<feed xmlns='http://www.w3.org/2005/Atom'>
<title>user/sven/linux.git/drivers/net/can, branch v4.9.46</title>
<subtitle>Linux Kernel
</subtitle>
<id>https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.9.46</id>
<link rel='self' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/atom?h=v4.9.46'/>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/'/>
<updated>2017-06-24T05:11:12Z</updated>
<entry>
<title>can: gs_usb: fix memory leak in gs_cmd_reset()</title>
<updated>2017-06-24T05:11:12Z</updated>
<author>
<name>Marc Kleine-Budde</name>
<email>mkl@pengutronix.de</email>
</author>
<published>2017-06-04T12:03:42Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=95f47cd7d7d8f40a1cc744a4a3116b44a43e6514'/>
<id>urn:sha1:95f47cd7d7d8f40a1cc744a4a3116b44a43e6514</id>
<content type='text'>
commit 5cda3ee5138e91ac369ed9d0b55eab0dab077686 upstream.

This patch adds the missing kfree() in gs_cmd_reset() to free the
memory that is not used anymore after usb_control_msg().

Cc: Maximilian Schneider &lt;max@schneidersoft.net&gt;
Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>net: can: usb: gs_usb: Fix buffer on stack</title>
<updated>2017-05-03T15:36:39Z</updated>
<author>
<name>Maksim Salau</name>
<email>maksim.salau@gmail.com</email>
</author>
<published>2017-04-23T17:31:40Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=4684be169a6700a1c1c5647d6f83f987f45d81fa'/>
<id>urn:sha1:4684be169a6700a1c1c5647d6f83f987f45d81fa</id>
<content type='text'>
commit b05c73bd1e3ec60357580eb042ee932a5ed754d5 upstream.

Allocate buffers on HEAP instead of STACK for local structures
that are to be sent using usb_control_msg().

Signed-off-by: Maksim Salau &lt;maksim.salau@gmail.com&gt;
Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>can: ifi: use correct register to read rx status</title>
<updated>2017-04-21T07:31:22Z</updated>
<author>
<name>Markus Marb</name>
<email>markus@marb.org</email>
</author>
<published>2017-03-17T22:14:47Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=088e5800500e30632b11c4332bcf5923994dc22f'/>
<id>urn:sha1:088e5800500e30632b11c4332bcf5923994dc22f</id>
<content type='text'>
commit 57c1d4c33e8f7ec90976d79127059c1919cc0651 upstream.

The incorrect offset was used when trying to read the RXSTCMD register.

Signed-off-by: Markus Marb &lt;markus@marb.org&gt;
Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>can: usb_8dev: Fix memory leak of priv-&gt;cmd_msg_buffer</title>
<updated>2017-03-12T05:41:48Z</updated>
<author>
<name>Marc Kleine-Budde</name>
<email>mkl@pengutronix.de</email>
</author>
<published>2017-03-02T11:03:40Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=7afc0ee6ae73c23d8acc7a58113e269f6c1da2a2'/>
<id>urn:sha1:7afc0ee6ae73c23d8acc7a58113e269f6c1da2a2</id>
<content type='text'>
commit 7c42631376306fb3f34d51fda546b50a9b6dd6ec upstream.

The priv-&gt;cmd_msg_buffer is allocated in the probe function, but never
kfree()ed. This patch converts the kzalloc() to resource-managed
kzalloc.

Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>can: gs_usb: Don't use stack memory for USB transfers</title>
<updated>2017-03-12T05:41:48Z</updated>
<author>
<name>Ethan Zonca</name>
<email>e@ethanzonca.com</email>
</author>
<published>2017-02-24T16:27:36Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=cec7abd27e878e3c83dc9af41ee87a2e9d483ac0'/>
<id>urn:sha1:cec7abd27e878e3c83dc9af41ee87a2e9d483ac0</id>
<content type='text'>
commit c919a3069c775c1c876bec55e00b2305d5125caa upstream.

Fixes: 05ca5270005c can: gs_usb: add ethtool set_phys_id callback to locate physical device

The gs_usb driver is performing USB transfers using buffers allocated on
the stack. This causes the driver to not function with vmapped stacks.
Instead, allocate memory for the transfer buffers.

Signed-off-by: Ethan Zonca &lt;e@ethanzonca.com&gt;
Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>can: ti_hecc: add missing prepare and unprepare of the clock</title>
<updated>2017-02-01T07:33:08Z</updated>
<author>
<name>Yegor Yefremov</name>
<email>yegorslists@googlemail.com</email>
</author>
<published>2017-01-18T10:35:57Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=50f5972cc23179e90e8452998bcb609694a9d927'/>
<id>urn:sha1:50f5972cc23179e90e8452998bcb609694a9d927</id>
<content type='text'>
commit befa60113ce7ea270cb51eada28443ca2756f480 upstream.

In order to make the driver work with the common clock framework, this
patch converts the clk_enable()/clk_disable() to
clk_prepare_enable()/clk_disable_unprepare().

Also add error checking for clk_prepare_enable().

