Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4024616ybl; Mon, 3 Feb 2020 11:04:43 -0800 (PST) X-Google-Smtp-Source: APXvYqzkZPuKlgYrs+WzGNZLp8mF7/Xt34iweJpEAnnCpcIQpL2zCpGGFlIj/RWgU6ZNz5wWrRlz X-Received: by 2002:a05:6830:18c4:: with SMTP id v4mr18077602ote.265.1580756683156; Mon, 03 Feb 2020 11:04:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580756683; cv=none; d=google.com; s=arc-20160816; b=l8f3P9++k3PU6ctivtVpH70O3OJg94Vn187o70vEx44530LakhYgMLoDD524I+gv3X 1MJ2dRMcjLMT3IlkGDvlExgqNH9rgcGGHbX9q3HQBJa6hszcB/pj86pw7Tee3mnIvuci p5KZywisAg2IvezqZY7cuaHUZyGLItcvfKapEn9FhPiXD0IYPtoH1PRGIECl0iT65R0P yGXo43sefCR4zeMNEXTfude/yCSBjdgwqgJgmvuEhjeHIx9ipGVUttwOXoxfdy0rpBgC dYA4jCfwnagHQDAZ/uqJec2hxIBjnmc/POzGaLJd+OJtZhL3xtZQhBZtN3EBA8ND94HN 2gQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6oFqJzm6NldPiuAgY0ciikpDi/QlqDAeltkONUwpcYc=; b=rcqGq1/rTLIFu/R0xyDbEfn9R64b5nCuQ9q8dNJsnnTnOXXh8IEUYFRRU7qLitwljm JCt3l0fOvAuMc5ms1lTpOFzEb+xmQhHptWKgR1aNReN1Mal24t+bOgl6fWBKWfzEi01X EAOwWrwVUS57oqIK8Onoo6u8tJRzHWuUf+wZzy00DaOCFzWVCpAatQeh2kqHwMf7KXU1 t1Z2boxNfxoRqPYBFZKORPXi+VwgNK3990kokdoX/xYV6UL+U+NfQHR6XLxHD2Ui++qB O6IqdjtSxkigL1Apaqk5LwB20gvHnyKg6hiPNFx4oPD71GGpvR7MEoQpGsoWxO1B1Eq0 /WSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2HRGDWIg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c64si8634928oig.178.2020.02.03.11.04.30; Mon, 03 Feb 2020 11:04:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2HRGDWIg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729462AbgBCQ1k (ORCPT + 99 others); Mon, 3 Feb 2020 11:27:40 -0500 Received: from mail.kernel.org ([198.145.29.99]:38956 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727588AbgBCQ1j (ORCPT ); Mon, 3 Feb 2020 11:27:39 -0500 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D743C2086A; Mon, 3 Feb 2020 16:27:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580747258; bh=489OQ6z834AyrbF1w/mFpUqOVCmha7wDI6GBSA7byM0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2HRGDWIg8VjgtPs/vAcPEA+fTcV5XhoVyTYMdoyjE5ODCM9Xt5J6H6UCf6qQyGLXr laaEbkO12CgxqobnbGGRVeWxgs+wOExmJtfCfVj8z061o3NNyF2MQ1KNG2OFgk0fSE 6VPZDq8aDfA7gIQgHuojhkWke3Gc1fZ53iE3QdQ8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Kalle Valo Subject: [PATCH 4.14 01/89] orinoco_usb: fix interface sanity check Date: Mon, 3 Feb 2020 16:18:46 +0000 Message-Id: <20200203161917.048693696@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200203161916.847439465@linuxfoundation.org> References: <20200203161916.847439465@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit b73e05aa543cf8db4f4927e36952360d71291d41 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 9afac70a7305 ("orinoco: add orinoco_usb driver") Cc: stable # 2.6.35 Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/intersil/orinoco/orinoco_usb.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/net/wireless/intersil/orinoco/orinoco_usb.c +++ b/drivers/net/wireless/intersil/orinoco/orinoco_usb.c @@ -1613,9 +1613,9 @@ static int ezusb_probe(struct usb_interf /* set up the endpoint information */ /* check out the endpoints */ - iface_desc = &interface->altsetting[0].desc; + iface_desc = &interface->cur_altsetting->desc; for (i = 0; i < iface_desc->bNumEndpoints; ++i) { - ep = &interface->altsetting[0].endpoint[i].desc; + ep = &interface->cur_altsetting->endpoint[i].desc; if (usb_endpoint_is_bulk_in(ep)) { /* we found a bulk in endpoint */