Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4022572ybl; Mon, 3 Feb 2020 11:02:46 -0800 (PST) X-Google-Smtp-Source: APXvYqx6Cwjw6D/8W/M8ApaYhAWJFm4MWgOG/KWcQepNIpydfFeFDKslp+5hlyXzLqI+1ijzxGt+ X-Received: by 2002:a05:6808:18:: with SMTP id u24mr384174oic.10.1580756566369; Mon, 03 Feb 2020 11:02:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580756566; cv=none; d=google.com; s=arc-20160816; b=YfIK8v9FevrFx4OYF5veRFBA63ZGBcAUEv7ofWOpcoBSMqCKBezM9J+c/xD50euBuW ZwAR7YbOgw9UU13kDz50yLzCfOc3cY4pJI411PsdrcLGNcfAEjI5bfkBRpV1EMMcydcW AWV+RbmyqAmw63uPB0OVh9OERAaJYaDgxxuvZ0c2bWf7M7nBLrFRdO8v1k76XlfP3pjD GoN0Kem/nuzt6UlpXfv25F0yKIZt7pzfxDSj9NkSIlUbTlymgIQKbgWlE+Puwvkhb+PT CkKrUxRyRvpG0ZepAsoVk/cH1LEzJs4M6E0cU73q3HVs8zGn3tuOnKri8Qg7lYIjcR5B UfHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FzCv5mEzaSk3uXgSSj14KLRZEWJ2x88HbMopswIKsBQ=; b=sEPyM/B75LUPcXB16VVr6BPuQvoBqiIA1OM2W8AMUhMZvRj7UBbFPMff+lIW0rorlm MQzV0S2ybhv2ZWTrdzgkkTRi+/wMPIKIHfojp92qRj23L8JRTUmv4f8AukRtVuDYuL58 I/Dr8qgGUWI8CgMeF5PP/pw8vJo1VuxRfvP9HPuurtOJ0BlqoAwDtXjcdvgG1v4TGP1z b2iAmn1oTrKwJnjgLHnOa900wf4EJxY2X9P0nO1E/NjIg70Ql1f5J3Ev9d2St9H7P7K4 +9+lI3bfCeIN3v8iiXZw923yAmJhibNgnVXvuQZN6lyQYRuz2JYExzv4b1/sCtmVT42M WCKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=02pPZrLr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i78si8632890oib.1.2020.02.03.11.02.32; Mon, 03 Feb 2020 11:02:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=02pPZrLr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728029AbgBCQZG (ORCPT + 99 others); Mon, 3 Feb 2020 11:25:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:35682 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726369AbgBCQZF (ORCPT ); Mon, 3 Feb 2020 11:25:05 -0500 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7705821582; Mon, 3 Feb 2020 16:25:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580747104; bh=1r2RCV8odKMtOoVyQndG4Ht3SLQtgRn6H9Rb97NQ3ZI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=02pPZrLr9qbmR2c3X6sSAWFV1fYpecIOthqOOksWoFcUuooi+VFw5wp0cpRGmW/6d PQ/nbxeVQKiSzghMvU1dA7Yyi2+9hJTyeYyAJhUJXz03wZSq8K4gIg05i7AvZNxfpS ObBl6WnKgKlEkoyh9s3iJF5CYMyXZHWDJB3hdWxM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arend van Spriel , Johan Hovold , Kalle Valo Subject: [PATCH 4.9 14/68] brcmfmac: fix interface sanity check Date: Mon, 3 Feb 2020 16:19:10 +0000 Message-Id: <20200203161907.302939137@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200203161904.705434837@linuxfoundation.org> References: <20200203161904.705434837@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 3428fbcd6e6c0850b1a8b2a12082b7b2aabb3da3 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 71bb244ba2fd ("brcm80211: fmac: add USB support for bcm43235/6/8 chipsets") Cc: stable # 3.4 Cc: Arend van Spriel Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c @@ -1330,7 +1330,7 @@ brcmf_usb_probe(struct usb_interface *in goto fail; } - desc = &intf->altsetting[0].desc; + desc = &intf->cur_altsetting->desc; if ((desc->bInterfaceClass != USB_CLASS_VENDOR_SPEC) || (desc->bInterfaceSubClass != 2) || (desc->bInterfaceProtocol != 0xff)) { @@ -1343,7 +1343,7 @@ brcmf_usb_probe(struct usb_interface *in num_of_eps = desc->bNumEndpoints; for (ep = 0; ep < num_of_eps; ep++) { - endpoint = &intf->altsetting[0].endpoint[ep].desc; + endpoint = &intf->cur_altsetting->endpoint[ep].desc; endpoint_num = usb_endpoint_num(endpoint); if (!usb_endpoint_xfer_bulk(endpoint)) continue;