]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
4.14-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 8 Jul 2022 11:10:07 +0000 (13:10 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 8 Jul 2022 11:10:07 +0000 (13:10 +0200)
added patches:
can-grcan-grcan_probe-remove-extra-of_node_get.patch
can-gs_usb-gs_usb_open-close-fix-memory-leak.patch

queue-4.14/can-grcan-grcan_probe-remove-extra-of_node_get.patch [new file with mode: 0644]
queue-4.14/can-gs_usb-gs_usb_open-close-fix-memory-leak.patch [new file with mode: 0644]
queue-4.14/series

diff --git a/queue-4.14/can-grcan-grcan_probe-remove-extra-of_node_get.patch b/queue-4.14/can-grcan-grcan_probe-remove-extra-of_node_get.patch
new file mode 100644 (file)
index 0000000..bf1cc30
--- /dev/null
@@ -0,0 +1,33 @@
+From 562fed945ea482833667f85496eeda766d511386 Mon Sep 17 00:00:00 2001
+From: Liang He <windhl@126.com>
+Date: Sun, 19 Jun 2022 15:02:57 +0800
+Subject: can: grcan: grcan_probe(): remove extra of_node_get()
+
+From: Liang He <windhl@126.com>
+
+commit 562fed945ea482833667f85496eeda766d511386 upstream.
+
+In grcan_probe(), of_find_node_by_path() has already increased the
+refcount. There is no need to call of_node_get() again, so remove it.
+
+Link: https://lore.kernel.org/all/20220619070257.4067022-1-windhl@126.com
+Fixes: 1e93ed26acf0 ("can: grcan: grcan_probe(): fix broken system id check for errata workaround needs")
+Cc: stable@vger.kernel.org # v5.18
+Cc: Andreas Larsson <andreas@gaisler.com>
+Signed-off-by: Liang He <windhl@126.com>
+Signed-off-by: Marc Kleine-Budde <mkl@pengutronix.de>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/net/can/grcan.c |    1 -
+ 1 file changed, 1 deletion(-)
+
+--- a/drivers/net/can/grcan.c
++++ b/drivers/net/can/grcan.c
+@@ -1669,7 +1669,6 @@ static int grcan_probe(struct platform_d
+        */
+       sysid_parent = of_find_node_by_path("/ambapp0");
+       if (sysid_parent) {
+-              of_node_get(sysid_parent);
+               err = of_property_read_u32(sysid_parent, "systemid", &sysid);
+               if (!err && ((sysid & GRLIB_VERSION_MASK) >=
+                            GRCAN_TXBUG_SAFE_GRLIB_VERSION))
diff --git a/queue-4.14/can-gs_usb-gs_usb_open-close-fix-memory-leak.patch b/queue-4.14/can-gs_usb-gs_usb_open-close-fix-memory-leak.patch
new file mode 100644 (file)
index 0000000..d9074a9
--- /dev/null
@@ -0,0 +1,113 @@
+From 2bda24ef95c0311ab93bda00db40486acf30bd0a Mon Sep 17 00:00:00 2001
+From: Rhett Aultman <rhett.aultman@samsara.com>
+Date: Sun, 3 Jul 2022 19:33:06 +0200
+Subject: can: gs_usb: gs_usb_open/close(): fix memory leak
+
+From: Rhett Aultman <rhett.aultman@samsara.com>
+
+commit 2bda24ef95c0311ab93bda00db40486acf30bd0a upstream.
+
+The gs_usb driver appears to suffer from a malady common to many USB
+CAN adapter drivers in that it performs usb_alloc_coherent() to
+allocate a number of USB request blocks (URBs) for RX, and then later
+relies on usb_kill_anchored_urbs() to free them, but this doesn't
+actually free them. As a result, this may be leaking DMA memory that's
+been used by the driver.
+
+This commit is an adaptation of the techniques found in the esd_usb2
+driver where a similar design pattern led to a memory leak. It
+explicitly frees the RX URBs and their DMA memory via a call to
+usb_free_coherent(). Since the RX URBs were allocated in the
+gs_can_open(), we remove them in gs_can_close() rather than in the
+disconnect function as was done in esd_usb2.
