Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3756885pxv; Mon, 19 Jul 2021 08:04:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyQ56OCgMNnCnaXivAREeycUOkQx20kEgzorqN7Zu37DD8fOSZworNSTGf7RaRNud2KoSNI X-Received: by 2002:a6b:e70f:: with SMTP id b15mr19753808ioh.67.1626707058482; Mon, 19 Jul 2021 08:04:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626707058; cv=none; d=google.com; s=arc-20160816; b=HX4Alzo2HuUrFzHOquKOZw2Zlwwn07NeWq7Uaax4oL0iKEarOdLcQaBHSI5THJIdDj lrIK0ZPg0Iv086GB6pWU5HIl0Jy9YefTyZL7Itiu6JG7lNI/fgEKWOvqoTid5NpM1b6E 4z5kalbb7IpFvFqFQuopOAZwSI/3rOZmtEttAazouH2mEMi5LvYfgG3QLHOV2aKhmHH7 vaEYhr3/1zpNJcfu3x76ltPMJmHh9Z0bNxb82+rlXOp9Mkoud6QwYqD6vornD/uGp9Ag xJF0J1t6YhAR39Np/31NL+YvCX8lXHxosjIAzVCdqh06019IMJZcap2k792dqBLYycjb 3aJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=y4yoQPlgsqyFbBBNJNVM3PZiYqIqRcexkyFTmsZcKCU=; b=YAujAHTe+5EpnSV0mxNgDm7wFTHFXVVE4tTF0hycyjoaJ/AFfDHvTH3rCLX9oeCeOu uDQWVFWeCdCkVXvz3OMLE4CeJZbZSJ4m9fBy2vOY9tYC41OPdi8315LWgk6q0LlhKdkN xYm9vcU253oWeJYkf4wkUsLHqEeJAOJDtBK8QjSo5kLTWqxdK2cg6TEr1EbbjbXl24dH Ew4nN/huT1kRhX2wXGFGdJnslS2PjQxstwc20V0CaJZTE9QXHzMTHQjknhlReKVADbBP e0Ge4Vy9gGKSLpEoyq+rBNoEIN4yQktQUcS1ORT28SVKUdUcb+8iHAjXYouKlhxTvt6t fvUw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UHxGFcf3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d1si11634676jak.77.2021.07.19.08.03.43; Mon, 19 Jul 2021 08:04:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UHxGFcf3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243175AbhGSOWc (ORCPT + 99 others); Mon, 19 Jul 2021 10:22:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:58348 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241837AbhGSOUp (ORCPT ); Mon, 19 Jul 2021 10:20:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CA8BB61166; Mon, 19 Jul 2021 15:01:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626706884; bh=7S6xckbLtnqd5D/C5AtfLm9Ntbs+gMVw9GWSx9WNNlU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UHxGFcf36mQLdCb7pfLwZGszK76O5v2CExxZiGGRVa6PzL9AxEDaSIsgdgonz9BHi IMml5g2MhY12Q8PUHWiM75p4E6S/IM1n0fuejQMztI4XcFgKxdbF5bsc/spdWVW19O QpfMoHgEjrW+hjv1Ygza0rmSQ8z4xCA/JOsDejQM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Hans Verkuil , Mauro Carvalho Chehab Subject: [PATCH 4.4 138/188] media: gspca/sunplus: fix zero-length control requests Date: Mon, 19 Jul 2021 16:52:02 +0200 Message-Id: <20210719144941.009611065@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144913.076563739@linuxfoundation.org> References: <20210719144913.076563739@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit b4bb4d425b7b02424afea2dfdcd77b3b4794175e upstream. The direction of the pipe argument must match the request-type direction bit or control requests may fail depending on the host-controller-driver implementation. Control transfers without a data stage are treated as OUT requests by the USB stack and should be using usb_sndctrlpipe(). Failing to do so will now trigger a warning. Fix the single zero-length control request which was using the read-register helper, and update the helper so that zero-length reads fail with an error message instead. Fixes: 6a7eba24e4f0 ("V4L/DVB (8157): gspca: all subdrivers") Cc: stable@vger.kernel.org # 2.6.27 Signed-off-by: Johan Hovold Signed-off-by: Hans Verkuil Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/usb/gspca/sunplus.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) --- a/drivers/media/usb/gspca/sunplus.c +++ b/drivers/media/usb/gspca/sunplus.c @@ -255,6 +255,10 @@ static void reg_r(struct gspca_dev *gspc PERR("reg_r: buffer overflow\n"); return; } + if (len == 0) { + PERR("reg_r: zero-length read\n"); + return; + } if (gspca_dev->usb_err < 0) return; ret = usb_control_msg(gspca_dev->dev, @@ -263,7 +267,7 @@ static void reg_r(struct gspca_dev *gspc USB_DIR_IN | USB_TYPE_VENDOR | USB_RECIP_DEVICE, 0, /* value */ index, - len ? gspca_dev->usb_buf : NULL, len, + gspca_dev->usb_buf, len, 500); if (ret < 0) { pr_err("reg_r err %d\n", ret); @@ -739,7 +743,7 @@ static int sd_start(struct gspca_dev *gs case MegaImageVI: reg_w_riv(gspca_dev, 0xf0, 0, 0); spca504B_WaitCmdStatus(gspca_dev); - reg_r(gspca_dev, 0xf0, 4, 0); + reg_w_riv(gspca_dev, 0xf0, 4, 0); spca504B_WaitCmdStatus(gspca_dev); break; default: