Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2299761ybl; Thu, 19 Dec 2019 11:12:52 -0800 (PST) X-Google-Smtp-Source: APXvYqwOh6ncIDZp0pWp4AfjqIr9qz1t+x5dB9ONmGLMfFKlyQwIQKc4Zk/+9b7IOzZ7lYrREKwl X-Received: by 2002:aca:8d5:: with SMTP id 204mr2720012oii.141.1576782772372; Thu, 19 Dec 2019 11:12:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576782772; cv=none; d=google.com; s=arc-20160816; b=RzH7u3evSYfgKoD3jCuck8EGd+TwZ1F6fJv9xGIch7AoQ+fQ1Wcq/1tYfaD/bDTXCG gpJwjL7mBcCEpVa8A8HPj1bIizQbQ1SMrSLm2hEy4+S8BxajwB9UTdyUchuqa5Lm707H r+PX6SuZmxlRE2EytkRMcGiomdWm3+vr+vmiLPw7Yhfiwsdv6QLMWSRllhjq8Ol9YsyM zLMBMSfW0TJSOobxVcDExuvB61LaYlW+a6UbNaqzGAkY41ttG8/+tPZb7C/81/8yeONT 8E0Ju3j0+1avu2T35fCHinVjVsGQYHTZCEzEeaTjxZfLLK+fZwdpHsc6E1hEJwDLXI79 cR2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nJ+BHJF3x3djnu+cg64213LqkYlH88kBfMj0TLupbDk=; b=uPt4X6KPVIRoiW6OpVYboNdJDML0BdphpvNsQCJvV0THbpF0yD+d81U+/He6DOKf/P 0g7AXJaVdj7a7CmIESah+6rj0nQsJJ1ksVBsWQGyXmhqLsiCLMoQ4qMJ8jxrGvBU+9yy XLxsMLSkF5qK9hX1yctsu/FbXlsNTXRds8T8k7EJb++P2LL1otvqNbe/NRXZVEQg6rpp p2bPJwQPaE66b6p+O4URtWFj4mIdV8fwqeNxzN1wBG2reNBVakC1FUzbmxiIiPAlZrRM l2sB1OG5s2M1CtZV/ZlSEp83kJ3HDdEpKkUQJM8z6IPvMQVWvtz6TYwdkCQRh217P/wZ JSfQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=eauXXfDN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x16si3743302otp.184.2019.12.19.11.12.40; Thu, 19 Dec 2019 11:12:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=eauXXfDN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728113AbfLSSi6 (ORCPT + 99 others); Thu, 19 Dec 2019 13:38:58 -0500 Received: from mail.kernel.org ([198.145.29.99]:56870 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728089AbfLSSiw (ORCPT ); Thu, 19 Dec 2019 13:38:52 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7EFE720716; Thu, 19 Dec 2019 18:38:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576780732; bh=qaDyqVmjdKTMbZk3YqGlBIORfmrEGDNxuegX7DPmrrg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eauXXfDNIK1xhHidqlUpQVKutaEvrA5QktZEwHBoEEtOlUeUragYSqJYU4nfcwThN qt1eTY6TETXWCZsX+KA/JPnzo5A8x2HFqWWUj5lup768TwdEMeLcgAAv9lKZ06Vk2O HXsonZNjl9zWYBbzcSC4ZWURU3WjzlwTz8xlSHhA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold Subject: [PATCH 4.4 094/162] USB: adutux: fix interface sanity check Date: Thu, 19 Dec 2019 19:33:22 +0100 Message-Id: <20191219183213.512590332@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191219183150.477687052@linuxfoundation.org> References: <20191219183150.477687052@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 3c11c4bed02b202e278c0f5c319ae435d7fb9815 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 03270634e242 ("USB: Add ADU support for Ontrak ADU devices") Cc: stable # 2.6.19 Signed-off-by: Johan Hovold Link: https://lore.kernel.org/r/20191210112601.3561-3-johan@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/misc/adutux.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/usb/misc/adutux.c +++ b/drivers/usb/misc/adutux.c @@ -686,7 +686,7 @@ static int adu_probe(struct usb_interfac init_waitqueue_head(&dev->read_wait); init_waitqueue_head(&dev->write_wait); - iface_desc = &interface->altsetting[0]; + iface_desc = &interface->cur_altsetting[0]; /* set up the endpoint information */ for (i = 0; i < iface_desc->desc.bNumEndpoints; ++i) {