Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2096181ybl; Thu, 30 Jan 2020 11:17:14 -0800 (PST) X-Google-Smtp-Source: APXvYqyaN6/fu7wZtePO60WIUszXsHZwRv8UuqF2GvwB9egct5oaPXmAlB1i+z7Swuvqht0xZ/bJ X-Received: by 2002:a9d:4f11:: with SMTP id d17mr4569508otl.228.1580411834695; Thu, 30 Jan 2020 11:17:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580411834; cv=none; d=google.com; s=arc-20160816; b=tlPENeGrVJ5i8lWTX+idwf2ZnAfB+najrmazbrXVjyV09F+4zvXbvDD5nWo9FRFCtk iGiGastBwQ3z6XwIz8o+OZU2ORb3k7UY99Y12ip/P/i8JPMpKuslgbe/RLItE0gY31+g ixPovyHn88OfGD9Yf6kfIbTZLnjPZGlGblHMKV85CG37WdPA31q+r0mICkj3weEW5BIJ +Um9QR6KLXe54moxSi6xF59tosNh7LxfkaHIYGEkHQUPCd3F3Q2Ny7XkQ3I2cROJtoEk MSJ+YdFxZ44jnGZJdwP8fC++lJJ7zSSYzaMl0H5/whV2CY0LcwgSPQyy4NLKKUN3v8Nz iHGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5WjTqfMMaTXSzO48QhZL0F/zzTlEyTxxBHsxsKEzU4A=; b=MpcH5NvvJwBIkeGX6ihYxwesBu2E9joOaES81tNxmBQ/8l+J6Bq/WjP8F9zcKH3cnk t4ZOgtS1uvISwseHOPN45Cz6G7GRo3tLtG7UAVDznIYFw5Q3irnMe1L3873a/6lXdPNO wsLBixQ/4aZUZqVvK88pqxElfKsi3CyEuUaz/6U+GCQONJH0TZfxKyOZx67EoZieYYYU jqO6+H53LpCrZabhtV6vFD01t5w2kM8M5E7txAtkFXONgi4eAsj8vMHbSH1Sk33sdMbv Av03sHPUHZkHoIqsIGajb/RXtlxy8W1XfQkVaOpUL8dbi0ZjU/BBhiDmppzedGD+/BBx GHMw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fYPdpyhO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d13si2230815oig.67.2020.01.30.11.17.02; Thu, 30 Jan 2020 11:17:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fYPdpyhO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730570AbgA3SnR (ORCPT + 99 others); Thu, 30 Jan 2020 13:43:17 -0500 Received: from mail.kernel.org ([198.145.29.99]:51706 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730538AbgA3SnJ (ORCPT ); Thu, 30 Jan 2020 13:43:09 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A3462205F4; Thu, 30 Jan 2020 18:43:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580409789; bh=LUJ1SViBsO0sH8k8QprJ9hxKXgXrgwcmXehoLdRiQ+I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fYPdpyhO0wKoJrkWhJBoSB6XtOV6khKRp+pGlJ94i7pkz3F5us5TsAQiwN1QWckG8 5sn/j1nd0lkUh9rRcdSOQ53nQS0/JHrlv4bteSpGpCProXCfDDm2eyLnL/Flnn8yBf w9Rt7ZB2Qh+TIJ2oZnaHp2qv5mCUiTAW6OK0MQfY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jes Sorensen , Johan Hovold , Kalle Valo Subject: [PATCH 5.4 033/110] rtl8xxxu: fix interface sanity check Date: Thu, 30 Jan 2020 19:38:09 +0100 Message-Id: <20200130183619.304143354@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200130183613.810054545@linuxfoundation.org> References: <20200130183613.810054545@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 39a4281c312f2d226c710bc656ce380c621a2b16 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 26f1fad29ad9 ("New driver: rtl8xxxu (mac80211)") Cc: stable # 4.4 Cc: Jes Sorensen Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c +++ b/drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c @@ -5915,7 +5915,7 @@ static int rtl8xxxu_parse_usb(struct rtl u8 dir, xtype, num; int ret = 0; - host_interface = &interface->altsetting[0]; + host_interface = interface->cur_altsetting; interface_desc = &host_interface->desc; endpoints = interface_desc->bNumEndpoints;