From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1870FFA3728 for ; Wed, 16 Oct 2019 22:06:03 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id D8C6D20650 for ; Wed, 16 Oct 2019 22:06:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571263563; bh=lj5SyutIuB+v6o6QuSFGb7RdNjIqMBjSC10nXV1Da08=; h=From:To:Cc:Subject:Date:In-Reply-To:References:List-ID:From; b=vzdRPAdJIodx1hnmSJP7mtMQN9gO+jz0JXlj3joaGaV2Vq3pwwU3GWLSmy4bdE7Hq /B6nBHQJKksYfhPf+vqyQIx7Jgy0KSrewVbXqg+rjdKF11T9IdGQKvYiqN0YAKx8iD sprFpXm9Pt7Mz2JyOSo0r//20W6ES502zbqFW8LQ= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392158AbfJPWGA (ORCPT ); Wed, 16 Oct 2019 18:06:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:52298 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2438219AbfJPV6j (ORCPT ); Wed, 16 Oct 2019 17:58:39 -0400 Received: from localhost (unknown [192.55.54.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A594921925; Wed, 16 Oct 2019 21:58:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571263118; bh=lj5SyutIuB+v6o6QuSFGb7RdNjIqMBjSC10nXV1Da08=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UX5lW26c/R3+m/vFW6bPNO566/DcisPbliqdQIpLLgQJtvayzKZ8TNq424HEVIXZa XDmdv3QwNnmkISKnWLDmUm4p3okTJrIJW3GRzXz+VISOhr86B/ZzSizbD+xTDy0sW1 j9Al4gczjcqcrBge7v4tpa1P/Ych8iFEBMDfdGQo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold Subject: [PATCH 5.3 042/112] USB: legousbtower: fix open after failed reset request Date: Wed, 16 Oct 2019 14:50:34 -0700 Message-Id: <20191016214854.594079330@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191016214844.038848564@linuxfoundation.org> References: <20191016214844.038848564@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 0b074f6986751361ff442bc1127c1648567aa8d6 upstream. The driver would return with a nonzero open count in case the reset control request failed. This would prevent any further attempts to open the char dev until the device was disconnected. Fix this by incrementing the open count only on successful open. Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Signed-off-by: Johan Hovold Cc: stable Link: https://lore.kernel.org/r/20190919083039.30898-5-johan@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/misc/legousbtower.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/usb/misc/legousbtower.c +++ b/drivers/usb/misc/legousbtower.c @@ -348,7 +348,6 @@ static int tower_open (struct inode *ino retval = -EBUSY; goto unlock_exit; } - dev->open_count = 1; /* reset the tower */ result = usb_control_msg (dev->udev, @@ -388,13 +387,14 @@ static int tower_open (struct inode *ino dev_err(&dev->udev->dev, "Couldn't submit interrupt_in_urb %d\n", retval); dev->interrupt_in_running = 0; - dev->open_count = 0; goto unlock_exit; } /* save device in the file's private structure */ file->private_data = dev; + dev->open_count = 1; + unlock_exit: mutex_unlock(&dev->lock);