Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1362916pxb; Fri, 21 Jan 2022 16:33:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJziYL7eD9Z1CeHL3du/Aw8iK5wMdvoTRsXL7MTWWK5Xv4SMYbWW9+yJg5AFkfqs6XV1E5bA X-Received: by 2002:a05:6a00:2408:b0:4c1:e1a1:770 with SMTP id z8-20020a056a00240800b004c1e1a10770mr5603538pfh.70.1642811623294; Fri, 21 Jan 2022 16:33:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642811623; cv=none; d=google.com; s=arc-20160816; b=HshyMNdbqkIG0iYtBJ9yTMzkfL64U9uJD7ahMe83orM5FQKDiBAPcI6+wpBMLmzhur xbll7nJEKMaioELDIRjCEj9O2wzLvGdIHl/wSHP9Ji6PNwc2gOxM32sUJkR2nO2ZXMVp Ro2HbEH9/zUY2FgdcP5tN24uiZLpg4IPyp8rnEUiVN0xsnGPalAGd0McIJ5Ar+KK2hgu c6UEhggjbCGfhOkUcH+XN+5SO5Suu0DCEiPjfqpi4UXvP/00C9nrB5dCoGeTYg9orsaL cyLSbTk2JDbR5fnAxUevE62kV0Ss1nqzObU8se7leATImQN5HMQnOBwXwLxNBYIMhuzN 5l4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=+wQr2d5eRpHGPSk+GQ5BJP2QmCnLf6GyW5hqo/3Oh/c=; b=Lb7LsG1YWCVYRAR7JqBTJsJ3QOFz4YlcDcBlqP9nZ9oevcraxhyUN6VQS4das0RpNC heL6OkOOi0ZY1ttXrGOvv1mUz90nisZQ54198cOvxcRLfvWRum1TUqdZIMdTEYVklJcR 2Oq6upk8bRm+BqPEWcHy+rJ3UY3CUqUVwdLENZUT/oYPCrPF4Blm71QKQvectQHx/gPl r/a9qAaEV9ZAk4w/l24yQ3F08pTYh6bPWrmKVQPnTIZDhdEGb+Uc8EuKRNxOWDxRSLrL 4Rg/35vaM6VfH3QC7+lNp/kvCn9ktmObtM1oMdrrOHxBj1CPOUSITk6bbRIDkvY+zhDg EVRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=E5jHcZ9X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n200si6261229pfd.264.2022.01.21.16.33.31; Fri, 21 Jan 2022 16:33:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=E5jHcZ9X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1378588AbiAUF7a (ORCPT + 99 others); Fri, 21 Jan 2022 00:59:30 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41972 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229914AbiAUF73 (ORCPT ); Fri, 21 Jan 2022 00:59:29 -0500 Received: from mail-ed1-x532.google.com (mail-ed1-x532.google.com [IPv6:2a00:1450:4864:20::532]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DABF0C061574; Thu, 20 Jan 2022 21:59:28 -0800 (PST) Received: by mail-ed1-x532.google.com with SMTP id m4so38341139edb.10; Thu, 20 Jan 2022 21:59:28 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+wQr2d5eRpHGPSk+GQ5BJP2QmCnLf6GyW5hqo/3Oh/c=; b=E5jHcZ9X8iERSBwBX7mycrhSqXUPDJlCqp5XQFVvE+CfkqUUfF8bN1XMeD1nWvQwiz TQMaZrbbDnRvk+2pbJ5N217mXiFN9VIeqyyzNHkaNyGyldjsvtqXuJMQ8zE5QXoy9WuZ oqm6Upasna3Z9fTWQypO70yUAqq+TNNGZQA91iPE8NkavMs94Hz10Z3OkVeu5YY2aMqb FLTpDuLJkmN7LMqKObsj/cRjQ9ZAHIKwI64EwNY9w5g6rDzg1/3lxxmKbqJ0pFmiN62u 3IX5MzZBkkRnrps+P+ftqFQwhqkuN4crQaCjtH8K7VVlGN4w0hr89GY8ooB31OoHm6PJ +K7Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+wQr2d5eRpHGPSk+GQ5BJP2QmCnLf6GyW5hqo/3Oh/c=; b=rPK9xct+/TpQHlW97BaaQGLhjwCjIuyOENrGzGgsT7wJMsU7dpKHfHnG5g6o/1zAVp MhecVngjltZakYVh6RSJ8VCvX+B4s4/jzG4jBXToGsHSTc77jgxKijlEv5wgJiaV8KZu LHo1fqmujjfxvdYWRig4WQLvyuwDLhnGKtNbMRiSM4H5gKmHA9/WGoQpHSOAxsWCJe5b +it0iKU6FW6zl4Ebbb4gFmGNY9zi8AIeS6A70Yl/vwoiPScHBG29fr6HmmEpwFG8ydUQ S1MoGXs7Z9UHLOl+EIM9FGyLDOs+88jFV1GIf8VbwrWXdkAgHOCR6YoEHS7aPP9XO4gl I7QQ== X-Gm-Message-State: AOAM531C2GRGvFtXTjfa72AwIukZCugSWQIb2VgL2OD13LhUlnhGWLdL yY1NkVG0x2ryJKg+WirM/Qji1aEYX7Cu5UqUSo80N4iUWbHTsw== X-Received: by 2002:a17:906:2b8a:: with SMTP id m10mr2119678ejg.479.1642744767084; Thu, 20 Jan 2022 21:59:27 -0800 (PST) MIME-Version: 1.0 References: <20220120130605.55741-1-dzm91@hust.edu.cn> In-Reply-To: From: Dongliang Mu Date: Fri, 21 Jan 2022 13:58:58 +0800 Message-ID: Subject: Re: [PATCH] drivers: net: remove a dangling pointer in peak_usb_create_dev To: Pavel Skripkin Cc: Dongliang Mu , Wolfgang Grandegger , Marc Kleine-Budde , "David S. Miller" , Jakub Kicinski , Stephane Grosjean , =?UTF-8?Q?Stefan_M=C3=A4tje?