Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2093643ybl; Thu, 30 Jan 2020 11:14:36 -0800 (PST) X-Google-Smtp-Source: APXvYqyWVhvM2ojhHKce+YGueENI0QwOruoFPzSB0CQL80mYEHixcdRL0Hz9e8XxHAtptVxAWIrY X-Received: by 2002:aca:2b04:: with SMTP id i4mr3920422oik.21.1580411676471; Thu, 30 Jan 2020 11:14:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580411676; cv=none; d=google.com; s=arc-20160816; b=dcrpR+jMMvenzuvWWSNWQj5+fbJQMNP1oW5aEPmFrk2EBH7GItOCcb1kF/t5RrVOBh 9GKR5sZQ6w5zKS53Jz8lM0h7cskrn291BtXlzKpkt47Ov5i0NHJ+om+4+eviA/tyn9e+ ip6u52kpl3H9QZJ8kaCKGf54WGkPFLF1emPIEeRj+QMVTehPNoGz/vLfijeWmWCkYCYR Rs1qfFQxwSXUFV7D6LOPiQ00e8sewrtlRWeA0OBzd+eFFqMICuesWNRM450p9vZPCNo+ tL+cnmeX/YQWMsNt67SAmkItoDJkKfPg/3q8UgYCwNOPI6/1iH9239WtQkVdYvrNVA1I lY0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iT8LLX7UuulhUPbyGv7iNpQKUCc5DkeQynU9deGMbOg=; b=Xt97j3iPLaRajtl1or4pvgnMI+QLbRzSyVGTC0HTL1/aXelVIhmL0ce2TdWA71Ba8p fgNaNb7V/+3fiwBoEqrXBZjL7hM3ziNl+DFegaYs2b9EGWc/eeoqqBwCjR1H/cKmFsaX pVkf1E812invAIc/7nedxB2kZCHoeZ2pB6WGITEar6njvVfaXV/dyfTTuQNia/iRc6fb 4wVjGXOKRRken3w3KTRQxEecqy/0Ft4j6vtx0TvraHJBERvm19H+iLnJqiZpciPDEcFT Lm2Wjgef1a0/QdqKqkLTkTNle+fpiVsORSvS0w+dOMhXAo1/b8mHji2U/lr01TZWxvgk c91g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jqZrhVZH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w197si3310670oia.101.2020.01.30.11.14.24; Thu, 30 Jan 2020 11:14:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jqZrhVZH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730209AbgA3Sli (ORCPT + 99 others); Thu, 30 Jan 2020 13:41:38 -0500 Received: from mail.kernel.org ([198.145.29.99]:49532 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730170AbgA3Sld (ORCPT ); Thu, 30 Jan 2020 13:41:33 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 50B08205F4; Thu, 30 Jan 2020 18:41:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580409692; bh=HmDDopOrwhUHL1wldJ0BrLZPmR8N2AVoVwZoXxGPi00=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jqZrhVZHVp34VTpKekJCF5yB+JJ3tfK3DBwcO6V5XcmVMf1PTvJPX8eGQFwmnennU GgClaEos2k/9t/2D9Ee2cwFEMNLCvY9sUB2eAIHB8PhYVErM++xMJvr/UOPJuT/XEj PtTLVZy2lvT/h32qQsI0ivuLZG3qnj7omsGmkZf0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Kalle Valo Subject: [PATCH 5.5 35/56] zd1211rw: fix storage endpoint lookup Date: Thu, 30 Jan 2020 19:38:52 +0100 Message-Id: <20200130183615.383356152@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200130183608.849023566@linuxfoundation.org> References: <20200130183608.849023566@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 2d68bb2687abb747558b933e80845ff31570a49c upstream. Make sure to use the current alternate setting when verifying the storage interface descriptors to avoid submitting an URB to an invalid endpoint. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: a1030e92c150 ("[PATCH] zd1211rw: Convert installer CDROM device into WLAN device") Cc: stable # 2.6.19 Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/zydas/zd1211rw/zd_usb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/zydas/zd1211rw/zd_usb.c +++ b/drivers/net/wireless/zydas/zd1211rw/zd_usb.c @@ -1263,7 +1263,7 @@ static void print_id(struct usb_device * static int eject_installer(struct usb_interface *intf) { struct usb_device *udev = interface_to_usbdev(intf); - struct usb_host_interface *iface_desc = &intf->altsetting[0]; + struct usb_host_interface *iface_desc = intf->cur_altsetting; struct usb_endpoint_descriptor *endpoint; unsigned char *cmd; u8 bulk_out_ep;