Commit 4cf28e9a authored by Mark Brown's avatar Mark Brown

ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()

We don't currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.
Signed-off-by: default avatarMark Brown <broonie@kernel.org>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20220124153253.3548853-4-broonie@kernel.orgSigned-off-by: default avatarMark Brown <broonie@kernel.org>
parent 4f1e50d6
...@@ -879,6 +879,8 @@ int snd_soc_put_xr_sx(struct snd_kcontrol *kcontrol, ...@@ -879,6 +879,8 @@ int snd_soc_put_xr_sx(struct snd_kcontrol *kcontrol,
long val = ucontrol->value.integer.value[0]; long val = ucontrol->value.integer.value[0];
unsigned int i; unsigned int i;
if (val < mc->min || val > mc->max)
return -EINVAL;
if (invert) if (invert)
val = max - val; val = max - val;
val &= mask; val &= mask;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment