Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp876023pxb; Wed, 1 Sep 2021 11:52:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxe3b6kOCkdbfFwBn5O9vIsBjbENI21D8/IBwhbL7hEoV4GX4K2TKcYH8NZQH5Ee0a3gClr X-Received: by 2002:a05:6402:3c8:: with SMTP id t8mr1136265edw.150.1630522375055; Wed, 01 Sep 2021 11:52:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630522375; cv=none; d=google.com; s=arc-20160816; b=WsRtowPW5yHuwVtPYsygAUpFlUEQX8iVwGpW1jtsQyNXEvCI3UpzM78WM8B2Is/54k 2pCTUQI1bayhTL9xcBoJbzdOpol4YEW1W46XkKW/ID3a6vFZoHH8W1rmeurc83QNucDV ae7S5GCA42qJE/CMWDufFE05VZtpSc5boEwSjFcH1MgCAejR1wEuYjbigTnDf/cFMofs hiyNnHI4m2NDE2TzsUbfWc6lZvd76cW0aTr9rb5/SyuYM1XGDzwp6IGP5/LnAXDGLqzM xnCwIdmxPtPzHQk+0unFNGi+EhyJ97gDxNJEsYanxETdJ61wQzhz/UIYi1JViuN/xIjD ixFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=QX/s0SIGLSDlPVTKVONhyrUX9g4S+GENgULL7n7sOcI=; b=CqWa3x+WhUKW9HPCz/qvLF0wRtCulrHH/5mvX2/HyfxzcjO7fyT3aODH5CkDcPnTMQ S0BbV27vfoRyBcORK7xEcEz6dSu0/34LT8zL/g8gl8ggDgmWlxMqDM9x1Tsr6/73YPLp 16TM0+XDa1VjmiiVDmjxSy1R1I8E1qaQ6EM/esyLA5Rpe8YEyk4sKILkqYYluuLCxwsW sggxN6eX4TBK3dhjvZcAVPtvQzHACmqnEpk/gAom2lcpnEVdeQ58QKmEySOQNJZ2lg2/ DA8kgWgz9s5BCUuMoBC0w/wZ+qOTx4Khs6Lhx/znulWhpnEyQLrr6jrSvWofQYOXyiZy 2OOw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0K5aA6lp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o21si323700edr.421.2021.09.01.11.52.32; Wed, 01 Sep 2021 11:52:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0K5aA6lp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244867AbhIAMbe (ORCPT + 99 others); Wed, 1 Sep 2021 08:31:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:33016 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244759AbhIAMa4 (ORCPT ); Wed, 1 Sep 2021 08:30:56 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9095D610C7; Wed, 1 Sep 2021 12:29:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1630499400; bh=LNw1LN2KmhdUknF9aVBkHRYrex1DUDnnDZvCD9OTWqo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0K5aA6lp//rsTXV1IF5G63nT0FvpBVru63P/OIu7ik364gn4vYJkzrhyzz79bSxPK NYh6Qhdan1rJ1OSkbQMM5NAGpQRq2so4D2VIkOBF5ceO07sLa3/LB4pFjJoalFdr5E dUMungLQ8J9Lg6GhWOz0VJ5HKc0wd5jLtx+ifdxI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thinh Nguyen , Jerome Brunet , Sasha Levin Subject: [PATCH 4.19 19/33] usb: gadget: u_audio: fix race condition on endpoint stop Date: Wed, 1 Sep 2021 14:28:08 +0200 Message-Id: <20210901122251.421638380@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210901122250.752620302@linuxfoundation.org> References: <20210901122250.752620302@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jerome Brunet [ Upstream commit 068fdad20454f815e61e6f6eb9f051a8b3120e88 ] If the endpoint completion callback is call right after the ep_enabled flag is cleared and before usb_ep_dequeue() is call, we could do a double free on the request and the associated buffer. Fix this by clearing ep_enabled after all the endpoint requests have been dequeued. Fixes: 7de8681be2cd ("usb: gadget: u_audio: Free requests only after callback") Cc: stable Reported-by: Thinh Nguyen Signed-off-by: Jerome Brunet Link: https://lore.kernel.org/r/20210827092927.366482-1-jbrunet@baylibre.com Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/usb/gadget/function/u_audio.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/drivers/usb/gadget/function/u_audio.c b/drivers/usb/gadget/function/u_audio.c index 0cb0c638fd13..168303f21bf4 100644 --- a/drivers/usb/gadget/function/u_audio.c +++ b/drivers/usb/gadget/function/u_audio.c @@ -349,8 +349,6 @@ static inline void free_ep(struct uac_rtd_params *prm, struct usb_ep *ep) if (!prm->ep_enabled) return; - prm->ep_enabled = false; - audio_dev = uac->audio_dev; params = &audio_dev->params; @@ -368,11 +366,12 @@ static inline void free_ep(struct uac_rtd_params *prm, struct usb_ep *ep) } } + prm->ep_enabled = false; + if (usb_ep_disable(ep)) dev_err(uac->card->dev, "%s:%d Error!\n", __func__, __LINE__); } - int u_audio_start_capture(struct g_audio *audio_dev) { struct snd_uac_chip *uac = audio_dev->uac; -- 2.30.2