= , Vincent Mailhol , linux-can@vger.kernel.org, "open list:NETWORKING [GENERAL]" , linux-kernel Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 21, 2022 at 11:36 AM Dongliang Mu wrote: > > On Fri, Jan 21, 2022 at 8:09 AM Dongliang Mu wrote: > > > > On Thu, Jan 20, 2022 at 10:27 PM Pavel Skripkin wrote: > > > > > > Hi Dongliang, > > > > > > On 1/20/22 16:05, Dongliang Mu wrote: > > > > From: Dongliang Mu > > > > > > > > The error handling code of peak_usb_create_dev forgets to reset the > > > > next_siblings of previous entry. > > > > > > > > Fix this by nullifying the (dev->prev_siblings)->next_siblings in the > > > > error handling code. > > > > > > > > Signed-off-by: Dongliang Mu > > > > --- > > > > drivers/net/can/usb/peak_usb/pcan_usb_core.c | 3 +++ > > > > 1 file changed, 3 insertions(+) > > > > > > > > diff --git a/drivers/net/can/usb/peak_usb/pcan_usb_core.c b/drivers/net/can/usb/peak_usb/pcan_usb_core.c > > > > index b850ff8fe4bd..f858810221b6 100644 > > > > --- a/drivers/net/can/usb/peak_usb/pcan_usb_core.c > > > > +++ b/drivers/net/can/usb/peak_usb/pcan_usb_core.c > > > > @@ -894,6 +894,9 @@ static int peak_usb_create_dev(const struct peak_usb_adapter *peak_usb_adapter, > > > > dev->adapter->dev_free(dev); > > > > > > > > lbl_unregister_candev: > > > > + /* remove the dangling pointer in next_siblings */ > > > > + if (dev->prev_siblings) > > > > + (dev->prev_siblings)->next_siblings = NULL; > > > > unregister_candev(netdev); > > > > > > > > lbl_restore_intf_data: > > > > > > > > > Is this pointer used somewhere? I see, that couple of > > > struct peak_usb_adapter::dev_free() functions use it, but > > > peak_usb_disconnect() sets dev->next_siblings to NULL before calling > > > ->dev_free(). > > > > > > Do you have a calltrace or oops log? > > > > Hi Pavel, > > > > I have no calltrace or log since this dangling pointer may not be > > dereferenced in the following code. But I am not sure. So the commit > > title of this patch is "remove a dangling pointer in > > peak_usb_create_dev". > > BTW, as you mentioned, dev->next_siblings is used in struct > peak_usb_adapter::dev_free() (i.e., pcan_usb_fd_free or > pcan_usb_pro_free), how about the following path? > > peak_usb_probe > -> peak_usb_create_dev (goto adap_dev_free;) > -> dev->adapter->dev_free() > -> pcan_usb_fd_free or pcan_usb_pro_free (This function uses > next_siblings as condition elements) > > static void pcan_usb_fd_free(struct peak_usb_device *dev) > { > /* last device: can free shared objects now */ > if (!dev->prev_siblings && !dev->next_siblings) { > struct pcan_usb_fd_device *pdev = > container_of(dev, struct pcan_usb_fd_device, dev); > > /* free commands buffer */ > kfree(pdev->cmd_buffer_addr); > > /* free usb interface object */ > kfree(pdev->usb_if); > } > } > > If next_siblings is not NULL, will it lead to the missing free of > cmd_buffer_addr and usb_if? The answer is No. Forget my silly thought. > > Please let me know if I made any mistakes. > > > > > > > > > > > > > > > > With regards, > > > Pavel Skripkin