Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp6030917ybc; Wed, 27 Nov 2019 13:44:00 -0800 (PST) X-Google-Smtp-Source: APXvYqyXISWHAzFKD8CG0M0T8wK0KRn28tm9APFC5bTNuZKhRBWjYC1l2bz8aH/780HBtC6YSpBT X-Received: by 2002:a50:de47:: with SMTP id a7mr34391423edl.77.1574891039928; Wed, 27 Nov 2019 13:43:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574891039; cv=none; d=google.com; s=arc-20160816; b=MOlddpIqmh81OTtno7I7s99zpNwHtYEXaRD3ZnLb4USIyX0RAnJIZxS5zBdEi3wqD7 rsY5xO/QddtY8ksQcWMzLhBJOtJpO1v/eZ1+qBX+VlSYOW3SpJL40daHpBhvinYA9Elv luC9FAM0g71VExUzXx92fIWqItV5dfM4m8i1ap+WHwb6TMmnhuv5NJZ2/DByI1+we3Dy s8GD2aq+enSde5cDmTpZtIJ2cir7rrkQJBtYdJ+WmnWFhmbG+rDlw0X/++gALUhvutRG Vr88AB5AKxzTXujw+m0LbpNcjRLU6QNKdPrvw0rz0FZg6nEA0z+GIDmjcK8jvC5U2rVg ozFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=j+yKbgW5GYYv5BOJ/1l8QCOwLlFJO5yhz75s/uxYchc=; b=Ky8gFk7/FtHon0hqh9I1Oen5QuzW2IgpQrydBaqeHRtA9DS5QJpzXqP29wZPGBUiRu I64v9kZo9uLVFXjjXFTILBjouSqF0xAYUcZvOyUBP29ERfv2rmo7oM9Zd/wbXWyug0F+ kynoPbA93t1T0HjVUsaBzdYwqhAbZvnj5wIlvyilsAqW+pilKgKIQN/nJkV4fZx7l7b7 bo+US9+bQiFbNhfvzosOPITgbpx9MZqhqLXF/6fnSxXSEpGZ7BKTzjV0/ZPRB2MbEvxV BLJtE2GxxGMOe0K0NhyX390aIaMFHFdXumut7hOyhKN0TsJWGWTaUaVzm6PR0nUw7w2r x+Sg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=k7H71Llk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v20si10745297ejq.189.2019.11.27.13.43.36; Wed, 27 Nov 2019 13:43:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=k7H71Llk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729786AbfK0VjU (ORCPT + 99 others); Wed, 27 Nov 2019 16:39:20 -0500 Received: from mail.kernel.org ([198.145.29.99]:53704 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729580AbfK0UoY (ORCPT ); Wed, 27 Nov 2019 15:44:24 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 18C1B217F9; Wed, 27 Nov 2019 20:44:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574887463; bh=4lw864Ct5JLJps2WHuqaE8tkLWAdm3FEF5yk1oCmcRY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=k7H71LlkOjnRwqhMbmBNvib/oGUbiol6YfkkvZtXqKq/cIGLGvshlLiTt/wcLGlMv a5ADEXRdsvrZDygj7IyxqhY11CXMMRzCxLgUwNxpqG5PoKoNcHY9A5Ao+9XHjnLT1l 0Ck2yZf4L8jMAST3pnBnSqEPC/XAKU/7cytlHyu8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Oliver Neukum , "David S. Miller" , syzbot+711468aa5c3a1eabf863@syzkaller.appspotmail.com Subject: [PATCH 4.9 122/151] nfc: port100: handle command failure cleanly Date: Wed, 27 Nov 2019 21:31:45 +0100 Message-Id: <20191127203045.103624570@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191127203000.773542911@linuxfoundation.org> References: <20191127203000.773542911@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oliver Neukum commit 5f9f0b11f0816b35867f2cf71e54d95f53f03902 upstream. If starting the transfer of a command suceeds but the transfer for the reply fails, it is not enough to initiate killing the transfer for the command may still be running. You need to wait for the killing to finish before you can reuse URB and buffer. Reported-and-tested-by: syzbot+711468aa5c3a1eabf863@syzkaller.appspotmail.com Signed-off-by: Oliver Neukum Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/nfc/port100.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/nfc/port100.c +++ b/drivers/nfc/port100.c @@ -791,7 +791,7 @@ static int port100_send_frame_async(stru rc = port100_submit_urb_for_ack(dev, GFP_KERNEL); if (rc) - usb_unlink_urb(dev->out_urb); + usb_kill_urb(dev->out_urb); exit: mutex_unlock(&dev->out_urb_lock);