Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4024483ybl; Mon, 3 Feb 2020 11:04:36 -0800 (PST) X-Google-Smtp-Source: APXvYqwN7pJxiVZxyTFyq6UzPqHFLk5nJIKdmof7Ea/Ez8m3ygunTUuuQnmNvIJBfrFKQHoaPWwo X-Received: by 2002:a9d:222f:: with SMTP id o44mr18859170ota.51.1580756553626; Mon, 03 Feb 2020 11:02:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580756553; cv=none; d=google.com; s=arc-20160816; b=sEyZMItIb4QRPVwj/wq+iKyMXFSta4W9bg8N/qlwyqFHo0DZsZATqZgb5Zdhuy8A1m 9ZvQVCNJorsLmZj9RcSIyNYWbBAXTshMlxzkkciVuLx8t8JAGVOy6kiiPWeP0OD0qJxa zixT1c3hdF7nby8HoEnBEjQbtq3CmCjpZUoE+Z2i5apzEmOEJ/KseHWuDk7Ic21lmtkO rp0FCLDCwhlHMruKtlBuzwsYMIOjd+v41amRnpOWUf+0pwgGkOwqRghMW3KiVbtbuFLx EK8WzuHNn8Ubp1CvmkHZO3oN+svMlngSmzDvTigGCuuEvvtRBMyKnbXr/CbKmB597M+W dLxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RkqQ8nCtZNK5PedgxExj9Rdik9CQOYy0ChEqh0qUSqs=; b=ktZYICi6GzAwjbO+mFDHxQnDA4f2fms0TJlWgcBm/wJS5hUpsCN0z9dEsFimQkR4f+ TeLwukd+IzGhFYbMVl0JFKFiXEoV4+ZSNdlAN+QJIU2TOUD8bqRmiCN7vNUrptpGcS+Q i3j2C3ECdGCBwTbCD16Dd36JdDMTQcne1QXgssweBOeBcHjpBCprYx7aCWP13qLMvp/q 54k3VQS2pDRyUWjYSgL5ZEbl0yTYlrO4zwyLZVUN1OSWrbQnJgm/b4C5zeobW1iTKbOu goKcuizaK+IiAqlWOK6qbxuZktjsgw4XvG4vJ05O5nz4L2n3VinhEDJF12jjSEGnWjGH 3cGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="fX788b/k"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h3si10146258otq.203.2020.02.03.11.02.19; Mon, 03 Feb 2020 11:02:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="fX788b/k"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728172AbgBCQZM (ORCPT + 99 others); Mon, 3 Feb 2020 11:25:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:35808 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728128AbgBCQZK (ORCPT ); Mon, 3 Feb 2020 11:25:10 -0500 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4581821582; Mon, 3 Feb 2020 16:25:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580747109; bh=12c1Cba7k9vHIdxb59e3M30I8y9BZKq3PODOf2RGwDs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fX788b/kPduGmEJF6ECai68kcLZy9scUT73QCg3o0Gdfe9Q/H7p2ep2HizMD6AIHb NVYT37f7TGL0fcfC2XA+F1fPVIWda/ZdLWvdkENl7EmR00p94S3vb9q1gnJeIJNxng Fr5aOBn2ne45VNd7gTD5KXeHU1joFv7yDewSaPSo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Kalle Valo Subject: [PATCH 4.9 16/68] zd1211rw: fix storage endpoint lookup Date: Mon, 3 Feb 2020 16:19:12 +0000 Message-Id: <20200203161907.738309609@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200203161904.705434837@linuxfoundation.org> References: <20200203161904.705434837@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 2d68bb2687abb747558b933e80845ff31570a49c upstream. Make sure to use the current alternate setting when verifying the storage interface descriptors to avoid submitting an URB to an invalid endpoint. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: a1030e92c150 ("[PATCH] zd1211rw: Convert installer CDROM device into WLAN device") Cc: stable # 2.6.19 Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/zydas/zd1211rw/zd_usb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/zydas/zd1211rw/zd_usb.c +++ b/drivers/net/wireless/zydas/zd1211rw/zd_usb.c @@ -1272,7 +1272,7 @@ static void print_id(struct usb_device * static int eject_installer(struct usb_interface *intf) { struct usb_device *udev = interface_to_usbdev(intf); - struct usb_host_interface *iface_desc = &intf->altsetting[0]; + struct usb_host_interface *iface_desc = intf->cur_altsetting; struct usb_endpoint_descriptor *endpoint; unsigned char *cmd; u8 bulk_out_ep;