Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp495054ybl; Tue, 28 Jan 2020 06:51:10 -0800 (PST) X-Google-Smtp-Source: APXvYqxpaoik7a5SsTxHYkTsTv+LLWUsalN28PN6ZbLos0KMBTGjTWmBONfEaTI3ijMx2xvTS28U X-Received: by 2002:a9d:6b8a:: with SMTP id b10mr17101230otq.322.1580223070287; Tue, 28 Jan 2020 06:51:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580223070; cv=none; d=google.com; s=arc-20160816; b=a9/7V6JplZ5j4gJOIeu2Rz58GUBupJ43CvskRCwzgM56q0Hz9wYJD1kS42+ZTpsLXP zjwFc+u29rpDS5nG5hEikk+57/h2E7ZntzY5YyeUcpGtwwcOUPTJ9vcsVmwKplRU3R0+ sslaHwIoB4tBH9hjpD6uQUOskBh1R3IriPovchDgU9M672NUsghz3G5QKcm3y9A/xE+F oGs6fm57zVt8FPm3y9f+eR7o3kXcsK4vIVNqFlGxv/zvF0dlDMqzI0/HmrUgM5DLuwaV NKG/0kJVfY25iKJ9GlBsKCeIi2dKztJBrrrrjzxSyf1vpSPzUtSHVHY35I+cdGxThQuy GgOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bjaxLJ8HE82pa781Hpfz6ft7RXd8/vG9C9X1NjggvRQ=; b=0sVkRXEIxJBUCIoIM++fZQIhDIyA88qHtZRNpRunquB9UeDATNgDllPgcCtZ15KTvV JfP2nOwL9nbhjg9azYjbYk5J1tf8mlxGBxW6ycjbH68olx/p08ErfOpqPI3X8OfKKiB7 FMJtykBxEAA9sIhdy5n7tO8a2+lhve0usSAzfIsMgBlTaEvK/U3oi+QuNYXZmaW4DUg+ 8xDIwmmkhfADPw9cukTQb1Bt9gPBWM3TNZ6kUq5NJlU3T3yZZ3lJX89fcJHOmaGN2yaM JX9yo7V2PzHvyMXgAkWd0m5j0PxR2B5ffPWzLJRpkn0Hzh3x3XtjX0qjuGZjdvaOncyv 6DeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=z9zPll13; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d20si9252432oti.311.2020.01.28.06.50.58; Tue, 28 Jan 2020 06:51:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=z9zPll13; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726449AbgA1N7j (ORCPT + 99 others); Tue, 28 Jan 2020 08:59:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:45006 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726945AbgA1N7f (ORCPT ); Tue, 28 Jan 2020 08:59:35 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D421A2468D; Tue, 28 Jan 2020 13:59:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580219975; bh=La3xXY74Ega41wu0E1JYofXfeEGWWuCmzivbS8iuoKs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=z9zPll13IST5zHWkC1IxrwNbMSn+Z+eAMwF1oLDfPkDTRDxfCB2pho1fyON7R2Oz1 b0n5vSjNOGJj5DOu+xWU+Nr++wOD5FR8xAb1R1AmH470Wg4tukaSZXHIWpFIMMT8BY SBamPvLBIm9sbT1gRun5F6Dv4yMLz+KiJv1iCcjs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Vladis Dronov , Dmitry Torokhov Subject: [PATCH 4.14 28/46] Input: sur40 - fix interface sanity checks Date: Tue, 28 Jan 2020 14:58:02 +0100 Message-Id: <20200128135753.541287992@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200128135749.822297911@linuxfoundation.org> References: <20200128135749.822297911@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 6b32391ed675827f8425a414abbc6fbd54ea54fe upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. This in turn could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: bdb5c57f209c ("Input: add sur40 driver for Samsung SUR40 (aka MS Surface 2.0/Pixelsense)") Signed-off-by: Johan Hovold Acked-by: Vladis Dronov Link: https://lore.kernel.org/r/20191210113737.4016-8-johan@kernel.org Signed-off-by: Dmitry Torokhov Signed-off-by: Greg Kroah-Hartman --- drivers/input/touchscreen/sur40.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/input/touchscreen/sur40.c +++ b/drivers/input/touchscreen/sur40.c @@ -537,7 +537,7 @@ static int sur40_probe(struct usb_interf int error; /* Check if we really have the right interface. */ - iface_desc = &interface->altsetting[0]; + iface_desc = interface->cur_altsetting; if (iface_desc->desc.bInterfaceClass != 0xFF) return -ENODEV;