Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp1393862ybp; Thu, 17 Oct 2019 12:07:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqwpZ83/03T3QGxCOhvIqjqoze3ZNcF4eTkCKlfsutFDZZDErysI4LP+4IH9MQO+vIj81XK5 X-Received: by 2002:a05:6402:13cc:: with SMTP id a12mr5507477edx.162.1571339272387; Thu, 17 Oct 2019 12:07:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571339272; cv=none; d=google.com; s=arc-20160816; b=b6WXF17f7KC2KFli0snqb7h87sl7x1ti1ZFXeYPrd2X/koRL8tQeh+NqzRT9FLX+Xl GuF+Efu1EwL5rNHbtHgsQyfIyrjqGZlp9HVIq9FC6GdWT7IBw10+VedX5nS/wPtDF174 jxJuZ9oS5hK3GJEYZUBFhOBXC4Qm01v5fY4YI73Pt3dUO63xCYIlpgv/W3W9lP791NNI E6nezAwaeWFO+0CAamP16tDWU2stw4AhxgK3mJKnomV/lroiUN7vlrB2/eOCF/8s8WA+ EiJTgfrQaJ7c4vECp+//k7F9S3O++X58fCDokg2jGbwzJKhfK9/cfr63XQAToHzaG1Hf mEww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=GaQJDMQUDeIrmpcB1O1klXd7mlc/C+wogPknVWF5kJk=; b=cTdNTTkYLgb3cwDxJNDbBrbpes9txfLDIfddb7krcldfh21AD46o6F7oPutZDO2xm5 0kD5R4HWvb8YlatXdm8vi1n9y3Gn3+Sv2Trm9T5cPWPuW8i+2IM6a9jEVWt08T9KJln/ 1g0E8OhqlmCDgFTsZEXQJOxBOWvzggGQPw5mfF6zclTrKrcUazM7xps7PwXNMgtzrRxC gcp79lpJflqmLyTTU26ztTq/Z5NN3jsnNGyrskzxX6uGkUeyeO+wgNZrbSmwCI2qZEBO 9ZxaDz6NxVC/vpvfhYbOcQEMEPRIUKwBO7tG2ZsU887dKcvVJ1SsZIZgO9vsK/w2oiot rxlg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YrRltczs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u16si1827631ejx.179.2019.10.17.12.07.29; Thu, 17 Oct 2019 12:07:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YrRltczs; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2407342AbfJPWMf (ORCPT + 99 others); Wed, 16 Oct 2019 18:12:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:47732 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2406609AbfJPV4Q (ORCPT ); Wed, 16 Oct 2019 17:56:16 -0400 Received: from localhost (unknown [192.55.54.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DF56020872; Wed, 16 Oct 2019 21:56:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571262976; bh=y6a9mo5QzwhJY0NnURx/fNH5O+FwHsdatWhcreRE3z8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YrRltczsQj62I/KujQaPlNYq+KYEnHn1x2oQ8OIgxikrYUOTW8SIJs7MFZtH5sA2K CrOeeP30o9p1+FIY02Qb5uC9MAwDddIzuGbRRYmpNYby67M1t5nOu/yoxW+dh8oC2o M+M6MmXq/QRPZFU0ptFTkfDx8hFmTy4Uic1qdOMw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold Subject: [PATCH 4.14 37/65] USB: legousbtower: fix open after failed reset request Date: Wed, 16 Oct 2019 14:50:51 -0700 Message-Id: <20191016214828.512980269@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191016214756.457746573@linuxfoundation.org> References: <20191016214756.457746573@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 0b074f6986751361ff442bc1127c1648567aa8d6 upstream. The driver would return with a nonzero open count in case the reset control request failed. This would prevent any further attempts to open the char dev until the device was disconnected. Fix this by incrementing the open count only on successful open. Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Signed-off-by: Johan Hovold Cc: stable Link: https://lore.kernel.org/r/20190919083039.30898-5-johan@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/misc/legousbtower.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/usb/misc/legousbtower.c +++ b/drivers/usb/misc/legousbtower.c @@ -352,7 +352,6 @@ static int tower_open (struct inode *ino retval = -EBUSY; goto unlock_exit; } - dev->open_count = 1; /* reset the tower */ result = usb_control_msg (dev->udev, @@ -392,13 +391,14 @@ static int tower_open (struct inode *ino dev_err(&dev->udev->dev, "Couldn't submit interrupt_in_urb %d\n", retval); dev->interrupt_in_running = 0; - dev->open_count = 0; goto unlock_exit; } /* save device in the file's private structure */ file->private_data = dev; + dev->open_count = 1; + unlock_exit: mutex_unlock(&dev->lock);