Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp437930ybl; Tue, 28 Jan 2020 06:01:51 -0800 (PST) X-Google-Smtp-Source: APXvYqzzpscMjG6t18i1NbvYH+EF4Xqr4Uk8qW987HD99O30vDPv3nAh1koR8CWhK4nUooSh9IWV X-Received: by 2002:a9d:6196:: with SMTP id g22mr16850587otk.204.1580220111335; Tue, 28 Jan 2020 06:01:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580220111; cv=none; d=google.com; s=arc-20160816; b=vFD+PfqB93LeV6rjn7WWLJ8xqTC65HRTlvtI3V2M4ILBEvgxm36oZNeeQNOTY5n4SE KoOoTMEy1MhQHPh1DHNmwwxQ3wEvuB62gu48vVdhQX53jRdBaE0eJbAVWs0+gVRRzmxS aYUKAdjQzrhPnQcmwUYiDAcv1PPww9d4yP7b1fctAcvmMFPj9q1VMcrWSGck3wh1Nvsm B8Bxcfd7T8wXQGb9WyKEQMhJtCTIAeehmxbwMBdXhJmc9LYmIP/l5cMRlldPk6TWsPfx gV73yNcUr7Xsgz83fZj0MzHMZW8W2NMGwJFJD0gPRPZvRhbIyUq4URorHkytb9Jh/9Pk 93IQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=B1pVuK462oLmEVXEv6461JUzjIp2Vvdm6UJdRCy6X9U=; b=Ao/b36toJqv4LNPT0C4+T3Ygvc4Z4+nIx5CDJriBZoV/jhVB/kJUetg2GAnNJrqUah 4mCrEzyJk3dN2Vgbk9sZMJw6/YJQs9nu+QgT4Xdr5jMxH532Mp6mdtDVVym4gEs05I4q LfpgDxB6NySJZH7G/OZe24IL0WRQs5tJBdPbBxVf6sVZ5mr2iVLn5qZCcmG+nlJk52Or q8kJFnS2wxnpyYXcpHaz9GjvlR4zcUT5YK7e+rZiEjy/w8pXxQXYRv7om1iU6Aqn/BPi 9ZIuRwE3/NvSCqvGjPPU0JpzBXLJZG/8q2P87Z8w8V+SEj/x4AdPCZPXaldsuumW2DqX 3UGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZnLi41eV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u23si5075370otj.242.2020.01.28.06.01.38; Tue, 28 Jan 2020 06:01:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZnLi41eV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727209AbgA1OAI (ORCPT + 99 others); Tue, 28 Jan 2020 09:00:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:45692 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726273AbgA1OAF (ORCPT ); Tue, 28 Jan 2020 09:00:05 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5F6C02468A; Tue, 28 Jan 2020 14:00:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580220004; bh=6Zf7WpmE37b/Hbx0ZBYx+MP+UHtZ5PHCF50LJoYk9ZQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZnLi41eVAGk91TayeClCMclDaZJOcSPqfTslY+8HZXNeazT1WFW06DiCyZ4QzHvuC ZOcus2cHwL/8BQNgR9EKGS/Pi6euzo06YJfMJxYSaKzK3Gjg6Bt0tD9cG5BhKWjLJu hEqC0z9tTCzkDKsoEU3hSjoseu8Rhj2wPNwEaRTc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Vladis Dronov , Dmitry Torokhov Subject: [PATCH 4.14 30/46] Input: aiptek - fix endpoint sanity check Date: Tue, 28 Jan 2020 14:58:04 +0100 Message-Id: <20200128135753.992900345@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200128135749.822297911@linuxfoundation.org> References: <20200128135749.822297911@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 3111491fca4f01764e0c158c5e0f7ced808eef51 upstream. The driver was checking the number of endpoints of the first alternate setting instead of the current one, something which could lead to the driver binding to an invalid interface. This in turn could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 8e20cf2bce12 ("Input: aiptek - fix crash on detecting device without endpoints") Signed-off-by: Johan Hovold Acked-by: Vladis Dronov Link: https://lore.kernel.org/r/20191210113737.4016-3-johan@kernel.org Signed-off-by: Dmitry Torokhov Signed-off-by: Greg Kroah-Hartman --- drivers/input/tablet/aiptek.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/drivers/input/tablet/aiptek.c +++ b/drivers/input/tablet/aiptek.c @@ -1822,14 +1822,14 @@ aiptek_probe(struct usb_interface *intf, input_set_abs_params(inputdev, ABS_WHEEL, AIPTEK_WHEEL_MIN, AIPTEK_WHEEL_MAX - 1, 0, 0); /* Verify that a device really has an endpoint */ - if (intf->altsetting[0].desc.bNumEndpoints < 1) { + if (intf->cur_altsetting->desc.bNumEndpoints < 1) { dev_err(&intf->dev, "interface has %d endpoints, but must have minimum 1\n", - intf->altsetting[0].desc.bNumEndpoints); + intf->cur_altsetting->desc.bNumEndpoints); err = -EINVAL; goto fail3; } - endpoint = &intf->altsetting[0].endpoint[0].desc; + endpoint = &intf->cur_altsetting->endpoint[0].desc; /* Go set up our URB, which is called when the tablet receives * input.