Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4026458ybl; Mon, 3 Feb 2020 11:06:31 -0800 (PST) X-Google-Smtp-Source: APXvYqwhmTIELu6QyBkqOp+SaalZWk3DoEuqNrgyDroVmusu27hjmqGgMw2qhD3mZ04v08BSKSKd X-Received: by 2002:a05:6830:2154:: with SMTP id r20mr19429183otd.131.1580756791029; Mon, 03 Feb 2020 11:06:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580756791; cv=none; d=google.com; s=arc-20160816; b=GhQvf8lhoMjQAOJf4txVJz2jh4i8zX2sQ460TZeDafIPLrA5Zlj+/iADtRFvN6nrBi LMbDfDZvxIt6p/Zc70pelrLYyXUt7kxuIMw0hS93W2P21Bg+RH+rxP3NVf5uOOpuGHEL cMk1/T/AtE/iyroh29c3OEUPsirf8wT4PgjsUb1bFGv0BFzzlQyafNO//SccV3NDGTcR /4T5gmwWh9pzXixqymPGVr2Rxf4hrNijg+46r29nwY3e0DaUxoBcz3rFiNQGeKGd+fDr ZpgB0ibhn1VcJXBFXsE0AaURUSk1IAO+YyCklAiV3TmgZ1V0JIqKICdmXMnsRP/IUMgO 60nw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pZwvgBhwRxNCYVyLq0ZUcG6RMN2+a8XVHH0wzGjOZUE=; b=PynBUJf+AxVp3Y4zta7gVc65S72+yxXvD0GNE/rKjLAJn6E9hEPO/Up2+FQVXa+hhH Vtng+BtSeD8NTOTjPafwXnI7S9DzHj6whjd2Jpj+/nwMcEb7Dy8rgGdvMUIAUWrvqLRi iY5/ErR62A5d4ATcgDuJWE7ApXY4lOBUenU9pnIJsu7omNDm46obi8XZQpIVj02HMrrj GgWclHGM1fKjOtFLU5SR/RnCWq4Iuc0IBEoEWAQzi7fNBUuu1VFmbDTQl+TH5Isem+54 0eLp3zQ6vB/9fx/4dCw+ITH6CGUmgMyIXyjco8OBKVrYaeWP67Xgg0yX7FCKsmCyruvZ /P1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NQWGeA5U; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p186si8816345oih.172.2020.02.03.11.06.18; Mon, 03 Feb 2020 11:06:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NQWGeA5U; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729582AbgBCQtW (ORCPT + 99 others); Mon, 3 Feb 2020 11:49:22 -0500 Received: from mail.kernel.org ([198.145.29.99]:35754 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728074AbgBCQZH (ORCPT ); Mon, 3 Feb 2020 11:25:07 -0500 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EF9982087E; Mon, 3 Feb 2020 16:25:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580747107; bh=0g42LAuj0tkgZiv0m+pSxZl1NoIyGCndGzp3CHEoVCQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NQWGeA5UBnWrqdPRXDc2GRmBcQQbi08WgiDnl16dNTBKJb7fzDG/CEB5yyvPL5hH9 OOa6/WGVeCxAFgw85szYf4k+GJBmaJ3Yd2SLiX+eAF2sH75l4psMcSCntCzfKlKoOB iu7sZdjXbgFSTVeacZBJhzqEwBsAFaB5dXaZHqkU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jes Sorensen , Johan Hovold , Kalle Valo Subject: [PATCH 4.9 15/68] rtl8xxxu: fix interface sanity check Date: Mon, 3 Feb 2020 16:19:11 +0000 Message-Id: <20200203161907.505766838@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200203161904.705434837@linuxfoundation.org> References: <20200203161904.705434837@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 39a4281c312f2d226c710bc656ce380c621a2b16 upstream. Make sure to use the current alternate setting when verifying the interface descriptors to avoid binding to an invalid interface. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 26f1fad29ad9 ("New driver: rtl8xxxu (mac80211)") Cc: stable # 4.4 Cc: Jes Sorensen Signed-off-by: Johan Hovold Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c +++ b/drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c @@ -5890,7 +5890,7 @@ static int rtl8xxxu_parse_usb(struct rtl u8 dir, xtype, num; int ret = 0; - host_interface = &interface->altsetting[0]; + host_interface = interface->cur_altsetting; interface_desc = &host_interface->desc; endpoints = interface_desc->bNumEndpoints;