Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp499164yba; Mon, 1 Apr 2019 10:31:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqxe89lAwLGK8gC/7HG01e5oK+y5XOiD8fdzQEcoTIxL24W5EV9Lb7W9UbIbQ01oz9jFVqI5 X-Received: by 2002:a63:fa54:: with SMTP id g20mr7184271pgk.242.1554139881265; Mon, 01 Apr 2019 10:31:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554139881; cv=none; d=google.com; s=arc-20160816; b=EKZzm/vz+ai+JdbWhfS2NaNpTiJNivYD3zValDHuuWDVFLt4DuQilOe4QiIrQQp9Zm R1RKSHpBdQAoyVxXX6kvzP2dYa77iAvv4GQRHb1TkbUmbrbHVdjnEG4tO0j1MlEGzQDV GGJo07ZGqWKxN3MfZVwI76+9HeXlf6sZxNoO9ylz8Sv35Zoq1VSqQzPn1Qy8Xcc+Yrd3 oZTA8HvIrc9hnXGdtSu3ZnHMZNi4H0MJVzaAJIZ1UJtR6tI/xzHAmdR/fF0BhqUvtNNf aF3EVRjdnNJ6yAAGkyjq18WmpkF7se580MGD7fZOiwjUMwA8ZpqZncWBOHdwvjgPA+rC LqNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=LjTo6vSWjmCU6lTfc2SyP5uk8d6n+EtjGe9+uxOxPNs=; b=ZlGI182ucUvXolaTvCi+oAH4fa19Rd1gyBXOmLlt/ElCLfStz2GgMflBD6AVn1sIyD ViSvjqqyA9cKiadlg3yp7gP9xzMPDtc75F6Idw9TZ+2UkWdXhkm4n2VgCtjw53QGUQ7E tvT/L+QdfP776s/L4PBunZZUruIK4K87A+PuEKENetqxqCSdxnU3pjcmILQOKS+Ve6lp 0+kP+w2lN9Z+apfA1/Lay5Y3Jm48he9yCt+bvqwfKA/QCOnvEH4uMGYwun2C1QEsu3+B d/Kb7rMIzu97CUQ+zdKniKD9SoV1oUuM3VP58SKjqqcxbrrHL7j+SYfAhG51SnxLIQIT EJwg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ulIp7TgF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t16si9023732plr.63.2019.04.01.10.31.05; Mon, 01 Apr 2019 10:31:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ulIp7TgF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733114AbfDARae (ORCPT + 99 others); Mon, 1 Apr 2019 13:30:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:37616 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728698AbfDARac (ORCPT ); Mon, 1 Apr 2019 13:30:32 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D26922070B; Mon, 1 Apr 2019 17:30:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554139832; bh=YKrF8HsqFixDd71eOLAmxLe+ICN442VSNKKpH2ueAC4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ulIp7TgFWmgpEH2WHexNa3Dnrwaf32a5qzWZY97bnjokyB+CYvqF5kH71HrX9llU3 GHRZNurKb6IP644QM1jVTPlX4mQ6T/boXX7ix+HS5tEWVg51JZ1FNYqQhaKpLoefS/ 7h83qahs55Rig3OAR7nu+smeX357nk4wEs2V2aRM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Baolin Wang , Felipe Balbi , Arnd Bergmann Subject: [PATCH 4.4 027/131] usb: gadget: Add the gserial port checking in gs_start_tx() Date: Mon, 1 Apr 2019 19:01:37 +0200 Message-Id: <20190401170054.338704490@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170051.645954551@linuxfoundation.org> References: <20190401170051.645954551@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Baolin Wang commit 511a36d2f357724312bb3776d2f6eed3890928b2 upstream. When usb gadget is set gadget serial function, it will be crash in below situation. It will clean the 'port->port_usb' pointer in gserial_disconnect() function when usb link is inactive, but it will release lock for disabling the endpoints in this function. Druing the lock release period, it maybe complete one request to issue gs_write_complete()--->gs_start_tx() function, but the 'port->port_usb' pointer had been set NULL, thus it will be crash in gs_start_tx() function. This patch adds the 'port->port_usb' pointer checking in gs_start_tx() function to avoid this situation. Signed-off-by: Baolin Wang Signed-off-by: Felipe Balbi Signed-off-by: Arnd Bergmann Signed-off-by: Greg Kroah-Hartman --- drivers/usb/gadget/function/u_serial.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/drivers/usb/gadget/function/u_serial.c +++ b/drivers/usb/gadget/function/u_serial.c @@ -361,10 +361,15 @@ __acquires(&port->port_lock) */ { struct list_head *pool = &port->write_pool; - struct usb_ep *in = port->port_usb->in; + struct usb_ep *in; int status = 0; bool do_tty_wake = false; + if (!port->port_usb) + return status; + + in = port->port_usb->in; + while (!port->write_busy && !list_empty(pool)) { struct usb_request *req; int len;