Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp449273ybl; Tue, 28 Jan 2020 06:10:18 -0800 (PST) X-Google-Smtp-Source: APXvYqwMJS4Oh+WPYZ/Jx1+xjkrFZQ1ry9iHggwfkuGw6LS4m2PlsE8x53S5oV7PhwAwEz/FrynQ X-Received: by 2002:a05:6808:907:: with SMTP id w7mr2919971oih.137.1580220618416; Tue, 28 Jan 2020 06:10:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580220618; cv=none; d=google.com; s=arc-20160816; b=sqGmhUO9BE7Ly+hUIe1I95rt1OgcHwZRMMNVkP22nN2HnPXYJHOKjOBRBtbmH5nkl5 //CEYG9CKnt1+dwD0fvAwaKUtL7c9TtILwTywgzA982K1gFHmzqtlxiwlj/Azlcf05bj Qj7L1uKve+rIFq2zQ4Pz7770sK43GBcKhHCJSqlJo7/PMms+2tHKRuzma2sD+bybLiah h8zZ8/ZrQViaWVmUIllBs78FfeBSTLskcpFcA2p3JrStPJ4gGKwJLpSTZ4i7ZUp00Vmv 4iPOJp11Nl9pGjxD7fhTGUuMH5eUuva89Lqhl8dkeUdHGAGy5ThthwMgKmmEizkOAWut NWHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=AOjvFCFXmNTojtMSLGzdbdurqNaxLzyuWQZtpDzEyo4=; b=sbhfjf0XxjWiTjBQKhYHf+zV05NnGH/4OO31GwZG1nNcl9zMlBFPbdUHFzMLOY50h+ /1nwHEPNdApZqJBznVWBbEb1FDlNi/S5sqb66k6eBrki5GwVLkYO8pOkZ3L7ealS7PeY 9HqAlbzV185k13CDBaDTfNQoh59LzfZSEL/LAUgaujlLbl4//kcWlYuGs9Hs2uhVEZ4r ZcOxJU5ypC/nS5K0gXk4X9jQx/2vyaeqr6qMYi2XcRCtaSLEgp7XwjVFR0W6LZNEJrcU K2beXhEWFIUKSmeNKfDmnM2JyickfssY9W1NVfTa5mv2GgGqZVQ3BiL55XAE3CtSPqg9 Jctw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JvI4eYBj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n186si4975665oig.191.2020.01.28.06.10.02; Tue, 28 Jan 2020 06:10:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JvI4eYBj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727229AbgA1ODu (ORCPT + 99 others); Tue, 28 Jan 2020 09:03:50 -0500 Received: from mail.kernel.org ([198.145.29.99]:50552 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727919AbgA1ODm (ORCPT ); Tue, 28 Jan 2020 09:03:42 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C545924683; Tue, 28 Jan 2020 14:03:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580220222; bh=2O3y5rNs+/XzlaKFUsmezUaaTbOvATbmXJRT1ambPeg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JvI4eYBjK96I5+wswxBQ0Z2xX4PdOiFX9tT7EWeJ6i32xq3jrGbUVWHIcMenYfgwx 6DDtLs+gaxpa0WLi73ekFnvf8VSwjLySdCkBdnqikDY9CJ2AwAn9jE8syXqx/eQjYW ONFPgxdmM0XkPUILpAHf3L+OGvXferhwwZsKqf5Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Vladis Dronov , Dmitry Torokhov Subject: [PATCH 5.4 065/104] Input: sur40 - fix interface sanity checks Date: Tue, 28 Jan 2020 15:00:26 +0100 Message-Id: <20200128135826.474728670@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200128135817.238524998@linuxfoundation.org> References: <20200128135817.238524998@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 6b32391ed675827f8425a414abbc6fbd54ea54fe upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. This in turn could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: bdb5c57f209c ("Input: add sur40 driver for Samsung SUR40 (aka MS Surface 2.0/Pixelsense)") Signed-off-by: Johan Hovold Acked-by: Vladis Dronov Link: https://lore.kernel.org/r/20191210113737.4016-8-johan@kernel.org Signed-off-by: Dmitry Torokhov Signed-off-by: Greg Kroah-Hartman --- drivers/input/touchscreen/sur40.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/input/touchscreen/sur40.c +++ b/drivers/input/touchscreen/sur40.c @@ -653,7 +653,7 @@ static int sur40_probe(struct usb_interf int error; /* Check if we really have the right interface. */ - iface_desc = &interface->altsetting[0]; + iface_desc = interface->cur_altsetting; if (iface_desc->desc.bInterfaceClass != 0xFF) return -ENODEV;