Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp902799ybt; Fri, 19 Jun 2020 17:34:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJykRZvpe9eZ7Ium+ZY7ALzQVkDivU1C875sNLUDH4deqORl8Yr3dZN1B8fiAie/zbrs7WPz X-Received: by 2002:a05:6402:1bde:: with SMTP id ch30mr6048301edb.163.1592613269486; Fri, 19 Jun 2020 17:34:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592613269; cv=none; d=google.com; s=arc-20160816; b=SFWS3+sNah/I56IOBf+JaK6hKMsqWqmdRDOkq99BSQtRFSe7dkw0SK2sv5bfwRy1Iu 6jGMzweSoqSOC6YICTbgYg+q+94S55wPZBL8yIMFk5zFTcM1zY65tnn5fkKHjo+kYTCX HWcpZ6cZZMtlRkAUBjnhcR1cSDDekqqoEKk+zvrh0tGalHgjtAgy/Z6meEf/bs1uIP0J hY4oQjcXiohLeTJPPwG/5QVEL8Kt418yAfsCR24pfJVDE0BA2CvMmYrjac/CZRju+T8K Xxd6C3I7tzFq2PihmNR3vWLv+7ahaTA5sCsEpRWjM/wI8tYn3TGy3LRWkNxOR8qrK10o vsIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kGb7VtDFoElMgSzRm5Ja1FFN8vC308Fq08q6bh/F0ZQ=; b=hrfR6nKWcZ8PX/n6qGMaX/3sMeGABkYWgh1DIoLnUgm9taQEQcehWM296MA0YzPEZ9 dppuMCJ2pWbvEiGI3ewp2JC22ZcnxktuGAS2fDT6ReLkL94cyJwK4O+54NWYRkMEiqXS AJhwfEVcgUtAR2DrxN0l2m6J3JAQQOWWmwuoRQbzFSsmYoNFAUmh3I0ih1jbSrBd9uMl VoO4oa6f6juvwqCCXxi981lO31aK+/2+6b0caGNU5Md4p7hEKm3ewPWWqA8Mgt8cn30j vrB9POTi2FKBNTb9tlbPtblvkc37dL+7vz41Szc2vqyAaLy9HOmp2s3DzHoMahq38XpY a82w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vor9HJnp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ay19si5006303ejb.372.2020.06.19.17.34.02; Fri, 19 Jun 2020 17:34:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vor9HJnp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405144AbgFSPhq (ORCPT + 99 others); Fri, 19 Jun 2020 11:37:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:33532 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404686AbgFSP3y (ORCPT ); Fri, 19 Jun 2020 11:29:54 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4E05020734; Fri, 19 Jun 2020 15:29:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592580592; bh=Bu+NPimlJpWa6hgqy91S1oh2Af6/PWbtnMCu6p7EQos=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vor9HJnpg+Z7kFuQ3MAIYFfPdbCbH65qU58zV/FuVYgKAKKkc+sl4fhqn4xeJZ8eW 7CMwFkthHAwNHf/nS0EsiXJIvRapJK7cw82nbE6fewW0ulqstSrsGGlZSsr0hr+E/6 fyi819Vz3HYY4WH/s2YYNg6wPKRJt37+5NnaVkec= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tomi Valkeinen , Laurent Pinchart , Benoit Parrot , Sakari Ailus , Mauro Carvalho Chehab Subject: [PATCH 5.7 307/376] media: ov5640: fix use of destroyed mutex Date: Fri, 19 Jun 2020 16:33:45 +0200 Message-Id: <20200619141724.868498090@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141710.350494719@linuxfoundation.org> References: <20200619141710.350494719@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tomi Valkeinen commit bfcba38d95a0aed146a958a84a2177af1459eddc upstream. v4l2_ctrl_handler_free() uses hdl->lock, which in ov5640 driver is set to sensor's own sensor->lock. In ov5640_remove(), the driver destroys the sensor->lock first, and then calls v4l2_ctrl_handler_free(), resulting in the use of the destroyed mutex. Fix this by calling moving the mutex_destroy() to the end of the cleanup sequence, as there's no need to destroy the mutex as early as possible. Signed-off-by: Tomi Valkeinen Reviewed-by: Laurent Pinchart Cc: stable@vger.kernel.org # v4.14+ Reviewed-by: Benoit Parrot Signed-off-by: Sakari Ailus Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/i2c/ov5640.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/media/i2c/ov5640.c +++ b/drivers/media/i2c/ov5640.c @@ -3093,8 +3093,8 @@ static int ov5640_probe(struct i2c_clien free_ctrls: v4l2_ctrl_handler_free(&sensor->ctrls.handler); entity_cleanup: - mutex_destroy(&sensor->lock); media_entity_cleanup(&sensor->sd.entity); + mutex_destroy(&sensor->lock); return ret; } @@ -3104,9 +3104,9 @@ static int ov5640_remove(struct i2c_clie struct ov5640_dev *sensor = to_ov5640_dev(sd); v4l2_async_unregister_subdev(&sensor->sd); - mutex_destroy(&sensor->lock); media_entity_cleanup(&sensor->sd.entity); v4l2_ctrl_handler_free(&sensor->ctrls.handler); + mutex_destroy(&sensor->lock); return 0; }