Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp713876ybv; Thu, 13 Feb 2020 08:12:16 -0800 (PST) X-Google-Smtp-Source: APXvYqxpZxGPZmF52GLJq9fGU3hN1etc2KEXvpYCuda31d+WTSkQLkmlI+TH5BNXckhCETqT0kM4 X-Received: by 2002:a05:6830:4cd:: with SMTP id s13mr13514929otd.181.1581610336447; Thu, 13 Feb 2020 08:12:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581610336; cv=none; d=google.com; s=arc-20160816; b=YzDxMieugy++/BAg4G94gxo0Xkb24LFjI75GXWaBh5ZhxAo67eQKtrRXo9yEfknU/J p0QoO5cKLT0e8YV35QsUcGnvoRgt/UThhKfyiUhTZSb0ARDZxXgujDZwvnYAwm6HTeQT Wb47R7Q3xTVxyT40iMqpVSAtmTpsq+/4zdVjQ1D8zxwJ/4PbWGWCdxJ640FawVbcLeME reQC+3b1fKrd1z6yH1FMvoQMRE1RmcJm6g6gaXHrRavSWe+DQaGAM/XyN6QPjS9F+nd7 /jnVYelv9a8F9ifXwrhKUTRIunVpJhzQFyR36yUaZSftIF/d/ZbEAV4cJPqUG8MELFU6 aQ0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=7MKUC/VHDh+S07WeyOR7e9l/FTQaMRCehm5PI+mDTWE=; b=iO7rtliJL6ZGIIJ0ZgB27fxFzhkzOqI4RdxHpWvmmMPErRf/WJQ4XjV16uXqjR2izo PeYWE2XTDQEp9XVay2m/lvJgZ/7eKC6li0BvhraV7ye1VTeFw5f1kosng8KkG7L8GCOo dvUkPp7RD20+tqjDykhD1DsLyzWndHtMqHSQbTFEaHSwgureVG3roj15VrlPQxsO4R8Z cIEyej+abswJJNIk4wfilLEUeDogpiVo4iHcMaRxMnxzCGdsyAo9KsMZ7fHwtNQhWtuF YviZtVhPsSuWQgOravPefb9M0J8Ky4gS6Fh9Kjkpef5OBS+OnWIiInmpVFNbEpq4R1Of RLTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="G4XmyJ5/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 9si1193027oiz.237.2020.02.13.08.12.01; Thu, 13 Feb 2020 08:12:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="G4XmyJ5/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727772AbgBMPWR (ORCPT + 99 others); Thu, 13 Feb 2020 10:22:17 -0500 Received: from mail.kernel.org ([198.145.29.99]:59110 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727669AbgBMPWR (ORCPT ); Thu, 13 Feb 2020 10:22:17 -0500 Received: from localhost (unknown [104.132.1.104]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 656EB24690; Thu, 13 Feb 2020 15:22:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581607336; bh=5hDFTEFqhTMBINghl6SqPXEuOch/SmuKxFXn9GwbzaA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=G4XmyJ5/+5lRKWgtXXgLgSa7q3neQXDUNgZelbsZZ05BWXPyHpZW6A8c7/+2QKkPH ltf0h9McywRasfVwuKp+Oyfhm0SNB7pUWghrGwZY+XrOobcvH/NBjwUTp4F3QZttAt z71cDURU/odZbkkymxcs7MW14TJc4YOuR7AuEW0I= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Oliver Neukum , Johan Hovold , Sean Young , Mauro Carvalho Chehab , Sasha Levin Subject: [PATCH 4.4 01/91] media: iguanair: fix endpoint sanity check Date: Thu, 13 Feb 2020 07:19:18 -0800 Message-Id: <20200213151821.848596291@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200213151821.384445454@linuxfoundation.org> References: <20200213151821.384445454@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold [ Upstream commit 1b257870a78b0a9ce98fdfb052c58542022ffb5b ] Make sure to use the current alternate setting, which need not be the first one by index, when verifying the endpoint descriptors and initialising the URBs. Failing to do so could cause the driver to misbehave or trigger a WARN() in usb_submit_urb() that kernels with panic_on_warn set would choke on. Fixes: 26ff63137c45 ("[media] Add support for the IguanaWorks USB IR Transceiver") Fixes: ab1cbdf159be ("media: iguanair: add sanity checks") Cc: stable # 3.6 Cc: Oliver Neukum Signed-off-by: Johan Hovold Signed-off-by: Sean Young Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Sasha Levin --- drivers/media/rc/iguanair.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/media/rc/iguanair.c b/drivers/media/rc/iguanair.c index cda4ce612dcf5..782391507e3a5 100644 --- a/drivers/media/rc/iguanair.c +++ b/drivers/media/rc/iguanair.c @@ -430,7 +430,7 @@ static int iguanair_probe(struct usb_interface *intf, int ret, pipein, pipeout; struct usb_host_interface *idesc; - idesc = intf->altsetting; + idesc = intf->cur_altsetting; if (idesc->desc.bNumEndpoints < 2) return -ENODEV; -- 2.20.1