[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1603769287.14269.0.camel@realtek.com>
Date: Tue, 27 Oct 2020 03:28:52 +0000
From: Pkshih <pkshih@...ltek.com>
To: "linux-wireless@...r.kernel.org" <linux-wireless@...r.kernel.org>,
"kvalo@...eaurora.org" <kvalo@...eaurora.org>,
"davem@...emloft.net" <davem@...emloft.net>,
"netdev@...r.kernel.org" <netdev@...r.kernel.org>,
"WeitaoWang-oc@...oxin.com" <WeitaoWang-oc@...oxin.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"kuba@...nel.org" <kuba@...nel.org>
CC: "CobeChen@...oxin.com" <CobeChen@...oxin.com>,
"tonywwang@...oxin.com" <tonywwang@...oxin.com>,
"weitaowang@...oxin.com" <weitaowang@...oxin.com>,
"TimGuo@...oxin.com" <TimGuo@...oxin.com>,
"wwt8723@....com" <wwt8723@....com>
Subject: Re: [PATCH] rtlwifi: Fix non-canonical address access issues
On Tue, 2020-10-27 at 11:16 +0800, WeitaoWangoc wrote:
> During realtek USB wireless NIC initialization, it's unexpected
> disconnection will cause urb sumbmit fail. On the one hand,
> _rtl_usb_cleanup_rx will be called to clean up rx stuff, especially for
> rtl_wq. On the other hand, disconnection will cause rtl_usb_disconnect
> and _rtl_usb_cleanup_rx to be called. So, rtl_wq will be flush/destroy
> twice, which will cause non-canonical address 0xdead000000000122 access
> and general protection fault.
>
> Fixed this issue by remove _rtl_usb_cleanup_rx when urb sumbmit fail.
>
> Signed-off-by: WeitaoWangoc <WeitaoWang-oc@...oxin.com>
Thanks for your patch.
Acked-by: Ping-Ke Shih <pkshih@...ltek.com>
> ---
> drivers/net/wireless/realtek/rtlwifi/usb.c | 1 -
> 1 file changed, 1 deletion(-)
>
> diff --git a/drivers/net/wireless/realtek/rtlwifi/usb.c
> b/drivers/net/wireless/realtek/rtlwifi/usb.c
> index 06e073d..d62b87f 100644
> --- a/drivers/net/wireless/realtek/rtlwifi/usb.c
> +++ b/drivers/net/wireless/realtek/rtlwifi/usb.c
> @@ -731,7 +731,6 @@ static int _rtl_usb_receive(struct ieee80211_hw *hw)
>
> err_out:
> usb_kill_anchored_urbs(&rtlusb->rx_submitted);
> - _rtl_usb_cleanup_rx(hw);
> return err;
> }
>
Powered by blists - more mailing lists