Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2101304ybl; Thu, 30 Jan 2020 11:22:36 -0800 (PST) X-Google-Smtp-Source: APXvYqwkrOG1YvHWpnKxVi73QG4X3jmFoPadK49wnf1HK0MSSK6HGEA4NcBsaX1LQ1xGYSeD3C5N X-Received: by 2002:a05:6808:45:: with SMTP id v5mr3788485oic.90.1580412156144; Thu, 30 Jan 2020 11:22:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580412156; cv=none; d=google.com; s=arc-20160816; b=HYNTtuQgiVBwf+Zxz7fcuiqdQAmTUusMPjFFYTPHuXL3Xeaep1wBCwACyAg7Kdntds MvjY9yrUfsIL39njeaaZaRgicr+H8dwDNQ1howIBwex/6EJf3rZgTVRRZiBpq7/B7BjM +gTeVc28rRnZggKq0sWl6LP5BJgpzu5vurIqI/m1uCWJ01KqKBx2suqJT69UQCSmCGSp K/ff+GqmZLG/JHhjr7UPnZx5ViOsatkEtVlloP/8/2e9rZqDtNkr8V6x9yD/A2qBiCij 7TC01cZNEcdMSSPjf26+IV+ygLHgy8J72SSTpdpMJ9wtQGuQYfkmLBTX7EhomC1CVhT+ WzHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=R1F0FsQNsFKuiKUeyle3B71NQ0cTl/kCOuclq7vr7Rw=; b=ungpIeFXxiORVAoOlsBaBdcx4j7Kv9q+QGe1NPppEbLo/x7vVrbRnwLh6u24z3onbE CZCwdMwEDbGjhHOjki7R9S8tmkZoRuhO2oCtnhRTxGdhVeLPZxoJD95PIXhG9hziYWlB Fa2DPpK3dBuYDAkeXqwH0ntOOJ53kDjZnv6tAGcZDoOHXWrhe831KPcMshFCOvQu4l8y 16P7xk+HwRrRWf77FXwQv41x2Sd6RhHdW57W17HcVMdeYPR/uR4vd0g4jaSH7qk7v9H0 xfH75xu3U2f54wxMSLMtxGJ3i5+381hR+08df5WMGsrf1XRl9mkt3g2RtndIay3TH2Q0 LKig== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RGKkY3Hl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l15si2970780oic.220.2020.01.30.11.22.24; Thu, 30 Jan 2020 11:22:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RGKkY3Hl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731628AbgA3SuW (ORCPT + 99 others); Thu, 30 Jan 2020 13:50:22 -0500 Received: from mail.kernel.org ([198.145.29.99]:57648 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731325AbgA3SrK (ORCPT ); Thu, 30 Jan 2020 13:47:10 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B89B320674; Thu, 30 Jan 2020 18:47:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580410030; bh=JR1RwpBMjLTWErhKmNkJO3sfcrMLDq74tnVgsfQQTM8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RGKkY3Hl35v56wlGT8o7S1fImrPgrhbCjXdArkoZ9h5QfKmVhTzeEpHPDxZr7QFtG Hu0ibqQ7hoGy7Kmf+5EDPiOirTcuN9IRJ+MatQiqH7I8Mw3LY5GEEqUdWxj0SwY/Fg WCKSlblf5erfan/mR9KC0Bs0EiSHGtzLgIS6y4do= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Kalle Valo Subject: [PATCH 4.19 19/55] ath9k: fix storage endpoint lookup Date: Thu, 30 Jan 2020 19:39:00 +0100 Message-Id: <20200130183612.333711871@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200130183608.563083888@linuxfoundation.org> References: <20200130183608.563083888@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 0ef332951e856efa89507cdd13ba8f4fb8d4db12 upstream. Make sure to use the current alternate setting when verifying the storage interface descriptors to avoid submitting an URB to an invalid endpoint. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 36bcce430657 ("ath9k_htc: Handle storage devices") Cc: stable # 2.6.39 Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/ath/ath9k/hif_usb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/ath/ath9k/hif_usb.c +++ b/drivers/net/wireless/ath/ath9k/hif_usb.c @@ -1216,7 +1216,7 @@ err_fw: static int send_eject_command(struct usb_interface *interface) { struct usb_device *udev = interface_to_usbdev(interface); - struct usb_host_interface *iface_desc = &interface->altsetting[0]; + struct usb_host_interface *iface_desc = interface->cur_altsetting; struct usb_endpoint_descriptor *endpoint; unsigned char *cmd; u8 bulk_out_ep;