pavel Machek Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Aditya Pakki , Richard Leitner , "Sasha Levin (Microsoft)" Subject: Re: [PATCH 4.19 57/72] usb: usb251xb: fix to avoid potential NULL pointer dereference Message-ID: <20190504064527.GD26311@kroah.com> References: <20190502143333.437607839@linuxfoundation.org> <20190502143337.920245890@linuxfoundation.org> <20190503213235.GA9080@amd> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190503213235.GA9080@amd> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 03, 2019 at 11:32:35PM +0200, Pavel Machek wrote: > On Thu 2019-05-02 17:21:19, Greg Kroah-Hartman wrote: > > [ Upstream commit 41f00e6e9e55546390031996b773e7f3c1d95928 ] > > > > of_match_device in usb251xb_probe can fail and returns a NULL pointer. > > The patch avoids a potential NULL pointer dereference in this scenario. > > > > Signed-off-by: Aditya Pakki > > Reviewed-by: Richard Leitner > > Signed-off-by: Greg Kroah-Hartman > > Signed-off-by: Sasha Levin (Microsoft) > > --- > > drivers/usb/misc/usb251xb.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/drivers/usb/misc/usb251xb.c b/drivers/usb/misc/usb251xb.c > > index a6efb9a72939..5f7734c729b1 100644 > > --- a/drivers/usb/misc/usb251xb.c > > +++ b/drivers/usb/misc/usb251xb.c > > @@ -601,7 +601,7 @@ static int usb251xb_probe(struct usb251xb *hub) > > dev); > > int err; > > > > - if (np) { > > + if (np && of_id) { > > err = usb251xb_get_ofdata(hub, > > (struct usb251xb_data *)of_id->data); > > if (err) { > > Are you sure this si correct? > > If of_id is NULL, this will proceed without setting up hub->conf_data > etc. > > I'd expect it to just return error from probe...? I think it will error out later on. > Was this tested? Don't know, error paths are hard to test :) But the code obviously fixes a null dereference, so that's a good thing. thanks, greg k-h