From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8519E3E1201; Mon, 4 May 2026 14:28:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777904899; cv=none; b=EoSUgauQ7V2purNTVCYbGhwCp+QoVA1x7bDl2zkR7NHGNBJuynNKc0yYvfU6gy/jWUhqnMP95+bvhyuDYgeOwoAGijdtTAajduQ0aV0XM9qbIsyEH0YcvAoIrbKxM7uyo01qCh3hqas6LozeBpceIM2DZfvP/fJtolR3QzGxJQ0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777904899; c=relaxed/simple; bh=j0ZFlWf1wCSJCgH1RK/KXeivbko6k5iIOqv/XMyObxM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=mJc+IGZihc2d2JbHxp7lxgfwavZus/sjpKOg1a90HjE15zKaAYSV9ukxK7vPIIBp+IUDat8OUDdrcg923+cP0e2JMN+MGYFuPJuc2+Pa9DxXYhiIoGNIEguXw0iFHjwsUUxtv3aRRzRpemoF/iaitY/LAi4eirNLboDcWEO7XEw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=uwKldQWe; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="uwKldQWe" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 147BCC2BCB8; Mon, 4 May 2026 14:28:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1777904899; bh=j0ZFlWf1wCSJCgH1RK/KXeivbko6k5iIOqv/XMyObxM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uwKldQWeCtSCJTip1ja3s1m9q4g+3OGLc44mTzNvWORDi8T8493Dr2riFhCYmYcdB GPoh5pmFSEe2YiOOMzi50evJH4ZYOcohJNkqs0Bo8OnSYXiQU1Q2vPXHW/4Q5nc4tm P3pclRSqjKwz1CalOCQYhYmI6N87bPuAyU5PQZAo= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Takashi Iwai Subject: [PATCH 6.12 208/215] ALSA: caiaq: Fix potentially leftover ep1_in_urb at error path Date: Mon, 4 May 2026 15:53:47 +0200 Message-ID: <20260504135138.417276262@linuxfoundation.org> X-Mailer: git-send-email 2.54.0 In-Reply-To: <20260504135130.169210693@linuxfoundation.org> References: <20260504135130.169210693@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.12-stable review patch. If anyone has any objections, please let me know. ------------------ From: Takashi Iwai commit 0a7b5221b5b51cc798fcfc3be00d02eade149d69 upstream. The previous fix for handling the error from setup_card() missed that an internal URB cdev->ep1_in_urb might have been already submitted beforehand. In the normal case, this URB gets killed at the disconnection, but in the error path, we didn't do it, hence there can be a potential leak. Fix it in the error path for setup_card(), too. Fixes: 28abd224db4a ("ALSA: caiaq: Handle probe errors properly") Cc: Link: https://patch.msgid.link/20260427123819.890185-1-tiwai@suse.de Signed-off-by: Takashi Iwai Signed-off-by: Greg Kroah-Hartman --- sound/usb/caiaq/device.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/sound/usb/caiaq/device.c +++ b/sound/usb/caiaq/device.c @@ -514,7 +514,7 @@ static int init_card(struct snd_usb_caia card->private_free = card_free; err = setup_card(cdev); if (err < 0) - return err; + goto err_kill_urb; return 0;