Received: by 2002:a17:90a:1609:0:0:0:0 with SMTP id n9csp855998pja; Wed, 1 Apr 2020 09:55:19 -0700 (PDT) X-Google-Smtp-Source: ADFU+vsOCWeuQfi/Q4vLHMWQkMysp/j/hbCYqi7CTTrBlmb1jJ0keBWqMuCIvURJEV0r7MFYTExj X-Received: by 2002:a9d:7452:: with SMTP id p18mr12491837otk.122.1585760119642; Wed, 01 Apr 2020 09:55:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585760119; cv=none; d=google.com; s=arc-20160816; b=SeU2i7jw6R4ZQh+sl3jB+e9q+VmklE6KJeWovlON26sZWgv7IddJFMHOAM1ri8ezze a4jrtzd44e1t0nfemltJg7OJeVDQB7QtzCa2WkKVPAXuoe4dRZfSZE02nU0w5WEcN1MQ 6fCF8aH2niXkF/VOomyZi3TX80Hg09IPui/Lt7cDmWBb7kBOXZSWL+kDuIulNqOL3wEd v301mSmg1FMUQ6bFSTmhK1Pz+HeZ/pwdPshWhcsX846Mqh2ad8ezvy+OBvgiiqOfKTNb 1nBF7kYnp/d5ooBnz7tOspPlKzkwFn5Oxh8+ekWz08nRwiY4nPLKxmuJhW29xiqrNZHb G/nA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FUKrFDwmeE2n75VnM2ogXyhbUmFK5A7LV3kzHADAilg=; b=ZzoSOVl+RZ6H+OTlfFY0JXqCqmxlCebguZPLW/vSrAOa1491shYs9yTs3dl4YG2Q/5 137y9N8ZK8ZMWwhjBcwQskOAyXlHJGcX7W7+KF2ez/+q81jJn+ZTc5WPgDUx5iXE32ES 4kDfdeghE3PwVqDh/Ipx3IR0NaQ6bdhPXNKu/ekBnBXC/I4ZQ2m3Ujw0mu80Shb1pqOL z+usvU8/17noh1MtWziJuDNiflzQVVFDPtflKDqiPQb4gjn5blQpqCBYdRscQlYFUgTq PCBXmzhm6AnvntS5XqzPl1w2fgAx7sGoWBeseKy4lFAHfNDQqKrkt/zM/X8b0kPkQPTN diFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lqPRpGiF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f129si1060001oia.243.2020.04.01.09.55.06; Wed, 01 Apr 2020 09:55:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lqPRpGiF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387826AbgDAQbS (ORCPT + 99 others); Wed, 1 Apr 2020 12:31:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:57312 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388268AbgDAQbL (ORCPT ); Wed, 1 Apr 2020 12:31:11 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6C1AD216FD; Wed, 1 Apr 2020 16:31:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585758670; bh=nhJQxQCFLz20+3m0GlqbdNdv+16PiSrAntecgskSFgI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lqPRpGiFVR2hZjSQES458URCHJt/W+tahCUn2kHm0BjFxEYdKn7FI6mv7iRFzDUuX 1O6ehckKVPyi/lxy10Xl/s+ePhPAaw2f+/Wq2uQSu+K7B1oopDxw4BX5SQCZVIaPiF ufpdJBoYXYtEnU0BkO+kwTYWsUn4euWhErE2uoqg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, yangerkun , Oliver Hartkopp , "David S. Miller" Subject: [PATCH 4.4 39/91] slcan: not call free_netdev before rtnl_unlock in slcan_open Date: Wed, 1 Apr 2020 18:17:35 +0200 Message-Id: <20200401161527.443991002@linuxfoundation.org> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200401161512.917494101@linuxfoundation.org> References: <20200401161512.917494101@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oliver Hartkopp [ Upstream commit 2091a3d42b4f339eaeed11228e0cbe9d4f92f558 ] As the description before netdev_run_todo, we cannot call free_netdev before rtnl_unlock, fix it by reorder the code. This patch is a 1:1 copy of upstream slip.c commit f596c87005f7 ("slip: not call free_netdev before rtnl_unlock in slip_open"). Reported-by: yangerkun Signed-off-by: Oliver Hartkopp Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/can/slcan.c | 3 +++ 1 file changed, 3 insertions(+) --- a/drivers/net/can/slcan.c +++ b/drivers/net/can/slcan.c @@ -621,7 +621,10 @@ err_free_chan: tty->disc_data = NULL; clear_bit(SLF_INUSE, &sl->flags); slc_free_netdev(sl->dev); + /* do not call free_netdev before rtnl_unlock */ + rtnl_unlock(); free_netdev(sl->dev); + return err; err_exit: rtnl_unlock();