Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp106309ybl; Thu, 22 Aug 2019 20:51:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqwEGsvb3BNvIvhoCjCM09M7nb1hb2nbSNmS7QL/4ruwYufrriPHashNi8Kmrxb7sFjcEcB/ X-Received: by 2002:a17:902:9a41:: with SMTP id x1mr2431504plv.88.1566532275220; Thu, 22 Aug 2019 20:51:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566532275; cv=none; d=google.com; s=arc-20160816; b=I63dYCkYS0wNHWS5lzSG6IwhQO6j8UAB8UL/bKV+DTW0lHgOa9hi0nT+bwjErNLASC +vioyrcmxkR/s1OJvHQ/InSL5q/E2B2dOUUYL9Z3WN5hFkypRUl6DsAv3yUlYApYQCrZ hDT+1x1QqWV3S/9/41wNygJSLVjIUi/TXRm02E6KOVCW2G9yzaXD4JfSj+jEcXXlpTES PANt0jF6eBRKZnJk0s1UoJRUP3J+Dew7TGzDWVOvWNH3CWA+l7cBoSfuXeLNDqrDtm34 SS4LshTzz77Uoh8shFBwBnK5npw9/gpBKSWQIHddMXs/rIJ8qaDlVHyi1O4mVHhtWa+m yk1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=GypFGuTqgq0SEevehNsaKANhNyuphj5cg2QTnjJ79VE=; b=ifCZLCeq+mev5/t5NDM/rWa5OzkWDNz0bxgEjLaM/c0QNNCgKfBfJghs2Trp/B1GVy IjCUX7qT8Mn2vA+q3Xvzhqie1eXKzi21AqGuheXJdpU3k9M1NLWhTWTt2KAGLxaiRkJA LvDlIqHj3M8hZMKPuAYdcfzTy7th6fHRPP0QP6EMAfG1MTvnaD+65flLa058OjDRwxsO jVkQAPKaMVoy5ao1/sRRpmoLy4zM345h6zpNCoEJiZVzV/zb1ZDQt4Q358b1NmbC7pp4 Bi29orjEZFBAKIvmW2LFv69FWpFnwv/ko90YmbvaBcSgSkWQHU29JjVdA4ycsc2KiPdv yMJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=h8qwaF1p; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id gn5si1260913plb.170.2019.08.22.20.50.59; Thu, 22 Aug 2019 20:51:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=h8qwaF1p; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392969AbfHVRiB (ORCPT + 99 others); Thu, 22 Aug 2019 13:38:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:46198 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404235AbfHVRYd (ORCPT ); Thu, 22 Aug 2019 13:24:33 -0400 Received: from localhost (wsip-184-188-36-2.sd.sd.cox.net [184.188.36.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F067423407; Thu, 22 Aug 2019 17:24:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566494673; bh=RwIlGsY5UpAFUdjUsjZdVdMjzCqIzdQG2xcWQDnjdI8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=h8qwaF1pshMoaQqUumy8ucItXoQvSw3oq8y+a3a/ZCd9obHenBjpO/IoP0gtQ+4Aq pILcsgiDhD8JMft7Rym6VAWvx/zs0KdcvueMAaepUsJUN+2CiPqZAEZZwXnKwcurmV BeQ/g4uHNYPFtyekMJes65qr5PE+zDQxhy7u1ZLc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot , Andrey Konovalov , Hillf Danton , Jiri Kosina Subject: [PATCH 4.14 16/71] HID: hiddev: do cleanup in failure of opening a device Date: Thu, 22 Aug 2019 10:18:51 -0700 Message-Id: <20190822171728.038996613@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190822171726.131957995@linuxfoundation.org> References: <20190822171726.131957995@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hillf Danton commit 6d4472d7bec39917b54e4e80245784ea5d60ce49 upstream. Undo what we did for opening before releasing the memory slice. Reported-by: syzbot Cc: Andrey Konovalov Signed-off-by: Hillf Danton Signed-off-by: Jiri Kosina Signed-off-by: Greg Kroah-Hartman --- drivers/hid/usbhid/hiddev.c | 4 ++++ 1 file changed, 4 insertions(+) --- a/drivers/hid/usbhid/hiddev.c +++ b/drivers/hid/usbhid/hiddev.c @@ -321,6 +321,10 @@ bail_normal_power: hid_hw_power(hid, PM_HINT_NORMAL); bail_unlock: mutex_unlock(&hiddev->existancelock); + + spin_lock_irq(&list->hiddev->list_lock); + list_del(&list->node); + spin_unlock_irq(&list->hiddev->list_lock); bail: file->private_data = NULL; vfree(list);