Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp455537ybl; Tue, 28 Jan 2020 06:15:22 -0800 (PST) X-Google-Smtp-Source: APXvYqwSB17VPYZhIek8m8QBWP+LOHWTWwIXgwJU6s9yEMQybejmNcO77kZ35lGTIBgbv8ZCVkNN X-Received: by 2002:a9d:7ad9:: with SMTP id m25mr15719630otn.13.1580220922069; Tue, 28 Jan 2020 06:15:22 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580220922; cv=none; d=google.com; s=arc-20160816; b=eihfBGeNK8SWpKetdU1CDK9UmPcix4aENx/yr7/TB1lGqXS5w95MCDrfG7MtZB0rI9 zWmHCY+uUkk1Rkk6xrioZT6gbIYt+8KQB62rAkXSYp/SdsOz5lC/pmJDOWlM926q722Q mm96683qRoiNj1/W9T0+S82DP24adYB8pO6rTjaia5ZzamxHv3RU5oRBXi8djWspGUeA i6U9TxUumDe8K9koN11xMUyJThJ+yS3mMT/6oS76uWEbVGeugtBgZhCh9z6NvWEV09Pl opVwQto49guwrALJVolFRg+qKIewD5mUoYEX+CBAOCbnPjs+syXGzRJIHHev6CDOC6jO 3TrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=B02dLOIb449hL1bbCeMEj/93Wf9dE5824wks6N17H34=; b=rR2lPMzlZyCHSjjz/zjXlOUBVZY+8gm7jF4LfoSo9KOrPHk4wzW4tfaTKOQ0ufwKeZ jLEH9XPvnyU74ZZTiEP8NtopcM88C8TOu7BVcCDFlQl7RB6seURoOzoQjfJKVJMsIrop II9eH3FzlBs9d1QiI7SgIe3iz6wWjCq/FAgqkqIUxrJKX6TP6T4vHYLL6mpog0LWg3J5 zj3EnxwiDkZnG9V9fI3w0ZEi0Y+/9iyAapjXptBQ7GErJjqvw+VKr+MS1lJLKL+IEyDb CHzPJf/tAsmGZBt7KdsaSjj1KRhCibaICZURfq0BYKRAz3XOi2Ghyo61a3dj+NpTKaG/ P5Dw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hDSfuQgi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o16si8292666otp.289.2020.01.28.06.15.09; Tue, 28 Jan 2020 06:15:22 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hDSfuQgi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726666AbgA1OOP (ORCPT + 99 others); Tue, 28 Jan 2020 09:14:15 -0500 Received: from mail.kernel.org ([198.145.29.99]:36152 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729346AbgA1OOL (ORCPT ); Tue, 28 Jan 2020 09:14:11 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 599AB2468A; Tue, 28 Jan 2020 14:14:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580220850; bh=TRygmATlpOnwP3VyIgZunWDlUyNInfeeR3yzkAF9/nU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hDSfuQgix1QKMov59UHrsQ9bj/344NQRbxI00qxHxGc1WF1ME4UojMwOU2ew8lV4n RBbfPXVNxUFjNmuaM8C+ScFHVs26Tjq/mGQxXJqjpu36HSW/J45qo+PYh9LSC/yNVa 9AkSynp8KQFvmwy3FXJgJsE8jnpmnx4TIyb7mWvs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Vladis Dronov , Dmitry Torokhov Subject: [PATCH 4.4 172/183] Input: aiptek - fix endpoint sanity check Date: Tue, 28 Jan 2020 15:06:31 +0100 Message-Id: <20200128135846.930574642@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200128135829.486060649@linuxfoundation.org> References: <20200128135829.486060649@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 3111491fca4f01764e0c158c5e0f7ced808eef51 upstream. The driver was checking the number of endpoints of the first alternate setting instead of the current one, something which could lead to the driver binding to an invalid interface. This in turn could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 8e20cf2bce12 ("Input: aiptek - fix crash on detecting device without endpoints") Signed-off-by: Johan Hovold Acked-by: Vladis Dronov Link: https://lore.kernel.org/r/20191210113737.4016-3-johan@kernel.org Signed-off-by: Dmitry Torokhov Signed-off-by: Greg Kroah-Hartman --- drivers/input/tablet/aiptek.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/drivers/input/tablet/aiptek.c +++ b/drivers/input/tablet/aiptek.c @@ -1820,14 +1820,14 @@ aiptek_probe(struct usb_interface *intf, input_set_abs_params(inputdev, ABS_WHEEL, AIPTEK_WHEEL_MIN, AIPTEK_WHEEL_MAX - 1, 0, 0); /* Verify that a device really has an endpoint */ - if (intf->altsetting[0].desc.bNumEndpoints < 1) { + if (intf->cur_altsetting->desc.bNumEndpoints < 1) { dev_err(&intf->dev, "interface has %d endpoints, but must have minimum 1\n", - intf->altsetting[0].desc.bNumEndpoints); + intf->cur_altsetting->desc.bNumEndpoints); err = -EINVAL; goto fail3; } - endpoint = &intf->altsetting[0].endpoint[0].desc; + endpoint = &intf->cur_altsetting->endpoint[0].desc; /* Go set up our URB, which is called when the tablet receives * input.