Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp483520yba; Mon, 1 Apr 2019 10:12:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqxSCBIlTLlqRPPR8KgE9/bMnI+AEahQxmiZx2Rme5Djg9hNNtrG4TMppbXvz16gKqyN4ZVP X-Received: by 2002:aa7:8384:: with SMTP id u4mr2511513pfm.214.1554138731510; Mon, 01 Apr 2019 10:12:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554138731; cv=none; d=google.com; s=arc-20160816; b=m+Kn32E+c0wLEaPKGqJTbboO5jzi1Aw60ubY6hNzm6T5J6YNNoumh1g7H6AK0XYhep +Mxwpm7jCi1sYSzOYXE3V+HqNIXQxc6hpyeNdSEnC6WEx1UZpTmWGzkw+mbDe502OZFd OXZSg5WsayaJnl6il6m9yPjfz74P6Axv/oz8TW+KmVVEOdoC4AohpBmuYrKcjZssOhYk CmkN8OljEiPZ6juXZ6x9xYTVG9r9d6Hr8ymnMtWS2Eok23V7gKQQ2DnQcgNybLzvxFYN B3pUHkEpuimwxskm8/WeYd0ao4rqrpLuNJSWPp11/c5BaNdpkfWvWZBVqqtYgxjt1W9g VUzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=djbALhL8xwLLq3VYyCi8S4u7hyzfpdK0YD48LKc6VTg=; b=ZNdRQwiqDTaq+4BTuSC6ZkS/r5wdS+Gfqx44ohr9YTgnINZzQGwPeF7dxr7aNd36hI kjYD/L9QUO2Cai1+MLZHOFQxDG4fg8d9z5In9LQ99epWACLLTTXHuLU1uzvjRicUz1Tw 36jm40il7AHfZ4ij+Jr4GsRWlHo8Zvz9hQGcNsN9fiZdJGAuMGklx/HfK8Z+Dj+eNQwt ki+Fh7xDC3/s38weYq+3/hI36XQKsIQw0wtNp08V+aHuszirfzJWjJBAft5gSILflAyx 7SNu1GwzouNUDQiE/u+2N10f0ljIiudMuP8tgH+1LzJdnBP7ZLjzbvxO5hJFp5nQ38n7 OWqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=G8RJuugy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h25si876775pgv.244.2019.04.01.10.11.55; Mon, 01 Apr 2019 10:12:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=G8RJuugy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730003AbfDARKj (ORCPT + 99 others); Mon, 1 Apr 2019 13:10:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:58448 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729650AbfDARKh (ORCPT ); Mon, 1 Apr 2019 13:10:37 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BC54A206B8; Mon, 1 Apr 2019 17:10:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554138637; bh=Nm2OMvfi99GsJmOGU+7MASJ26ev43I0cXZ0qgu2spgk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=G8RJuugyD6oqA1gB1eiuGvDv6WKyfyIxQ6r5gddBJJNnvA8ddz4A0ArzOREupYBIj UtZOl2S+ycJSY/f79bi/8+m/7pLSGfQVXABLTbEBBect7+YkCrqJbmilgEsPtFwM8L InpYmpJEz+Vulu5du4l1C9t2b1tB3usnjMHg4Pg4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Romain Izard , Oliver Neukum Subject: [PATCH 5.0 122/146] usb: cdc-acm: fix race during wakeup blocking TX traffic Date: Mon, 1 Apr 2019 19:02:14 +0200 Message-Id: <20190401170058.669057070@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170048.449559024@linuxfoundation.org> References: <20190401170048.449559024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Romain Izard commit 93e1c8a638308980309e009cc40b5a57ef87caf1 upstream. When the kernel is compiled with preemption enabled, the URB completion handler can run in parallel with the work responsible for waking up the tty layer. If the URB handler sets the EVENT_TTY_WAKEUP bit during the call to tty_port_tty_wakeup() to signal that there is room for additional input, it will be cleared at the end of this call. As a result, TX traffic on the upper layer will be blocked. This can be seen with a kernel configured with CONFIG_PREEMPT, and a fast modem connected with PPP running over a USB CDC-ACM port. Use test_and_clear_bit() instead, which ensures that each wakeup requested by the URB completion code will trigger a call to tty_port_tty_wakeup(). Fixes: 1aba579f3cf5 cdc-acm: handle read pipe errors Signed-off-by: Romain Izard Cc: stable Acked-by: Oliver Neukum Signed-off-by: Greg Kroah-Hartman --- drivers/usb/class/cdc-acm.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) --- a/drivers/usb/class/cdc-acm.c +++ b/drivers/usb/class/cdc-acm.c @@ -558,10 +558,8 @@ static void acm_softint(struct work_stru clear_bit(EVENT_RX_STALL, &acm->flags); } - if (test_bit(EVENT_TTY_WAKEUP, &acm->flags)) { + if (test_and_clear_bit(EVENT_TTY_WAKEUP, &acm->flags)) tty_port_tty_wakeup(&acm->port); - clear_bit(EVENT_TTY_WAKEUP, &acm->flags); - } } /*