Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp6022215ybc; Wed, 27 Nov 2019 13:33:34 -0800 (PST) X-Google-Smtp-Source: APXvYqxn4K0y0uoefW+7xsdIl3P3ET1JbtEZ0gM2w5JhQHMcGBCVDkoNzjocHp8Gll3o9YAfdTP3 X-Received: by 2002:aa7:c2d3:: with SMTP id m19mr3247161edp.136.1574890414553; Wed, 27 Nov 2019 13:33:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574890414; cv=none; d=google.com; s=arc-20160816; b=sw2NPDVP3oBRWcGRCzDvShCkGu2fsjnvsypzRItR0Q/JkmYq4jjPzjb2M2x/n9Dzpv CI5NP1yC/as9f9LM8gzrg5DSO2escCdFN8gnVp2FkfcnNXeJlPfXLa5U5Fb4MSztja/M CmsZezACPbOCdPJlvbYELmefUDt6hVcj1dV6Y5tRiI9BonY/u1pXQrXnfnlGQpJI5RtK S/m1XIEb/lOkCc8OXmD+1UXnMaWFkIPWwx21Im6VhuDtaxdSrL2lmldHOJZzE0iDMLUC GCTL09k0sNbP0VmDmtLr7yJYLKAfTR8pBFXIxF5vyKAqxn/AibjjO4lHcIWwMmhW+bcG D4BQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bSYijY/9tyvimLXmyiT+3auLAjPkmyjvYOsdzLthP48=; b=Z7k9hXkZknOt40lZ5QcOnTh3YRrIwjq5IwMqHW4xmsaqvwWqS6iTCm3OCDNRPnk31N oqwos9tLA+2MZgkopvuhtEy9oZxUtY1d3pzQCG091FrEzH/M4ZrCJ8290MqD+pa8Gt3v O8WX5N88OTfJj83CwqkW5iCfVnGPqgX1jn0pMHN4Ecgvi8PHJdXQwW34UZjD6IHPLSZA gLiMyJ9X66mqygoQs9t1oclyRkv36xNIRpqPvBtwUObw5hCYE2v7i9ude9FF3Vyum7Od +Xhw04m7lx9IxDhy6ERJU7IM1tMfJjSK+pR5TjJ9dgYlhpfxfr7VRYKY6HmYsAmv9X7w mTsA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xkYrcrnH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o28si12026042edc.353.2019.11.27.13.33.10; Wed, 27 Nov 2019 13:33:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xkYrcrnH; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729583AbfK0UzJ (ORCPT + 99 others); Wed, 27 Nov 2019 15:55:09 -0500 Received: from mail.kernel.org ([198.145.29.99]:45334 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730901AbfK0Uy6 (ORCPT ); Wed, 27 Nov 2019 15:54:58 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 487252086A; Wed, 27 Nov 2019 20:54:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574888097; bh=S8kGG9p6HSMDgtKASDhnwxvtfT614CVOtoxaHvrPciw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xkYrcrnHsfLSxTUStDtQ4kKnHyFr3tYMDTAczJ1cKbGTN/tCgZo0dKVqbY1y5ND5B W/NRjtez5kzrOHp1Z2E9PsIAXJV0laiDhsKY7GEK33IBnmCt4iJJf3GDAW1G/NQOy+ hv0gexPfjXlvkZG+jej5WQCi0bBpz0jI9A9XJk2o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Oliver Neukum , "David S. Miller" , syzbot+711468aa5c3a1eabf863@syzkaller.appspotmail.com Subject: [PATCH 4.14 186/211] nfc: port100: handle command failure cleanly Date: Wed, 27 Nov 2019 21:31:59 +0100 Message-Id: <20191127203111.303012805@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191127203049.431810767@linuxfoundation.org> References: <20191127203049.431810767@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oliver Neukum commit 5f9f0b11f0816b35867f2cf71e54d95f53f03902 upstream. If starting the transfer of a command suceeds but the transfer for the reply fails, it is not enough to initiate killing the transfer for the command may still be running. You need to wait for the killing to finish before you can reuse URB and buffer. Reported-and-tested-by: syzbot+711468aa5c3a1eabf863@syzkaller.appspotmail.com Signed-off-by: Oliver Neukum Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/nfc/port100.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/nfc/port100.c +++ b/drivers/nfc/port100.c @@ -792,7 +792,7 @@ static int port100_send_frame_async(stru rc = port100_submit_urb_for_ack(dev, GFP_KERNEL); if (rc) - usb_unlink_urb(dev->out_urb); + usb_kill_urb(dev->out_urb); exit: mutex_unlock(&dev->out_urb_lock);