Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp258763ybl; Fri, 23 Aug 2019 00:01:56 -0700 (PDT) X-Google-Smtp-Source: APXvYqwqrRFP0vcLMRQBwBllF1DCQKRINOiK5CONjk3JelSdD1oaOEs7SicKIDZ62DeuBVVoD7vc X-Received: by 2002:a17:90a:fe0c:: with SMTP id ck12mr3753112pjb.74.1566543716686; Fri, 23 Aug 2019 00:01:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566543716; cv=none; d=google.com; s=arc-20160816; b=sIwAkEOt6/gjhW3rD6+vCr6In0C4TJicF4SFQLxYJl6FqYGXJhc7KzKQliekV62sDw j8FlUg6saDoPFnnbtE1SdRvjGvgMJMQi2jTxORtwYOwpkOzljwxXDJJi3FeB1CZmkl5b lOAETF2Pxp8+EdKw5zCC4iYYbOgOoXJ/F2IClIR03TXwtCPfsudqSUpUiPqUyb/sd523 m9eHmNaHxVoK/8bUl/m3E+jyLDif8qWUzVpIcnH51DjT+juSqVUVoNYpz/ALQDzO1B7B tdi146L5TeIkY3z+KHRf2v0A+6T75tFJAZsFQY7sjA547S1DP+QYrzFdwgDeBbSn7WHp 9Nag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5JDpYTcWFnwPyCmdXgJgD2ms6IGv6GzzIpyKtb3Du44=; b=yRhFYsSPrLkSazjr9VJ4/txb8sOFgD/arKF/NjMdFo4ToVhy1pnrP+890Z/ICkblVD 5heON2HQdgON6bwBCDdFEOFM8Si8nIhJOktEOu733RSCzbTsmL1E/QCOnEhMp/HMEOlC 9VEKVVdmon/QMykjou5U3Jy86l1qvlVnDeVkIufLmRgn9A2myJbSknICpUXEoHzko7ru g3U5J8WXLuoWi+tnfmcf9sjTO+MZZhD7afflMTv0WHLkIID4Bw4vjHFYf2BDKv9h8HvR fZCYyRJ66UHFbUB7KSijMMsB//szSXBtHLkCGaKL1WaacMICaGGB0HIyNzo7tGOa62Xs LmXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xOtcFiSP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s38si1243058pgl.138.2019.08.23.00.01.40; Fri, 23 Aug 2019 00:01:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xOtcFiSP; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392890AbfHVRpA (ORCPT + 99 others); Thu, 22 Aug 2019 13:45:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:42482 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2403863AbfHVRXM (ORCPT ); Thu, 22 Aug 2019 13:23:12 -0400 Received: from localhost (wsip-184-188-36-2.sd.sd.cox.net [184.188.36.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8472B23405; Thu, 22 Aug 2019 17:23:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566494591; bh=g7i6WLTZ5rxEErYhZhpqbhfqKOn6PGX5ztul/t3P0PU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xOtcFiSPu6AIJhZZsRqlB+zoH4AI9tbiGk3RDkgin678qO5LxfOPMvJPn/BNVtuu1 dvGmzxq8UoBomUtXXxbZRx8DZDNm9wYCQfiQl8837kVv8sEqEGsEpnJq1IjMFCWXWG VNRrK3XfV9xh0NEsRIsbsYvlGZCxTFJ5uNBG+w1s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stephane Grosjean , Marc Kleine-Budde Subject: [PATCH 4.9 011/103] can: peak_usb: fix potential double kfree_skb() Date: Thu, 22 Aug 2019 10:17:59 -0700 Message-Id: <20190822171729.313350455@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190822171728.445189830@linuxfoundation.org> References: <20190822171728.445189830@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Stephane Grosjean commit fee6a8923ae0d318a7f7950c6c6c28a96cea099b upstream. When closing the CAN device while tx skbs are inflight, echo skb could be released twice. By calling close_candev() before unlinking all pending tx urbs, then the internal echo_skb[] array is fully and correctly cleared before the USB write callback and, therefore, can_get_echo_skb() are called, for each aborted URB. Fixes: bb4785551f64 ("can: usb: PEAK-System Technik USB adapters driver core") Signed-off-by: Stephane Grosjean Cc: linux-stable Signed-off-by: Marc Kleine-Budde Signed-off-by: Greg Kroah-Hartman --- drivers/net/can/usb/peak_usb/pcan_usb_core.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) --- a/drivers/net/can/usb/peak_usb/pcan_usb_core.c +++ b/drivers/net/can/usb/peak_usb/pcan_usb_core.c @@ -592,16 +592,16 @@ static int peak_usb_ndo_stop(struct net_ dev->state &= ~PCAN_USB_STATE_STARTED; netif_stop_queue(netdev); + close_candev(netdev); + + dev->can.state = CAN_STATE_STOPPED; + /* unlink all pending urbs and free used memory */ peak_usb_unlink_all_urbs(dev); if (dev->adapter->dev_stop) dev->adapter->dev_stop(dev); - close_candev(netdev); - - dev->can.state = CAN_STATE_STOPPED; - /* can set bus off now */ if (dev->adapter->dev_set_bus) { int err = dev->adapter->dev_set_bus(dev, 0);