Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp630488pxb; Tue, 2 Feb 2021 13:45:22 -0800 (PST) X-Google-Smtp-Source: ABdhPJzu2pGEujIYrs0IQgrYlb4WZiBaJO51YP/LlCgVxuRCridETKhm3FsDWPyKTXhdJT3nVunn X-Received: by 2002:a17:906:6096:: with SMTP id t22mr57992ejj.34.1612302321854; Tue, 02 Feb 2021 13:45:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612302321; cv=none; d=google.com; s=arc-20160816; b=K877JSepnGQorgqKkXuIDNRev+3aY985GnElLy+APRabQDOr2SWmitxA5Pd7j8u+5Y C/yTP8anYEtkr9BNt2pE/Z6Jy/uCaxdZ7n/EY4Pr6aGjHKjJRyAbvL1209NH0PaXkU42 7h+7NjPgCdLaSmfDIWDjGaoDryrpVgR6maQYR9Lyo59S1aaqwtrahzvN3Re+Ggy+wNK/ 5Ro/fo9GUwtd+yIGzbTiefg/Gd3913pc05U2jRZ4PLWXTNc+1BrDXz5Vq+JrPHHnaYTt nJERALVuOT3KKa5Ju6UPv730zpCNiBZ+9MrEn9YgBbHoCPL70K6jfvmlKM67Uafnw88X BPJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=e/FGN/6nzctaAC1gvk6G0i0R0/p/SS7q52Vww4Mc2y0=; b=VaYp4EwH3hq4vXS8A+guOZgg8P3CSDK3EtYL6yO7a2IchrHwa9LoQzF5gmGHJnK9q6 PGoSNZf6EL8HZc6naeYztFYfYu4EGGlk/LM82QBF9FIPh3IhvuKp/0QdRrCLDwUtk3VS QOns8IxyKE9pBQopBQ5TnPvQOmaKqgP8ebv0SyOWZd7O/zMJRjVyyqUHZ15mz1124Rn4 oPO9+CLVUTan7cy0M7WT8kt8ILaekuK16JDgyhSsEyi7RIlxBRS45DmPSexalgLYNZmi ApkPlHBFq5XcZlP1MpoEXss6CIYPG1mGC8Of6CKV1C61OuIYSn2aUA6ZexTEfF9c2YXj HWUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lOjw0jyW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r4si75711ejb.1.2021.02.02.13.44.55; Tue, 02 Feb 2021 13:45:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=lOjw0jyW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233182AbhBBNwL (ORCPT + 99 others); Tue, 2 Feb 2021 08:52:11 -0500 Received: from mail.kernel.org ([198.145.29.99]:36350 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232909AbhBBNq5 (ORCPT ); Tue, 2 Feb 2021 08:46:57 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id B504964F05; Tue, 2 Feb 2021 13:41:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1612273288; bh=ZRsifVflCkksgPiM9QLGJKUy7NfqP4BAT17EgzAHuSQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lOjw0jyW99wIOjsQ9SYX2jU2aekRm7jeN7hRTt/lZ3EIsy5XlRrsxGNenR+3I4gtc lUYd8SIQjEKtsZrkMKC5rCPykqQ/D3Sjm1GueZNioAtzYtzvuLVZpGAE4RD3LcfFoA zl6pM7uTqBO/f/VynQjigpPWiylCeaRLLqHgBIA8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lorenzo Bianconi , Jakub Kicinski , Kalle Valo Subject: [PATCH 5.10 051/142] mt7601u: fix kernel crash unplugging the device Date: Tue, 2 Feb 2021 14:36:54 +0100 Message-Id: <20210202132959.832518832@linuxfoundation.org> X-Mailer: git-send-email 2.30.0 In-Reply-To: <20210202132957.692094111@linuxfoundation.org> References: <20210202132957.692094111@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lorenzo Bianconi commit 0acb20a5438c36e0cf2b8bf255f314b59fcca6ef upstream. The following crash log can occur unplugging the usb dongle since, after the urb poison in mt7601u_free_tx_queue(), usb_submit_urb() will always fail resulting in a skb kfree while the skb has been already queued. Fix the issue enqueuing the skb only if usb_submit_urb() succeed. Hardware name: Hewlett-Packard 500-539ng/2B2C, BIOS 80.06 04/01/2015 Workqueue: usb_hub_wq hub_event RIP: 0010:skb_trim+0x2c/0x30 RSP: 0000:ffffb4c88005bba8 EFLAGS: 00010206 RAX: 000000004ad483ee RBX: ffff9a236625dee0 RCX: 000000000000662f RDX: 000000000000000c RSI: 0000000000000000 RDI: ffff9a2343179300 RBP: ffff9a2343179300 R08: 0000000000000001 R09: 0000000000000000 R10: ffff9a23748f7840 R11: 0000000000000001 R12: ffff9a236625e4d4 R13: ffff9a236625dee0 R14: 0000000000001080 R15: 0000000000000008 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd410a34ef8 CR3: 00000001416ee001 CR4: 00000000001706f0 Call Trace: mt7601u_tx_status+0x3e/0xa0 [mt7601u] mt7601u_dma_cleanup+0xca/0x110 [mt7601u] mt7601u_cleanup+0x22/0x30 [mt7601u] mt7601u_disconnect+0x22/0x60 [mt7601u] usb_unbind_interface+0x8a/0x270 ? kernfs_find_ns+0x35/0xd0 __device_release_driver+0x17a/0x230 device_release_driver+0x24/0x30 bus_remove_device+0xdb/0x140 device_del+0x18b/0x430 ? kobject_put+0x98/0x1d0 usb_disable_device+0xc6/0x1f0 usb_disconnect.cold+0x7e/0x20a hub_event+0xbf3/0x1870 process_one_work+0x1b6/0x350 worker_thread+0x53/0x3e0 ? process_one_work+0x350/0x350 kthread+0x11b/0x140 ? __kthread_bind_mask+0x60/0x60 ret_from_fork+0x22/0x30 Fixes: 23377c200b2eb ("mt7601u: fix possible memory leak when the device is disconnected") Signed-off-by: Lorenzo Bianconi Acked-by: Jakub Kicinski Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/3b85219f669a63a8ced1f43686de05915a580489.1610919247.git.lorenzo@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/mediatek/mt7601u/dma.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/mediatek/mt7601u/dma.c +++ b/drivers/net/wireless/mediatek/mt7601u/dma.c @@ -310,7 +310,6 @@ static int mt7601u_dma_submit_tx(struct } e = &q->e[q->end]; - e->skb = skb; usb_fill_bulk_urb(e->urb, usb_dev, snd_pipe, skb->data, skb->len, mt7601u_complete_tx, q); ret = usb_submit_urb(e->urb, GFP_ATOMIC); @@ -328,6 +327,7 @@ static int mt7601u_dma_submit_tx(struct q->end = (q->end + 1) % q->entries; q->used++; + e->skb = skb; if (q->used >= q->entries) ieee80211_stop_queue(dev->hw, skb_get_queue_mapping(skb));