]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
usb: core: config: reverse the size check of the SSP isoc endpoint descriptor
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 6 Apr 2026 14:18:31 +0000 (16:18 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 7 Apr 2026 11:48:13 +0000 (13:48 +0200)
Reverse the check of the size of the usb_ssp_isoc_ep_comp_descriptor
structure to be done before accessing the structure itself.
Functionally, this doesn't really do anything as the buffer is all
internal to the kernel, and reading off the end is just fine, but static
checking tools get picky when noticing that a potential read could be
made "outside" of an allocated buffer.

Not a bugfix, but a cleanup to keep tools from tripping over this
constantly and annoying me with their pointless reports.

Link: https://patch.msgid.link/2026040630-graded-postwar-760f@gregkh
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/usb/core/config.c

index 6a1fd967e0a643a823b9c74691dae41f469c96cd..417140b012bb9a43bdf2eb24bbfe068ebcc5783f 100644 (file)
@@ -54,8 +54,8 @@ static void usb_parse_ssp_isoc_endpoint_companion(struct device *ddev,
         * follows the SuperSpeed Endpoint Companion descriptor
         */
        desc = (struct usb_ssp_isoc_ep_comp_descriptor *) buffer;
-       if (desc->bDescriptorType != USB_DT_SSP_ISOC_ENDPOINT_COMP ||
-           size < USB_DT_SSP_ISOC_EP_COMP_SIZE) {
+       if (size < USB_DT_SSP_ISOC_EP_COMP_SIZE ||
+           desc->bDescriptorType != USB_DT_SSP_ISOC_ENDPOINT_COMP) {
                dev_notice(ddev, "Invalid SuperSpeedPlus isoc endpoint companion"
                         "for config %d interface %d altsetting %d ep %d.\n",
                         cfgno, inum, asnum, ep->desc.bEndpointAddress);