Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2100079ybl; Thu, 30 Jan 2020 11:21:14 -0800 (PST) X-Google-Smtp-Source: APXvYqwyqcdIR+tbkCAwU+WqTGym7GM+ruGszPDz763TcqbqVBjwKVAI8IclZdJIDOHMD8mNVfEB X-Received: by 2002:a9d:111:: with SMTP id 17mr4623914otu.335.1580412074167; Thu, 30 Jan 2020 11:21:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580412074; cv=none; d=google.com; s=arc-20160816; b=lnwhyfoPRgQ1wcsxEV4hyPKIleo9qH0L/gARlFX4Idi88W0wkI8caeYcefcfX1dfD3 WZAvM6u1aphP3zyURSDAYZmSf5fq441/IMKbPRCnFmK3UK/BALGlrRgPE2WtoljGFadR +MJjTFLVxFuUjr6plpRUi004Po1FPNRCp1Ny2QdkSlgRZ0rm2Bty0EUk8oYSBC4tvdoF g9sc/JTivYqxvKV3pryg+0ZohEkbf4UKAPsqfgJmqXHIGJI93ouAevffZqsvoT3nm1db ubCdSFkeTq5vU5602OP9f8v5OwLFFFL0QUD34zzxAS7Ia/h0uE528mqVH30wqcI7qzNX UPpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wkGtKcrEfwlnPza3BIgh5VxTpGBvHrjicPGXVHNqwXs=; b=iq78QcKZtsis/IlZrXE+f5c2hCpwFQ0rFwFyY+tY5syl8Q2dWb2WacjfFoB+W1SeL2 nRZYObj1E0cImvtofv4ewETrncd6djRbFi1SA1kY8CoYz9Cw+9qnWlt1P/WJI+WsEEhO 3VbJvn56jOKRkF8RJBp4MMZRtus3CY8uiSXqD1V9L9QczXPg3B1Gwp/26HCXO3XYU3B7 eaXJojQr1MYbnnd56HiW9TOi7/qoNqGz0neuWJjA1nMwLGb0XCW+Jpdc8Tn5l2o94VlQ wGpAFAjDvB3ykXI1uCdfKOpiFo6p9MHMbgKOQQuALPK5+8JZZ3eCk7wKPx8VVfA0Gyz7 iw/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vN9ou3+w; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d2si3457673oth.267.2020.01.30.11.21.01; Thu, 30 Jan 2020 11:21:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vN9ou3+w; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731358AbgA3SrU (ORCPT + 99 others); Thu, 30 Jan 2020 13:47:20 -0500 Received: from mail.kernel.org ([198.145.29.99]:57772 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731348AbgA3SrR (ORCPT ); Thu, 30 Jan 2020 13:47:17 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A4C5D214AF; Thu, 30 Jan 2020 18:47:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580410035; bh=Mk4vzYviUrOYODydEGb0g0Jx38FB2OMBIl3s58qcUGM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vN9ou3+wqMRnyy3nMbATDUfJKV1MpxIu0ybt3AlRoWCOCEYtveNTzdDA/bC7dVtuK 4EYtMD9isuc2pnHldraD6rYfa+jt/nqiVPnIIJaqYzchCfgwxBF/aDGz00UPVEIhyK HtI1xeh/VfRfCkUhUWuiT3sQD6nvoOc5nqezws0I= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jes Sorensen , Johan Hovold , Kalle Valo Subject: [PATCH 4.19 21/55] rtl8xxxu: fix interface sanity check Date: Thu, 30 Jan 2020 19:39:02 +0100 Message-Id: <20200130183612.657914937@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200130183608.563083888@linuxfoundation.org> References: <20200130183608.563083888@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 39a4281c312f2d226c710bc656ce380c621a2b16 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 26f1fad29ad9 ("New driver: rtl8xxxu (mac80211)") Cc: stable # 4.4 Cc: Jes Sorensen Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c +++ b/drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c @@ -5921,7 +5921,7 @@ static int rtl8xxxu_parse_usb(struct rtl u8 dir, xtype, num; int ret = 0; - host_interface = &interface->altsetting[0]; + host_interface = interface->cur_altsetting; interface_desc = &host_interface->desc; endpoints = interface_desc->bNumEndpoints;