+
+For more information, see the 928150fad41b ("can: esd_usb2: fix memory
+leak").
+
+Link: https://lore.kernel.org/all/alpine.DEB.2.22.394.2206031547001.1630869@thelappy
+Fixes: d08e973a77d1 ("can: gs_usb: Added support for the GS_USB CAN devices")
+Cc: stable@vger.kernel.org
+Signed-off-by: Rhett Aultman <rhett.aultman@samsara.com>
+Signed-off-by: Marc Kleine-Budde <mkl@pengutronix.de>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ drivers/net/can/usb/gs_usb.c |   23 +++++++++++++++++++++--
+ 1 file changed, 21 insertions(+), 2 deletions(-)
+
+--- a/drivers/net/can/usb/gs_usb.c
++++ b/drivers/net/can/usb/gs_usb.c
+@@ -192,6 +192,8 @@ struct gs_can {
+       struct usb_anchor tx_submitted;
+       atomic_t active_tx_urbs;
++      void *rxbuf[GS_MAX_RX_URBS];
++      dma_addr_t rxbuf_dma[GS_MAX_RX_URBS];
+ };
+ /* usb interface struct */
+@@ -600,6 +602,7 @@ static int gs_can_open(struct net_device
+               for (i = 0; i < GS_MAX_RX_URBS; i++) {
+                       struct urb *urb;
+                       u8 *buf;
++                      dma_addr_t buf_dma;
+                       /* alloc rx urb */
+                       urb = usb_alloc_urb(0, GFP_KERNEL);
+@@ -610,7 +613,7 @@ static int gs_can_open(struct net_device
+                       buf = usb_alloc_coherent(dev->udev,
+                                                sizeof(struct gs_host_frame),
+                                                GFP_KERNEL,
+-                                               &urb->transfer_dma);
++                                               &buf_dma);
+                       if (!buf) {
+                               netdev_err(netdev,
+                                          "No memory left for USB buffer\n");
+@@ -618,6 +621,8 @@ static int gs_can_open(struct net_device
+                               return -ENOMEM;
+                       }
++                      urb->transfer_dma = buf_dma;
++
+                       /* fill, anchor, and submit rx urb */
+                       usb_fill_bulk_urb(urb,
+                                         dev->udev,
+@@ -641,10 +646,17 @@ static int gs_can_open(struct net_device
+                                          rc);
+                               usb_unanchor_urb(urb);
++                              usb_free_coherent(dev->udev,
++                                                sizeof(struct gs_host_frame),
++                                                buf,
++                                                buf_dma);
+                               usb_free_urb(urb);
+                               break;
+                       }
++                      dev->rxbuf[i] = buf;
++                      dev->rxbuf_dma[i] = buf_dma;
++
+                       /* Drop reference,
+                        * USB core will take care of freeing it
+                        */
+@@ -709,13 +721,20 @@ static int gs_can_close(struct net_devic
+       int rc;
+       struct gs_can *dev = netdev_priv(netdev);
+       struct gs_usb *parent = dev->parent;
++      unsigned int i;
+       netif_stop_queue(netdev);
+       /* Stop polling */
+       parent->active_channels--;
+-      if (!parent->active_channels)
++      if (!parent->active_channels) {
+               usb_kill_anchored_urbs(&parent->rx_submitted);
++              for (i = 0; i < GS_MAX_RX_URBS; i++)
++                      usb_free_coherent(dev->udev,
++                                        sizeof(struct gs_host_frame),
++                                        dev->rxbuf[i],
++                                        dev->rxbuf_dma[i]);
++      }
+       /* Stop sending URBs */
+       usb_kill_anchored_urbs(&dev->tx_submitted);
index 48cefe5d057e82e93f821443cd30f3f79d7825db..9e70f1fc0cef683d5b4601c50e7fb11a63795828 100644 (file)
@@ -1,2 +1,4 @@
 esp-limit-skb_page_frag_refill-use-to-a-single-page.patch
 mm-slub-add-missing-tid-updates-on-slab-deactivation.patch
+can-grcan-grcan_probe-remove-extra-of_node_get.patch
+can-gs_usb-gs_usb_open-close-fix-memory-leak.patch