[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090309023151.GA11464@cmpxchg.org>
Date: Mon, 9 Mar 2009 03:31:51 +0100
From: Johannes Weiner <hannes@...xchg.org>
To: Jiri Kosina <jkosina@...e.cz>
Cc: Oliver Neukum <oliver@...kum.name>, linux-kernel@...r.kernel.org,
stable@...nel.org
Subject: [patch] hiddev: fix incorrect hiddev freeing
When hiddev_open() fails for whatever reason, free the just allocated
hiddev_list structure shared hiddev potentially still in use.
The hiddev is freed in device disconnect/last close of the device file
and must not be freed while there are possibly existing references to
it.
This is probably responsible for these
http://kerneloops.org/oops.php?number=221185
http://kerneloops.org/oops.php?number=220365
where a reader sleeps on the waitqueue, the device gets disconnected
(exist -> 0) another user tries to open it, fails on the exist check
and frees the hiddev from the table. The finish_wait() in the reader
will then dereference the hiddev to get to the waitqueue and oopses.
This was introduced by commit 079034073faf974973baa0256b029451f6e768ad
"HID: hiddev cleanup -- handle all error conditions properly".
Signed-off-by: Johannes Weiner <hannes@...xchg.org>
Cc: Oliver Neukum <oliver@...kum.name>
---
diff --git a/drivers/hid/usbhid/hiddev.c b/drivers/hid/usbhid/hiddev.c
index 4940e4d..00ea1ed 100644
--- a/drivers/hid/usbhid/hiddev.c
+++ b/drivers/hid/usbhid/hiddev.c
@@ -306,7 +306,7 @@ static int hiddev_open(struct inode *inode, struct file *file)
return 0;
bail:
file->private_data = NULL;
- kfree(list->hiddev);
+ kfree(list);
return res;
}
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists