Received: by 2002:a17:90a:88:0:0:0:0 with SMTP id a8csp59758pja; Fri, 22 Nov 2019 03:26:45 -0800 (PST) X-Google-Smtp-Source: APXvYqzLx0dQ4KoA/WGNOGzKCT6DgJlYCTyVVpUlqgXxj7gY0ULFJyTmiZTkdj/GuQYSxzxZURp0 X-Received: by 2002:a05:6402:14d3:: with SMTP id f19mr429303edx.252.1574422005162; Fri, 22 Nov 2019 03:26:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574422005; cv=none; d=google.com; s=arc-20160816; b=rw/NbLjUjbKCePaCLO/yE0w7VxBH5AvJ2GVzhmNtKDXNKIPqOLZi8q8BFq5Ss8O+lY R8C0gYpRyX43nhclviTgAdi8ci0vwmAceocTH7sdzx9/NWKQaCix77rt56HDFWO+B93Q 9WtcqQYnq+2VcnhJKdnGAnqpEqzwk4M/JMDj5DZ0gVzIK6F9beVRXmireiylEeRpJ2br 3SVbbTx0jFA2J6V6XfpzVqqyF78rOfakb1EJ91M2wKUtt5PrBYuMCIUGJxV0BjQXPlwM zCRH74DawLtIqYkmzg+YjBiYwYP4FQmXLp3XWI3uHxmApVoXa9SOGlPda9jm5RPCcvUG 2pEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kHFd7aEHDks7D/PSWUHnJmmhdZTDXtxXgw7VsBfkWn8=; b=byLRyA+wudycQSPXPnfly1V27kAB5ZLr1CHNj//69xj/LYD4nRCsGBYg3jQblT8f88 ynedKwLnyzyGKnITrzF/eeaeUEeUGexhRWsCecvzzKKjtgJ8ed+mwRNQD0kfH5Le8y4V HNO3dVvrTZATdCu7BnmCPhkExwtOekj6p52CzLdZ4EsBrnrrDB1qN8P2/Oag2uxtTIak SN2TurXznTnBMimmSXpkNxIrb1cW1Y1BXfm1Mxb0pMNJuOtG1VhAILckXWo4y9Q2Nsu8 EvHScvC6xIrFsnVtaQH0epbw5ruaa/AH1LhvkfbmHHmXBz+aoveFZdpw2X/vHz5uDPrk vhiA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Db4ORN48; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c5si933540eds.263.2019.11.22.03.26.21; Fri, 22 Nov 2019 03:26:45 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Db4ORN48; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728639AbfKVLWD (ORCPT + 99 others); Fri, 22 Nov 2019 06:22:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:49982 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729313AbfKVKoI (ORCPT ); Fri, 22 Nov 2019 05:44:08 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6213C20715; Fri, 22 Nov 2019 10:44:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574419447; bh=SWnbQ6ESsCx2svhKme4+smyFG/NDFa640/NUKAqdQIE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Db4ORN48y/HTZuLuvlKrNTlIfqGf9zrT4+7RayxMjAnx+/iQ2qgxRWNwK+IrXKvL4 FhhMpRl2fWRAzs+sx0MkgEKqXO3HGSIWP3vFhGOn5vhlkZx5B/ggRP/xF4lCWF4nC8 u24Bw8+SQSxoG2gdRpTZW6uUETMpuw9UZ9rP6Ogw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Joel Pepper , Kieran Bingham , Laurent Pinchart , Sasha Levin Subject: [PATCH 4.9 113/222] usb: gadget: uvc: configfs: Prevent format changes after linking header Date: Fri, 22 Nov 2019 11:27:33 +0100 Message-Id: <20191122100911.383044288@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191122100830.874290814@linuxfoundation.org> References: <20191122100830.874290814@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joel Pepper [ Upstream commit cb2200f7af8341aaf0c6abd7ba37e4c667c41639 ] While checks are in place to avoid attributes and children of a format being manipulated after the format is linked into the streaming header, the linked flag was never actually set, invalidating the protections. Update the flag as appropriate in the header link calls. Signed-off-by: Joel Pepper Reviewed-by: Kieran Bingham Signed-off-by: Laurent Pinchart Signed-off-by: Sasha Levin --- drivers/usb/gadget/function/uvc_configfs.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/drivers/usb/gadget/function/uvc_configfs.c b/drivers/usb/gadget/function/uvc_configfs.c index 3803dda54666b..3d843e14447bb 100644 --- a/drivers/usb/gadget/function/uvc_configfs.c +++ b/drivers/usb/gadget/function/uvc_configfs.c @@ -772,6 +772,7 @@ static int uvcg_streaming_header_allow_link(struct config_item *src, format_ptr->fmt = target_fmt; list_add_tail(&format_ptr->entry, &src_hdr->formats); ++src_hdr->num_fmt; + ++target_fmt->linked; out: mutex_unlock(&opts->lock); @@ -810,6 +811,8 @@ static int uvcg_streaming_header_drop_link(struct config_item *src, break; } + --target_fmt->linked; + out: mutex_unlock(&opts->lock); mutex_unlock(su_mutex); -- 2.20.1