Received: by 2002:a17:90a:1609:0:0:0:0 with SMTP id n9csp832634pja; Wed, 1 Apr 2020 09:31:15 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvCRIch5tQXBkjdW+wjC2Tjr0pvribAAehscffLNCfdU+p9kz7GO+WUO1XYPGWfN+MrRobV X-Received: by 2002:a05:6830:1bca:: with SMTP id v10mr15323144ota.286.1585758675470; Wed, 01 Apr 2020 09:31:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585758675; cv=none; d=google.com; s=arc-20160816; b=hD6XO+MVhon6y/lrFJ6nrWJVL/x9Nm6O8erl2D4BK6cVB0A+dQRYKOhROK3YZAXNW3 4lXDlnsdWW3TPbJV1Tmv8dIQhSVSxb7ui2wU5uMyR4oPpk+nsi6ccd2BdjrNWiYhPZYd Ze8aTL91jp4/VjTdXUqj357iIFQC+W7QcXIfEa/qZiQdqc7E07ijSVu8gW9GF3Q7uQe3 aPlUMqH0tJ0obpgpqGNj3CTUcE3DBUJLyEtnvBGBbirNUxSNBtk7lzqmDHlUkYRioJuU iHQFTk/4QZBVPtp3LKI6uASTqrnT61CrzgMIqq22Y+WzgqdfGoerK0J6B5vFzx9pgT0a YZHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=k2MMtHLATYqhSBsQH8MCtnorikb0Kq/9gNh2g/UY0V4=; b=T4OPdBCEfkHf3WD2S61ce5o3aYlA/WClfryZ7Wx5LPxwoQ9lF9Y5dQ0gEA0eepsCKu +3upAS6cV5pd7ctx70sWmD81GzPMlSjPt11cUWSb02Gx64yYbfUv5nQMiTwx+2FpC78i Bgij31UC5UOxbJksdn/u7khQ3W09cbbsn1AcrEGk1qIFlsgossH09nD6aOQcjHZnVvs7 FtkbgR0WyBzUKgd5O55VJlOLp2CzgLNRJcHY5BexCgenmpxj7dGmlLok6EH2bG8sVq67 Frjj1fmZ/cAFg5l7RsQCER95QcdqFu9kfI451YgcvakqLbQIs7v20WAjBLGDkuzHGlGt L20g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ERgdMnmR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j184si1089913oih.216.2020.04.01.09.31.02; Wed, 01 Apr 2020 09:31:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ERgdMnmR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388147AbgDAQ3H (ORCPT + 99 others); Wed, 1 Apr 2020 12:29:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:54544 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388005AbgDAQ3G (ORCPT ); Wed, 1 Apr 2020 12:29:06 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5CD51215A4; Wed, 1 Apr 2020 16:29:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585758545; bh=m/m/Jw3A3ciNENbhVb8c9FbUWlsYv2sjeNllAtN62Ak=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ERgdMnmRDRAd15unUEHzO3Pj6S6Z7Bx7dkCFzSEeLJ86RNiLK82TEQtlXv2Ywph6g 7JWwkMN7ihthuG7ewUAfK6+XttHuRsy8rZxFMY06g/rgrPjNcbWl6Gt7mx1A3MZ+ke JcFVLapf1825BzN4ZA6Sv7maRCyptkrXxaSsoGZs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Oliver Neukum , Johan Hovold , Sean Young , Mauro Carvalho Chehab Subject: [PATCH 4.19 085/116] media: flexcop-usb: fix endpoint sanity check Date: Wed, 1 Apr 2020 18:17:41 +0200 Message-Id: <20200401161553.346436694@linuxfoundation.org> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200401161542.669484650@linuxfoundation.org> References: <20200401161542.669484650@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit bca243b1ce0e46be26f7c63b5591dfbb41f558e5 upstream. commit 1b976fc6d684 ("media: b2c2-flexcop-usb: add sanity checking") added an endpoint sanity check to address a NULL-pointer dereference on probe. Unfortunately the check was done on the current altsetting which was later changed. Fix this by moving the sanity check to after the altsetting is changed. Fixes: 1b976fc6d684 ("media: b2c2-flexcop-usb: add sanity checking") Cc: Oliver Neukum Cc: stable Signed-off-by: Johan Hovold Signed-off-by: Sean Young Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/usb/b2c2/flexcop-usb.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/drivers/media/usb/b2c2/flexcop-usb.c +++ b/drivers/media/usb/b2c2/flexcop-usb.c @@ -510,6 +510,9 @@ static int flexcop_usb_init(struct flexc return ret; } + if (fc_usb->uintf->cur_altsetting->desc.bNumEndpoints < 1) + return -ENODEV; + switch (fc_usb->udev->speed) { case USB_SPEED_LOW: err("cannot handle USB speed because it is too slow."); @@ -543,9 +546,6 @@ static int flexcop_usb_probe(struct usb_ struct flexcop_device *fc = NULL; int ret; - if (intf->cur_altsetting->desc.bNumEndpoints < 1) - return -ENODEV; - if ((fc = flexcop_device_kmalloc(sizeof(struct flexcop_usb))) == NULL) { err("out of memory\n"); return -ENOMEM;