lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170721092616.GB11387@mail.corp.redhat.com>
Date:   Fri, 21 Jul 2017 11:26:16 +0200
From:   Benjamin Tissoires <benjamin.tissoires@...hat.com>
To:     Dmitry Torokhov <dmitry.torokhov@...il.com>
Cc:     Jiri Kosina <jikos@...nel.org>, Olof Johansson <olof@...om.net>,
        linux-usb@...r.kernel.org, linux-input@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH] HID: usbhid: fix "always poll" quirk

On Jul 12 2017 or thereabouts, Dmitry Torokhov wrote:
> Even though the IO for devices with "always poll" quirk is already running,
> we still need to set HID_OPENED bit in usbhid->iofl so the interrupt
> handler does not ignore the data coming from the device.
> 
> Reported-by: Olof Johansson <olof@...om.net>
> Tested-by: Olof Johansson <olof@...om.net>
> Fixes: e399396a6b0 ("HID: usbhid: remove custom locking from usbhid_open...")
> Signed-off-by: Dmitry Torokhov <dmitry.torokhov@...il.com>
> ---

slightly reviewed and
Acked-by: Benjamin Tissoires <benjamin.tissoires@...hat.com>

Cheers,
Benjamin

>  drivers/hid/usbhid/hid-core.c | 16 ++++++++++------
>  1 file changed, 10 insertions(+), 6 deletions(-)
> 
> diff --git a/drivers/hid/usbhid/hid-core.c b/drivers/hid/usbhid/hid-core.c
> index 76013eb5cb7f..c008847e0b20 100644
> --- a/drivers/hid/usbhid/hid-core.c
> +++ b/drivers/hid/usbhid/hid-core.c
> @@ -680,18 +680,21 @@ static int usbhid_open(struct hid_device *hid)
>  	struct usbhid_device *usbhid = hid->driver_data;
>  	int res;
>  
> +	set_bit(HID_OPENED, &usbhid->iofl);
> +
>  	if (hid->quirks & HID_QUIRK_ALWAYS_POLL)
>  		return 0;
>  
>  	res = usb_autopm_get_interface(usbhid->intf);
>  	/* the device must be awake to reliably request remote wakeup */
> -	if (res < 0)
> +	if (res < 0) {
> +		clear_bit(HID_OPENED, &usbhid->iofl);
>  		return -EIO;
> +	}
>  
>  	usbhid->intf->needs_remote_wakeup = 1;
>  
>  	set_bit(HID_RESUME_RUNNING, &usbhid->iofl);
> -	set_bit(HID_OPENED, &usbhid->iofl);
>  	set_bit(HID_IN_POLLING, &usbhid->iofl);
>  
>  	res = hid_start_in(hid);
> @@ -727,19 +730,20 @@ static void usbhid_close(struct hid_device *hid)
>  {
>  	struct usbhid_device *usbhid = hid->driver_data;
>  
> -	if (hid->quirks & HID_QUIRK_ALWAYS_POLL)
> -		return;
> -
>  	/*
>  	 * Make sure we don't restart data acquisition due to
>  	 * a resumption we no longer care about by avoiding racing
>  	 * with hid_start_in().
>  	 */
>  	spin_lock_irq(&usbhid->lock);
> -	clear_bit(HID_IN_POLLING, &usbhid->iofl);
>  	clear_bit(HID_OPENED, &usbhid->iofl);
> +	if (!(hid->quirks & HID_QUIRK_ALWAYS_POLL))
> +		clear_bit(HID_IN_POLLING, &usbhid->iofl);
>  	spin_unlock_irq(&usbhid->lock);
>  
> +	if (hid->quirks & HID_QUIRK_ALWAYS_POLL)
> +		return;
> +
>  	hid_cancel_delayed_stuff(usbhid);
>  	usb_kill_urb(usbhid->urbin);
>  	usbhid->intf->needs_remote_wakeup = 0;
> -- 
> 2.13.2.932.g7449e964c-goog
> 
> 
> -- 
> Dmitry

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