Received: by 2002:a17:90a:1609:0:0:0:0 with SMTP id n9csp842235pja; Wed, 1 Apr 2020 09:40:56 -0700 (PDT) X-Google-Smtp-Source: APiQypK4KTjuepNz8JCRj86ZXQ/hWc+o4ZEf81Tw/mATl7srvThAXmdaWxaAFy2aoFCI6M72trGY X-Received: by 2002:aca:5b04:: with SMTP id p4mr3697902oib.105.1585759256446; Wed, 01 Apr 2020 09:40:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585759256; cv=none; d=google.com; s=arc-20160816; b=T/Dx4eT67W7QySvM7UP0ztpFAxh/c1Vh3X/LI3qMViw4771kmkKWHLzGJbE+30e9Ph 2IJaEyNftvW81pU24Wvi3YOKznZ2ZSLZmXBWFiIU7yYav4gfxzApfS6kgz2D1iHcH0hi c06mBnQvL4nm/qI9jiZjhv4+V4+p2dRgHxE8pMl9s9xA03MZlORnO8N6O4CYXjp96V+m CEotgC4OXZNOJx7nTOunxDQpJDm2jKJOhB5SG0rf3LAW/DOj4I8VGtBAPvvoiiO3HVtu gxUz4U6b5ZyijkhbCvDLPobEN3bpPuWwxag9Q4TWKNmMhIuaR9yp193vA8v/bhtu/sAS 7fng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=k9A6o80rEdpk1xb5UhTjL6tlilhLXzKioVSs7MUKbXk=; b=C3y6HVPaaZxGyNxLtby7sYiOrGIeuMAqNIxxyR9R02gGTxayRcKR5RFZ99+clpzRRM z5WYoKp4UDaPL4zP5iDYz5IttSLHvXfNjNgz/GpCPMVwpf2jPYre5JTHvygV0HqmPV07 Na1qiFBahyB2XCvvKQniyoMhPaWhs5Bieq5K+pCdx10OTxox9kVpUybP0RP7tQDd+SU1 VbfSgfk7lqCXjcRUO7mc5lPwbMhgGu6fNOedZSO/unPIV7mK1Z6Aqn1sxx2G/DBoU0I0 eW/kLbg86LfIO1aEbPJhY60EP2IhaHU8nMEE2WEKHAV0pPLROYqfWak++F/OV/GqE8Ih IOIA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wSO7Kul3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x136si1088990oif.122.2020.04.01.09.40.44; Wed, 01 Apr 2020 09:40:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wSO7Kul3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389143AbgDAQkJ (ORCPT + 99 others); Wed, 1 Apr 2020 12:40:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:40290 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388112AbgDAQkI (ORCPT ); Wed, 1 Apr 2020 12:40:08 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 477B720658; Wed, 1 Apr 2020 16:40:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585759206; bh=DF2vG2JENOKeJQt1F4AhXFxKkI4NDkRA7YESUG6WUw4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wSO7Kul3tLOUEoVigp29kKvxaunZu062oEofrNnbv4LX32YFbtjz/Rcvawg2O0z89 uT3ocBe2gEtIi6h1M7aTfttew3XL4FHFAssYGlIddFk7ESKZhDofxRIp0UZbGnfubM UBl6ZPrG6wJn7bvraRohlAIPzgTRwEzSmD7sj2hQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Oliver Neukum , Johan Hovold , Sean Young , Mauro Carvalho Chehab Subject: [PATCH 4.9 080/102] media: flexcop-usb: fix endpoint sanity check Date: Wed, 1 Apr 2020 18:18:23 +0200 Message-Id: <20200401161545.984703461@linuxfoundation.org> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200401161530.451355388@linuxfoundation.org> References: <20200401161530.451355388@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit bca243b1ce0e46be26f7c63b5591dfbb41f558e5 upstream. commit 1b976fc6d684 ("media: b2c2-flexcop-usb: add sanity checking") added an endpoint sanity check to address a NULL-pointer dereference on probe. Unfortunately the check was done on the current altsetting which was later changed. Fix this by moving the sanity check to after the altsetting is changed. Fixes: 1b976fc6d684 ("media: b2c2-flexcop-usb: add sanity checking") Cc: Oliver Neukum Cc: stable Signed-off-by: Johan Hovold Signed-off-by: Sean Young Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/usb/b2c2/flexcop-usb.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/drivers/media/usb/b2c2/flexcop-usb.c +++ b/drivers/media/usb/b2c2/flexcop-usb.c @@ -511,6 +511,9 @@ static int flexcop_usb_init(struct flexc return ret; } + if (fc_usb->uintf->cur_altsetting->desc.bNumEndpoints < 1) + return -ENODEV; + switch (fc_usb->udev->speed) { case USB_SPEED_LOW: err("cannot handle USB speed because it is too slow."); @@ -544,9 +547,6 @@ static int flexcop_usb_probe(struct usb_ struct flexcop_device *fc = NULL; int ret; - if (intf->cur_altsetting->desc.bNumEndpoints < 1) - return -ENODEV; - if ((fc = flexcop_device_kmalloc(sizeof(struct flexcop_usb))) == NULL) { err("out of memory\n"); return -ENOMEM;