Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5620382imu; Mon, 26 Nov 2018 03:06:35 -0800 (PST) X-Google-Smtp-Source: AFSGD/VRYUw9oT/IGIDjkcQPPquY8b3d3dR5jhr08+2QVqpXcqB1KBR3KI58+I1IhQJ8WJ1mn62W X-Received: by 2002:a17:902:8214:: with SMTP id x20-v6mr26091747pln.224.1543230394952; Mon, 26 Nov 2018 03:06:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543230394; cv=none; d=google.com; s=arc-20160816; b=LqEX+ss16DEfbboLJ8ba1/3JvScGXFonNr4j+372AznKhvIu+d+5d8R8yhTLLeYUtP G6z331NvYIr518wYamPce5HdBJFAAHiJEK8DME5Nd00ffcQmf18azxG+dkGjpwUmF5Qn oYR0YBIWTBOY5Qajw/E+ZZllyXJonck7om+/Jrq8o2gjOijVP/LasuCk36zSwrk/o1E8 7cZqcyuqDHRpQwTx3NGiXLq4ZIVfGZSWX8wL1P1UCWPVKfVtkKcFWBqfbt6DMDL+fKXL 5TzmemqiUP/+qX2KP7ybnuGPhpGWq+Iju5nzygUMmUTWYwUvEbk7NGbcz5oBzqHoo/n2 C8GA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=2khCx0+X8u7hutmIWgxFC5P0dm/kZmaRcqWAuSUX7aY=; b=uc4j0QzHzFh+IGzuScFuCEuK/5hUyywfyQUp5KqERIFOQv1Q2WQFAbOi6A4z61hoD0 F9C50SEo6n+MDjbKGNmOvkgpHYXIYhwRycm+B2S3ucWhQNSJQ5CoYxlG0rMURnZCrvqg ifM09M5l8brGjxWZlO90VHjEW2TLgNAh7NywSJmU64YyEtdU3AGNOpaZcxif/982q3E3 QkYYWAGSkyxTjiTzKHO6AQQEboY17/SEQwvDQOhpPxFE9K7BjMB9d5+kr3NWbfYu4P4G ldIYeALU0ICPp8N2f1ejTjhECJr1TMlTx7KnOhk8X2jCxNq87X7fZARQ2797syT3M+TV 4usw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OsrEDMRw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h3si40540069pgl.468.2018.11.26.03.06.21; Mon, 26 Nov 2018 03:06:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OsrEDMRw; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731378AbeKZV7e (ORCPT + 99 others); Mon, 26 Nov 2018 16:59:34 -0500 Received: from mail.kernel.org ([198.145.29.99]:45670 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729543AbeKZV7d (ORCPT ); Mon, 26 Nov 2018 16:59:33 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E2EDA20645; Mon, 26 Nov 2018 11:05:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543230347; bh=02ejY+3BXnQQcbLFwF+mz30rnx+XlqPdJ+dLH0bdpR4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OsrEDMRwnOF8Q5HrXTmjXY87qSTIf7ZWz6fUmHVN2wZs82kQTaIlFG3rzsXLuZPfW h4vtSF2OjxHe3LPHk92MUfxS/j5gQfBS+vasZ38WDKqgwaSOIbbXrv7WywrcwTx84+ JEWxH5RzbsR3CUKCqMQfX2f0ezz2qXxsHSPJCsZI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Jimmy Assarsson , Marc Kleine-Budde Subject: [PATCH 4.19 101/118] can: kvaser_usb: Fix accessing freed memory in kvaser_usb_start_xmit() Date: Mon, 26 Nov 2018 11:51:35 +0100 Message-Id: <20181126105105.755262742@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181126105059.832485122@linuxfoundation.org> References: <20181126105059.832485122@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jimmy Assarsson commit e13fb9b37cc00616b90df2d620f30345b5ada6ff upstream. The call to can_put_echo_skb() may result in the skb being freed. The skb is later used in the call to dev->ops->dev_frame_to_cmd(). This is avoided by moving the call to can_put_echo_skb() after dev->ops->dev_frame_to_cmd(). Reported-by: Dan Carpenter Signed-off-by: Jimmy Assarsson Cc: linux-stable Signed-off-by: Marc Kleine-Budde Signed-off-by: Greg Kroah-Hartman --- drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c +++ b/drivers/net/can/usb/kvaser_usb/kvaser_usb_core.c @@ -528,7 +528,6 @@ static netdev_tx_t kvaser_usb_start_xmit context = &priv->tx_contexts[i]; context->echo_index = i; - can_put_echo_skb(skb, netdev, context->echo_index); ++priv->active_tx_contexts; if (priv->active_tx_contexts >= (int)dev->max_tx_urbs) netif_stop_queue(netdev); @@ -553,7 +552,6 @@ static netdev_tx_t kvaser_usb_start_xmit dev_kfree_skb(skb); spin_lock_irqsave(&priv->tx_contexts_lock, flags); - can_free_echo_skb(netdev, context->echo_index); context->echo_index = dev->max_tx_urbs; --priv->active_tx_contexts; netif_wake_queue(netdev); @@ -564,6 +562,8 @@ static netdev_tx_t kvaser_usb_start_xmit context->priv = priv; + can_put_echo_skb(skb, netdev, context->echo_index); + usb_fill_bulk_urb(urb, dev->udev, usb_sndbulkpipe(dev->udev, dev->bulk_out->bEndpointAddress),