Signed-off-by: Yegor Yefremov &lt;yegorslists@googlemail.com&gt;
Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>can: c_can_pci: fix null-pointer-deref in c_can_start() - set device pointer</title>
<updated>2017-02-01T07:33:08Z</updated>
<author>
<name>Einar Jón</name>
<email>tolvupostur@gmail.com</email>
</author>
<published>2016-08-12T11:50:41Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=9f56548b007769191f7dff7585eb317369991c22'/>
<id>urn:sha1:9f56548b007769191f7dff7585eb317369991c22</id>
<content type='text'>
commit c97c52be78b8463ac5407f1cf1f22f8f6cf93a37 upstream.

The priv-&gt;device pointer for c_can_pci is never set, but it is used
without a NULL check in c_can_start(). Setting it in c_can_pci_probe()
like c_can_plat_probe() prevents c_can_pci.ko from crashing, with and
without CONFIG_PM.

This might also cause the pm_runtime_*() functions in c_can.c to
actually be executed for c_can_pci devices - they are the only other
place where priv-&gt;device is used, but they all contain a null check.

Signed-off-by: Einar Jón &lt;tolvupostur@gmail.com&gt;
Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@linuxfoundation.org&gt;

</content>
</entry>
<entry>
<title>can: peak: fix bad memory access and free sequence</title>
<updated>2016-12-08T14:59:52Z</updated>
<author>
<name>추지호</name>
<email>jiho.chu@samsung.com</email>
</author>
<published>2016-12-08T12:01:13Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=b67d0dd7d0dc9e456825447bbeb935d8ef43ea7c'/>
<id>urn:sha1:b67d0dd7d0dc9e456825447bbeb935d8ef43ea7c</id>
<content type='text'>
Fix for bad memory access while disconnecting. netdev is freed before
private data free, and dev is accessed after freeing netdev.

This makes a slub problem, and it raise kernel oops with slub debugger
config.

Signed-off-by: Jiho Chu &lt;jiho.chu@samsung.com&gt;
Cc: linux-stable &lt;stable@vger.kernel.org&gt;
Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
</content>
</entry>
<entry>
<title>can: peak: Add support for PCAN-USB X6 USB interface</title>
<updated>2016-12-01T13:12:20Z</updated>
<author>
<name>Stephane Grosjean</name>
<email>s.grosjean@peak-system.com</email>
</author>
<published>2016-12-01T10:41:12Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=f00b534ded60bd0a23c2fa8dec4ece52aa7d235f'/>
<id>urn:sha1:f00b534ded60bd0a23c2fa8dec4ece52aa7d235f</id>
<content type='text'>
This adds support for PEAK-System PCAN-USB X6 USB to CAN interface.

The CAN FD adapter PCAN-USB X6 allows the connection of up to 6 CAN FD
or CAN networks to a computer via USB. The interface is installed in an
aluminum profile casing and is shipped in versions with D-Sub connectors
or M12 circular connectors.

The PCAN-USB X6 registers in the USB sub-system as if 3x PCAN-USB-Pro FD
adapters were plugged. So, this patch:

- updates the PEAK_USB entry of the corresponding Kconfig file
- defines and adds the device id. of the PCAN-USB X6 (0x0014) into the
  table of supported device ids
- defines and adds the new software structure implementing the PCAN-USB X6,
  which is obviously a clone of the software structure implementing the
  PCAN-USB Pro FD.

Signed-off-by: Stephane Grosjean &lt;s.grosjean@peak-system.com&gt;
Tested-by: Oliver Hartkopp &lt;socketcan@hartkopp.net&gt;
Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
</content>
</entry>
<entry>
<title>can: peak: Fix bittiming fields size in bits</title>
<updated>2016-12-01T13:11:25Z</updated>
<author>
<name>Stephane Grosjean</name>
<email>s.grosjean@peak-system.com</email>
</author>
<published>2016-12-01T10:41:11Z</published>
<link rel='alternate' type='text/html' href='https://git.stealer.net/cgit.cgi/user/sven/linux.git/commit/?id=fe5b40642f1a2dddfeb84be007b2c975c28d4c6c'/>
<id>urn:sha1:fe5b40642f1a2dddfeb84be007b2c975c28d4c6c</id>
<content type='text'>
This fixes the bitimings fields ranges supported by all the CAN-FD USB
interfaces of the PEAK-System CAN-FD adapters.

Very first development versions of the IP core API defined smaller TSGEx
and SJW fields for both nominal and data bittimings records than the
production versions. This patch fixes them by enlarging their sizes to
the actual values:

field:           old size:    fixed size:
nominal TSGEG1   6            8
nominal TSGEG2   4            7
nominal SJW      4            7
data TSGEG1      4            5
data TSGEG2      3            4
data SJW         2            4

Note that this has no other consequences than offering larger choice to
bitrate encoding.

Signed-off-by: Stephane Grosjean &lt;s.grosjean@peak-system.com&gt;
Signed-off-by: Marc Kleine-Budde &lt;mkl@pengutronix.de&gt;
</content>
</entry>
</feed>
