Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4024637ybl; Mon, 3 Feb 2020 11:04:44 -0800 (PST) X-Google-Smtp-Source: APXvYqyc162QLtG/4H78d8fnShiBDcsF5L8kO7lkBpbFMmudyWa8lCxOKujKLa9MSxHhw2iDrkA2 X-Received: by 2002:a05:6830:1094:: with SMTP id y20mr18682971oto.12.1580756684094; Mon, 03 Feb 2020 11:04:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580756684; cv=none; d=google.com; s=arc-20160816; b=T0XKhG+R0/c8kAEdshie7evbgeHdnfGiEmTYUuJ/Yiav+kWn4pgtQqzr4z8Ne5WTzF ZobdQF0Lko4uTcQSwT7lOM9/cvEVgWabZoBa7oNFmN9Ipg+3wzwwudS1Ipp4zfAjw88M WFc+xKPacoJX8bLRFj99wMDQm10nFeXIamhY4oLD4FTv9jyx3biDgp0Bgz9YQj0oTwwC mHRCy8tm2mmwNvGcl8uT1/1G6Lwkw6/bH7lXYwTSyWlDrA1nomKGl4Df37lHH7mrgwF8 YXd8MOki0xxcoqs6p4Kn3qmThlESvcbYB/3dsIVv0lDxXQhpaNapjph59d2Uqv4X+8qj 1ZpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=V0Js4DJcRw/IaWvrsgLgT5lDYErIfaDA3GpNJevLkXc=; b=RuAuwhyLi66VQ2x6MHx5OqFMkhE72sQAUltJXGo2SmqsX+SqQmIPZWnOQ2ixJ9+89s 2mmlUeflAoJ6x8d7gQnue1CYLzsfl+tD+mnwbLeZdFJrcATuIVeOtZpx96GynZM8EEgZ D+59XHPIUSKWkWEDP4zqrU0DkPBJOlkyDLfTd+Qhk1Lr/1cKaKN5gIWZN6o65/3Fmyao aFYeO/eGGcTCic6qiB4EhdoZdi+/pFU2DC0+hW3JWBP103MxtWJOEb+aLN5lcYl7+6Vt hizJjOp6nbI/3zA7gq2YEjJS/teGXJujIg3cdLmSgs6CuIMQ5Yot4D4eQnxwLTSyTElP jJIg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=l5gkyEFs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p8si9708366otq.170.2020.02.03.11.04.32; Mon, 03 Feb 2020 11:04:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=l5gkyEFs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728361AbgBCQ2D (ORCPT + 99 others); Mon, 3 Feb 2020 11:28:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:39254 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729482AbgBCQ1u (ORCPT ); Mon, 3 Feb 2020 11:27:50 -0500 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C6C9220838; Mon, 3 Feb 2020 16:27:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580747270; bh=CiQeIRcGx1eIKU7i3VXIcuFBQVvaTX2mx9Zqf/l7cyA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=l5gkyEFsvqyBUVmTLdSShThHn4Lr/fDG8ATAr4Te0eti/K1mlZ0zhVmb7TOgkZqd3 ajqzhfgU/uAbHxqPPQAvnS6HAABLifgxDrLo29qEuCL/RwqmhpEQgYZhpagWGtygXn qQvqbvZ3DWmCpYRm0tfP4FotTE3KIhxkBgWgG4gg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Kalle Valo Subject: [PATCH 4.14 14/89] ath9k: fix storage endpoint lookup Date: Mon, 3 Feb 2020 16:18:59 +0000 Message-Id: <20200203161918.759534226@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200203161916.847439465@linuxfoundation.org> References: <20200203161916.847439465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 0ef332951e856efa89507cdd13ba8f4fb8d4db12 upstream. Make sure to use the current alternate setting when verifying the storage interface descriptors to avoid submitting an URB to an invalid endpoint. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 36bcce430657 ("ath9k_htc: Handle storage devices") Cc: stable # 2.6.39 Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/ath/ath9k/hif_usb.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/ath/ath9k/hif_usb.c +++ b/drivers/net/wireless/ath/ath9k/hif_usb.c @@ -1214,7 +1214,7 @@ err_fw: static int send_eject_command(struct usb_interface *interface) { struct usb_device *udev = interface_to_usbdev(interface); - struct usb_host_interface *iface_desc = &interface->altsetting[0]; + struct usb_host_interface *iface_desc = interface->cur_altsetting; struct usb_endpoint_descriptor *endpoint; unsigned char *cmd; u8 bulk_out_ep;