diff options
author | Mark Brown <broonie@kernel.org> | 2022-01-24 18:32:53 +0300 |
---|---|---|
committer | Mark Brown <broonie@kernel.org> | 2022-01-25 13:21:36 +0300 |
commit | 4cf28e9ae6e2e11a044be1bcbcfa1b0d8675fe4d (patch) | |
tree | 238ecaaa937e88666176715641c80a450e246685 /sound | |
parent | 4f1e50d6a9cf9c1b8c859d449b5031cacfa8404e (diff) | |
download | linux-4cf28e9ae6e2e11a044be1bcbcfa1b0d8675fe4d.tar.xz |
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
We don't currently validate that the values being set are within the range
we advertised to userspace as being valid, do so and reject any values
that are out of range.
Signed-off-by: Mark Brown <broonie@kernel.org>
Cc: stable@vger.kernel.org
Link: https://lore.kernel.org/r/20220124153253.3548853-4-broonie@kernel.org
Signed-off-by: Mark Brown <broonie@kernel.org>
Diffstat (limited to 'sound')
-rw-r--r-- | sound/soc/soc-ops.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/sound/soc/soc-ops.c b/sound/soc/soc-ops.c index c31e63b27193..dc0e7c8d31f3 100644 --- a/sound/soc/soc-ops.c +++ b/sound/soc/soc-ops.c @@ -879,6 +879,8 @@ int snd_soc_put_xr_sx(struct snd_kcontrol *kcontrol, long val = ucontrol->value.integer.value[0]; unsigned int i; + if (val < mc->min || val > mc->max) + return -EINVAL; if (invert) val = max - val; val &= mask; |