Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2093176ybl; Thu, 30 Jan 2020 11:14:08 -0800 (PST) X-Google-Smtp-Source: APXvYqw1FuJ9uFR7UDy4L1Ir+TnvCxMcm2AQovx293SXVoVOxflsp+gb2J6bTRMbuGbtPWRPqvh/ X-Received: by 2002:a9d:4e99:: with SMTP id v25mr4850498otk.363.1580411648143; Thu, 30 Jan 2020 11:14:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580411648; cv=none; d=google.com; s=arc-20160816; b=L7LBlOnsawopyBc060ZI0vpWSWpho6YR7Bj5EQOYhCFw56saPHq0xerq/Fc9FsYuNk Zksn6eg43CRgDyqVITCCabzV4+owrBpuvPdeKMk3Ev2PU+q3ogXlhZrMmuyN2byLOi3N Mkg9b4GJR50Ki6NphCgKcSl+Ga1UDmNA+ht6BytEelmA/bFLl/0fQdzMg9xha6vCjjYy zDruckCBBC8hpYmIrMt1aqqzfWP+SWnjTaYxf7R1YTehdwhUmUqS22KldkUpihWHHBFe 57YyLDaX51vxBpNo6PUcHlX08uBPNtyyRmIIjGkKkyzRlHUvsR/VeYL2gtknglk5Rlod nqfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EEfr+IEAUHI1bGgkRMI7A7KCtdZDxhU1qsQjYrCj4yg=; b=G3blzt2XoRsOknvLFaMmUM81Vwd7VkkxfNbDzvHCQRd97+V1wIM006vyNqQp23+mJf 25RKmGjEKOTYuLt1Ho2x2t5WTVPBFwz4WIzjfOItHottim38/OF7mZrwke6u85siEKfn 8zC3Y2CIVT2+ZEbZ4PwLZK2uD7B+1J1RUqePTylPHKAWVZKZBL42k0+nJxHP/H0mOnf/ Vxixwb64kKNPWx8C7eWKbkFx1vUqiQlDFgXrIpAvLQj3jlwBvsJpcapl/Q6s3iuDItfa KazCQVDbKzEj6cZNZNMrjoHNDFSuYEBa9/pI2W5R90Z4+8owPIXGSphT7R3XGeygDt1o kegQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J+z5EEmN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d13si2230815oig.67.2020.01.30.11.13.56; Thu, 30 Jan 2020 11:14:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=J+z5EEmN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730122AbgA3SlO (ORCPT + 99 others); Thu, 30 Jan 2020 13:41:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:48926 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730088AbgA3SlG (ORCPT ); Thu, 30 Jan 2020 13:41:06 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 43D6E2083E; Thu, 30 Jan 2020 18:41:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580409665; bh=NkzPDC3WmqTpG5Q3lK/TWMmu0KCXkzpL1LCZ44XdnZI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=J+z5EEmNle5FjCsy3HURLDD9WdASBtRt9VQCd0HzbJs+RZuDzcMDA/IGEN0NU4EAF 1BNhkoE1pWBfNTHzNYD36MayACcnGTdkD2FONeTISipnR8RdMSLYfDke0gtM8luHED LOlnU4nalonLJue31m6bbugMfR+zyjKov7ZUddmc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jes Sorensen , Johan Hovold , Kalle Valo Subject: [PATCH 5.5 34/56] rtl8xxxu: fix interface sanity check Date: Thu, 30 Jan 2020 19:38:51 +0100 Message-Id: <20200130183615.238289079@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200130183608.849023566@linuxfoundation.org> References: <20200130183608.849023566@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 39a4281c312f2d226c710bc656ce380c621a2b16 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 26f1fad29ad9 ("New driver: rtl8xxxu (mac80211)") Cc: stable # 4.4 Cc: Jes Sorensen Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c +++ b/drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c @@ -6384,7 +6384,7 @@ static int rtl8xxxu_parse_usb(struct rtl u8 dir, xtype, num; int ret = 0; - host_interface = &interface->altsetting[0]; + host_interface = interface->cur_altsetting; interface_desc = &host_interface->desc; endpoints = interface_desc->bNumEndpoints;