Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp115356ybm; Tue, 26 May 2020 12:09:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwycIJIOIxqvPk1bwghpUNueP7DETyoi+zEAx+WKQFEINrpTjIiXZfAIu95sg+qV0fvqXBL X-Received: by 2002:aa7:d859:: with SMTP id f25mr8807504eds.292.1590520171490; Tue, 26 May 2020 12:09:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590520171; cv=none; d=google.com; s=arc-20160816; b=bl3uoQgYCY/I9xOtlg866sQOt5mi9CrAytBASNHHhVU3/xtlkvOhsZRvOB0q8Ss/ho Cxou5FVqRplHXrqN2799BfxwVoQs2OTDW4zSjaQMF+b5A8i9+lyUkHaMQ1tdf2s6GrbV AFtKtm4ZV5/Anr84xmGv1QXHdVRr18c5Lzkf7T+kFUIIlSSinNHIFz8zNRammw/uk62s 3LGbAftuTfdf07yZnOL9yqnVfiqa0R4RlgAncgQ1okcE3R6kIrZYYPclaBU2iNBOvKhl ybhK+qbWOLRFQUZJFuYr+u3HTAEnwB9ZuCMDcxYPJUUEko80sa3tkBdOmy6poAOoLC/q 02Sg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=E6m+syOhmNBEqAvlJLFi0n8d8apMeXEaksJPIMnS3fg=; b=0XfqJYYGkXs1/LQs6mNTmOLrm4pW2b/6aokgClnOLTVs1W4ToOcifCH4nFRpUZgmDA n7ZT2sf5Vd4wUBLuCMMeomKbJlcqaVPnSMk2TCIxzGbrRN2fLAXO64d1EMYm6zvD11Ir 9t8q6LAR99BX1MxS/LPoG5Me0Tn+x1/I/8tfFGjIHIxhv4YjWGnqA4xOG4ePwh6a0c1b nb4UZ+foH1qQkwWedr/Z7qsgyJAF/pKXhE6brQBLNclPGQSQ5f29/6XNzghIsD1LspZy NTQn3OcpeBtXJDIiy8wDasbQrRW3viRp0YZK29GwhvIdtSHmDn4duzevbGZOhqox+7WW fTOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=o7jS+s+Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v3si415382eja.72.2020.05.26.12.09.08; Tue, 26 May 2020 12:09:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=o7jS+s+Z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391458AbgEZTFF (ORCPT + 99 others); Tue, 26 May 2020 15:05:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:32854 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391453AbgEZTFD (ORCPT ); Tue, 26 May 2020 15:05:03 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F352820776; Tue, 26 May 2020 19:05:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590519903; bh=R1Gt4SG3jPJ4a59LjXWWW9Stoq8z0WJPtFjuu69IuNE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=o7jS+s+ZbEfgr2w12NTPTrG/DbcnY6UQXgkdvW8VKKkGr0M2aoZEzN6COUXCwyuaf TCCaWB0WjjMPXWeQ0JgyF4gYOfVXKXWcn/QIEX7VkmG4ZKC6ZlhPWZwRx4PxmBqkqF zFBxT9pmwEbadqYD7ahLg2dAbpTWvP/sE5EUTdHA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Matthias Kaehlcke , Brian Norris , Douglas Anderson , Guenter Roeck , franky.lin@broadcom.com, Kalle Valo , Sasha Levin Subject: [PATCH 4.19 63/81] brcmfmac: abort and release host after error Date: Tue, 26 May 2020 20:53:38 +0200 Message-Id: <20200526183934.053640655@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200526183923.108515292@linuxfoundation.org> References: <20200526183923.108515292@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Guenter Roeck [ Upstream commit 863844ee3bd38219c88e82966d1df36a77716f3e ] With commit 216b44000ada ("brcmfmac: Fix use after free in brcmf_sdio_readframes()") applied, we see locking timeouts in brcmf_sdio_watchdog_thread(). brcmfmac: brcmf_escan_timeout: timer expired INFO: task brcmf_wdog/mmc1:621 blocked for more than 120 seconds. Not tainted 4.19.94-07984-g24ff99a0f713 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. brcmf_wdog/mmc1 D 0 621 2 0x00000000 last_sleep: 2440793077. last_runnable: 2440766827 [] (__schedule) from [] (schedule+0x98/0xc4) [] (schedule) from [] (__mmc_claim_host+0x154/0x274) [] (__mmc_claim_host) from [] (brcmf_sdio_watchdog_thread+0x1b0/0x1f8 [brcmfmac]) [] (brcmf_sdio_watchdog_thread [brcmfmac]) from [] (kthread+0x178/0x180) In addition to restarting or exiting the loop, it is also necessary to abort the command and to release the host. Fixes: 216b44000ada ("brcmfmac: Fix use after free in brcmf_sdio_readframes()") Cc: Dan Carpenter Cc: Matthias Kaehlcke Cc: Brian Norris Cc: Douglas Anderson Signed-off-by: Guenter Roeck Reviewed-by: Douglas Anderson Acked-by: franky.lin@broadcom.com Acked-by: Dan Carpenter Signed-off-by: Kalle Valo Signed-off-by: Sasha Levin --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c index e0211321fe9e..96870d1b3b73 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/sdio.c @@ -1933,6 +1933,8 @@ static uint brcmf_sdio_readframes(struct brcmf_sdio *bus, uint maxframes) if (brcmf_sdio_hdparse(bus, bus->rxhdr, &rd_new, BRCMF_SDIO_FT_NORMAL)) { rd->len = 0; + brcmf_sdio_rxfail(bus, true, true); + sdio_release_host(bus->sdiodev->func1); brcmu_pkt_buf_free_skb(pkt); continue; } -- 2.25.1