Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3003487ybi; Mon, 17 Jun 2019 14:28:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqzEy66J17NfyAM8kHBq7gxYCMwCfYME04ms4N+0+F9EMeSTdNIMHgkmM2b7eW19k1GUT9Ts X-Received: by 2002:a17:90a:aa8e:: with SMTP id l14mr1188422pjq.86.1560806889741; Mon, 17 Jun 2019 14:28:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560806889; cv=none; d=google.com; s=arc-20160816; b=fGiloeZdafZT+8Tp9Qwh7CrfCBbec48dhCHpEIs8cICyH/C1QzPGzW3aAtOIJfWIKC onMups7n+4wvt2aVf37WKfLz60tioYMqeow0JwhuBC6bxcfNSNAq09mC06GDgdlYPoXZ GeT3LpwAOj6ps5/ua6j+5cBNE89j13ei3lHQK1dNyEz0iCEKlckEx6ZEaramm0fDWcol 4tzEIxggIXIZFYpTyNLkh7lAziNKmKr4Gq3CbUouRTBGu17BT7FJTD/Umm4x9PmHVHcn mJW+bfLLB1K3jSwQjktlspFsZj03zIs6EUlL+W0MlPIrg0aH6oHSOSSPVlchG9F7cGWx qcnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9DZpsxl4v/Fp/ZhWzGyZLZPWPYnM/sIpTT0r0bWLbbw=; b=WJxwEkKDCQcKRtr9EkPrtI2UuNtRgQGBCoevHdAJF4z4hsr3MXlp6uLanTTtqXjMmd n6kuVIbXYSEinfJdsq7NOn1HJVb8MKqdb3oqdgPKHbV1jnbMH8PniXv01RCLxpCW6sWE 8BUBvoXrhCS9jbgfkSbHp75WpEwJsd2YZIX9yTqTLyjgX9mWFnEj4nYrXblkZsiOE3KI +DUJDXXWawyEZq+szrt1PSRMA3vGJ5WsbGNl9x1P/BT3M1ioVEFJJ2g8ixjKthf+x2df PadKkugtd4/boq6IlWJqNYWf0sJScKLVPR3IH33XW0ew/PhLlRkAp6WhPO5EIVcV3tD8 9XYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Zsm3VYqm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v32si11167748plg.3.2019.06.17.14.27.54; Mon, 17 Jun 2019 14:28:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Zsm3VYqm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730045AbfFQV1T (ORCPT + 99 others); Mon, 17 Jun 2019 17:27:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:54198 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730374AbfFQV1R (ORCPT ); Mon, 17 Jun 2019 17:27:17 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0AE852063F; Mon, 17 Jun 2019 21:27:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560806836; bh=KJ+YJKyC3zl5fWNmO53Na+GxPfZc8sgKoRsOHBTjoss=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Zsm3VYqmqPfkdNKcjKzZfaB6YUjI6oKJtEGS5joReZBcyVHSJwcwM9Gh7ee8IdX5S wTbIMYZjvBeEBdp1lzja7fLO++M9NNghBP4YcebaSzzBhv4NByfl7jbYsBJOeCOibP 3wQ5LIyc2OujKEFirieu911QaiBN2mhrNN3uN9Ks= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+47ded6c0f23016cde310@syzkaller.appspotmail.com, Takashi Iwai , Sasha Levin Subject: [PATCH 4.19 30/75] Revert "ALSA: seq: Protect in-kernel ioctl calls with mutex" Date: Mon, 17 Jun 2019 23:09:41 +0200 Message-Id: <20190617210753.982269979@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190617210752.799453599@linuxfoundation.org> References: <20190617210752.799453599@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit f0654ba94e33699b295ce4f3dc73094db6209035 ] This reverts commit feb689025fbb6f0aa6297d3ddf97de945ea4ad32. The fix attempt was incorrect, leading to the mutex deadlock through the close of OSS sequencer client. The proper fix needs more consideration, so let's revert it now. Fixes: feb689025fbb ("ALSA: seq: Protect in-kernel ioctl calls with mutex") Reported-by: syzbot+47ded6c0f23016cde310@syzkaller.appspotmail.com Signed-off-by: Takashi Iwai Signed-off-by: Sasha Levin --- sound/core/seq/seq_clientmgr.c | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/sound/core/seq/seq_clientmgr.c b/sound/core/seq/seq_clientmgr.c index 37312a3ae60f..f59e13c1d84a 100644 --- a/sound/core/seq/seq_clientmgr.c +++ b/sound/core/seq/seq_clientmgr.c @@ -2337,19 +2337,14 @@ int snd_seq_kernel_client_ctl(int clientid, unsigned int cmd, void *arg) { const struct ioctl_handler *handler; struct snd_seq_client *client; - int err; client = clientptr(clientid); if (client == NULL) return -ENXIO; for (handler = ioctl_handlers; handler->cmd > 0; ++handler) { - if (handler->cmd == cmd) { - mutex_lock(&client->ioctl_mutex); - err = handler->func(client, arg); - mutex_unlock(&client->ioctl_mutex); - return err; - } + if (handler->cmd == cmd) + return handler->func(client, arg); } pr_debug("ALSA: seq unknown ioctl() 0x%x (type='%c', number=0x%02x)\n", -- 2.20.1