Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4022848ybl; Mon, 3 Feb 2020 11:03:00 -0800 (PST) X-Google-Smtp-Source: APXvYqyaorvQYlKBIRXYc85txl/1CBgckCiBY6O0fkRSoPObSPFfSNzrYpvFblul/pX9cOvBoMT7 X-Received: by 2002:a05:6830:4b9:: with SMTP id l25mr19012431otd.266.1580756580219; Mon, 03 Feb 2020 11:03:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580756580; cv=none; d=google.com; s=arc-20160816; b=MOl2Uf8qn9FDK3r5Oi8L7ohffcsvrs5hwWgyDhnGMKvGCdpeSVGvMNZb9Codswvre7 NfNGw2sAJrvHZ5p8R/P3RC4co1PumFFmqhSiMA1TUf1cTY3Amx2uddbpK3ZtBilARwmZ 7PWi4AoTp7H2btEa1f1KaWLU6fd6FOOOZ9CtW8A9SQoaWTbmxpuEYOeOQOsuAdLQZqHX sNq5rArfUHE3ib+71jLnM9UDpph5WAkPhBcMp9raGlXpap09BLRQvGcly46i/1xTwgly 7DA/sxr4EGlFwJ9kC+Z9PTjx/v1ELVNNboriThQHUUlaYBRot8NuwaQu2qnrB9m8oRRO mH+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Oj9D7VETzX51xUT19p/bKnkcwY/a3jxZTWw/KREGpn8=; b=UwbA61cRybpWxGUhCi9x6X+xIDEjM8ot/FrOzbvOnCZ4ThsmdEXvkB2rEa4W03pZGw bgiGGW5ecrC4XtJXiBs9bNjQ5HwBuXPShWjdgJReEI7+iqDuZbkrUf5/sr9kf0/lqiNX WJmbqyxj5sq3m/HskSIoBxrUL+thODWoM+xdVwoNRi6U8Fph+nOMjsNemQGhI5YxIELZ uC0E3rZSfWfGGDTzSrw9UlPVo+oVbv/ULFOuI7HnQIX9OpSSE3Ytu1DZOK883pDJlcJX oOr3C1iuBx43BhQssEFKwrNh23DJ/LOTS/OhSVgKl+/m7GGx+3WO4Et6knwxKM4+inso DTrA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=U7U0zUDl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i78si8632890oib.1.2020.02.03.11.02.46; Mon, 03 Feb 2020 11:03:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=U7U0zUDl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728108AbgBCQZJ (ORCPT + 99 others); Mon, 3 Feb 2020 11:25:09 -0500 Received: from mail.kernel.org ([198.145.29.99]:35608 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727939AbgBCQZD (ORCPT ); Mon, 3 Feb 2020 11:25:03 -0500 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 05B282087E; Mon, 3 Feb 2020 16:25:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580747102; bh=fYBLQfioAFLXVP4+W9lqJsj8o/aOsIiqIGbkM1lhc0w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=U7U0zUDlI5b3qt3NWVxsbIOc8wSn/i1s+7OP4/8aFqhdVAZoUUFy533lb2PxzXEID 88LC/BB1Kmugtc574Uh7NRsZ7WqNxBDz67YOFuurxYUbiFojRwUlpPk081OKrKb0Qb Ss007XqJvTukTNdSLxyExsv15sQ68WmZZ4i/2lng= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Kalle Valo Subject: [PATCH 4.9 13/68] ath9k: fix storage endpoint lookup Date: Mon, 3 Feb 2020 16:19:09 +0000 Message-Id: <20200203161907.090357058@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200203161904.705434837@linuxfoundation.org> References: <20200203161904.705434837@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 0ef332951e856efa89507cdd13ba8f4fb8d4db12 upstream. Make sure to use the current alternate setting when verifying the storage interface descriptors to avoid submitting an URB to an invalid endpoint. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 36bcce430657 ("ath9k_htc: Handle storage devices") Cc: stable # 2.6.39 Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/ath/ath9k/hif_usb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/ath/ath9k/hif_usb.c +++ b/drivers/net/wireless/ath/ath9k/hif_usb.c @@ -1213,7 +1213,7 @@ err_fw: static int send_eject_command(struct usb_interface *interface) { struct usb_device *udev = interface_to_usbdev(interface); - struct usb_host_interface *iface_desc = &interface->altsetting[0]; + struct usb_host_interface *iface_desc = interface->cur_altsetting; struct usb_endpoint_descriptor *endpoint; unsigned char *cmd; u8 bulk_out_ep;