Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp2337223ybz; Thu, 23 Apr 2020 16:16:45 -0700 (PDT) X-Google-Smtp-Source: APiQypJcOjoiP1zvuUgldkfytR+CnOaeR76cIXQsD2ULFomTHFdhuhJLwItL7WS/KBqFG/MwuuGK X-Received: by 2002:a17:906:78c:: with SMTP id l12mr4444997ejc.189.1587683805764; Thu, 23 Apr 2020 16:16:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587683805; cv=none; d=google.com; s=arc-20160816; b=ylT/plBKwKFO2xj/tJcSBOZ6j6liWW5zbZ7TV8f51qIrSshUEcPsaHlI8hlgwHkta5 UjDx3d0htaXONQwN19HpyNo0wFMvhZu/ZPqT0Jjl0h2oS/ums7KxGXzR/vnMYda0c6f/ tCmnGmQSElwCDtNsVbIpENs/cBMX8+IQxrWXWpf+CT2c/7OKRucM/44BLQ8Vn1ag++f9 Iz/WU6bH8CXowFCryb6l/zFh+cevYkwpEuC+YVk50L+1GlPFGjNORHsNVlFPLPa+UhFU Qxhp9VFELNJnIWHpHEOH/jMnPgtGgSjekENAyE93QFmgq2BAo5rlMU1HSb1arPpGC30B qZPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition; bh=mFWMH0dU2R3c8x53y871H7LpzvC2ryHyYnwY9o5Zln4=; b=rp2xK/a3V0knWcKIJTi55fBuUc0t5fd1PO2FsFE/A6vOPVITkxGP6sz63hgwJtBIhS sTUN8SWtwJLrO2X40ecS9KFNKyzMTbW/X+aTxdZ2Wr9ttf+5G+dF04bT1gKs6mFvOln6 +eo7g60flLFOhvhD1QQCDbetlDyFOL329GL7kBuSp1x3DPHuEJIDcFqdzoLhaV9YHYKH qXRoXFmuM1YDkKUpj1qFwHOoXyhKZDN89qhrF6889Zr9VoPW5aeKJC4Y3GMP4ttDkihG X7XEoogfTfjGLATXNYoMYdNJWCOhH19nMEC48oiZLIO7syc1YAZwQzF+mce4ljFYBsVG /KoQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n2si2034259edf.177.2020.04.23.16.16.22; Thu, 23 Apr 2020 16:16:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728894AbgDWXNr (ORCPT + 99 others); Thu, 23 Apr 2020 19:13:47 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:50006 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728490AbgDWXGu (ORCPT ); Thu, 23 Apr 2020 19:06:50 -0400 Received: from [192.168.4.242] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.89) (envelope-from ) id 1jRkvZ-0004n0-0I; Fri, 24 Apr 2020 00:06:41 +0100 Received: from ben by deadeye with local (Exim 4.93) (envelope-from ) id 1jRkvV-00E6vb-81; Fri, 24 Apr 2020 00:06:37 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, Denis Kirjanov , "Johan Hovold" , "Vladis Dronov" , "Dmitry Torokhov" Date: Fri, 24 Apr 2020 00:06:39 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) X-Patchwork-Hint: ignore Subject: [PATCH 3.16 172/245] Input: aiptek - fix endpoint sanity check In-Reply-To: X-SA-Exim-Connect-IP: 192.168.4.242 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.83-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Johan Hovold commit 3111491fca4f01764e0c158c5e0f7ced808eef51 upstream. The driver was checking the number of endpoints of the first alternate setting instead of the current one, something which could lead to the driver binding to an invalid interface. This in turn could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 8e20cf2bce12 ("Input: aiptek - fix crash on detecting device without endpoints") Signed-off-by: Johan Hovold Acked-by: Vladis Dronov Link: https://lore.kernel.org/r/20191210113737.4016-3-johan@kernel.org Signed-off-by: Dmitry Torokhov Signed-off-by: Ben Hutchings --- drivers/input/tablet/aiptek.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/drivers/input/tablet/aiptek.c +++ b/drivers/input/tablet/aiptek.c @@ -1820,14 +1820,14 @@ aiptek_probe(struct usb_interface *intf, input_set_abs_params(inputdev, ABS_WHEEL, AIPTEK_WHEEL_MIN, AIPTEK_WHEEL_MAX - 1, 0, 0); /* Verify that a device really has an endpoint */ - if (intf->altsetting[0].desc.bNumEndpoints < 1) { + if (intf->cur_altsetting->desc.bNumEndpoints < 1) { dev_err(&intf->dev, "interface has %d endpoints, but must have minimum 1\n", - intf->altsetting[0].desc.bNumEndpoints); + intf->cur_altsetting->desc.bNumEndpoints); err = -EINVAL; goto fail3; } - endpoint = &intf->altsetting[0].endpoint[0].desc; + endpoint = &intf->cur_altsetting->endpoint[0].desc; /* Go set up our URB, which is called when the tablet receives * input.