Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2264928ybl; Thu, 19 Dec 2019 10:40:13 -0800 (PST) X-Google-Smtp-Source: APXvYqxqJEfIZpI0ZuqZu1gz0aBbgbrQSQ/A8ac5hssc1oiWDO4abeATdTXPsjaVCiynDXqo8LR7 X-Received: by 2002:a05:6830:114f:: with SMTP id x15mr10012235otq.291.1576780813501; Thu, 19 Dec 2019 10:40:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576780813; cv=none; d=google.com; s=arc-20160816; b=msrOH9IDumHONIHLOBuLmS63J8DS4ETfhqXlwkAlDvvECgPfmmZhI2k2yLLMaOOrn/ iY+/COfW02CmR0vwSJZMseNvJ27QIYC4qRxSURzHZbKAqZkoinrGvz+888D5dQ9VpB3M E/8jgBztTR1nVjPNVYXQ5trLuZuNcoVtpKm1SAJuy022ydrzPjmoE0qrrIVWRi2DeOFh KsQ0UUd939O/oy5UE9NWWoDk0j/0wk7zkLh5SD/4qdx25l0Xf0RNrOFewJ7TPkm8Ufth SHgO6eEPDEgppWKMa1s5RJXSsd99YPJTY8cHzgZw62cPOMH2LLW9InnKCR5VUQOFus7S vlww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=G4bBSa3owva4rpm4E9jpnhI3fojBw0sDjneSD0xOCgI=; b=QmaTr4DYsb5lKGgO6/rbiPJbC4slRKsNHL2x/9JqutZyID00/S8JxOGqPka4DNivNK 5zMsGnnb0HiKVfblIvrbrdq2lKa/GbxMpnBOFrWPzSd9IkgbtOZ7+/v6mZQUJtcUFXvt HFwBnanNzanLqJcnUoTFy8st8yjSMl/bfzwSk/Q0ao2jQ2QvTw0otV3mGtKdcngKciGN oPQIBnkvjH7cSy+hKzXTJ4JrJLsdk2lEx5nIm75XOburY+60DjpJt1Hg6+CUz+Nm/b3w 0mn0I09OrvuMFIG9Z0iZ+RxtaXmOyxVNStS6M5KqsOOqwFTqb4eCP5BsjRD7H8g48pzc BzuA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="oe7BrX/p"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i26si3737467otl.29.2019.12.19.10.40.00; Thu, 19 Dec 2019 10:40:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="oe7BrX/p"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728033AbfLSSi2 (ORCPT + 99 others); Thu, 19 Dec 2019 13:38:28 -0500 Received: from mail.kernel.org ([198.145.29.99]:56398 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728020AbfLSSiZ (ORCPT ); Thu, 19 Dec 2019 13:38:25 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BFAC5222C2; Thu, 19 Dec 2019 18:38:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576780705; bh=V9wWOpAJ6p77csYinS0v1hmyOlCVe7A4SXU7cghYdv8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oe7BrX/pdhQ/Do6qwx+jJQXOF0Cm6JwjY9Uu5xJieYfnufap7d3hdHXieqgx0qU6I EFL/mUYLsUqBM4G49DIUsAcikq/BaHav+bpoA4kEMqU3JrVGu6yRkGRoHXspvlwr7/ ZWEDSkIkTBBDwf/GldvPakgZpi7ecyx/XHg7lGGg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold Subject: [PATCH 4.4 084/162] staging: rtl8188eu: fix interface sanity check Date: Thu, 19 Dec 2019 19:33:12 +0100 Message-Id: <20191219183212.909108681@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191219183150.477687052@linuxfoundation.org> References: <20191219183150.477687052@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 74ca34118a0e05793935d804ccffcedd6eb56596 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: c2478d39076b ("staging: r8188eu: Add files for new driver - part 20") Cc: stable # 3.12 Signed-off-by: Johan Hovold Link: https://lore.kernel.org/r/20191210114751.5119-2-johan@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/staging/rtl8188eu/os_dep/usb_intf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/staging/rtl8188eu/os_dep/usb_intf.c +++ b/drivers/staging/rtl8188eu/os_dep/usb_intf.c @@ -82,7 +82,7 @@ static struct dvobj_priv *usb_dvobj_init phost_conf = pusbd->actconfig; pconf_desc = &phost_conf->desc; - phost_iface = &usb_intf->altsetting[0]; + phost_iface = usb_intf->cur_altsetting; piface_desc = &phost_iface->desc; pdvobjpriv->NumInterfaces = pconf_desc->bNumInterfaces;