Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4828669yba; Tue, 30 Apr 2019 05:10:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqw2h1wEhpu+26kLHUZYfMHvQp9c9iGFRb5ZZV4erpSWTQA3yTKULjbIlfxDVMtldIE3wTIh X-Received: by 2002:aa7:8208:: with SMTP id k8mr35921713pfi.69.1556626207872; Tue, 30 Apr 2019 05:10:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556626207; cv=none; d=google.com; s=arc-20160816; b=NRxSi5eXhci4vwfMJyNy3SZKi6jaNf/Q3ms+PNk85LXZgv6OtGmNEBF58185zg2TVQ Vhv46fgXCR2XxhTvbcsCqL8cFzLTbADawkUKY0SUd7e+v7DcwQfV7iPfs949O7LTecji BgSBAsjaKfU/70V73ln6nyRTEECvA6Bb2s+RfaTF5PayQZL3gZCJUGMLfQGmbNFsthqb +47SGJGMx9V7PAxtqkgZtKY87gypFkdVWmsljZDq8PvcPFAcS+oHj4NtdCUHlyUa7SRm /vM/jP3I0LbfSW0RXzsLYCXM1wF+QqhMmKVygyP0MWCra6XyHZp/sWqyuwPACoN84HWR iR9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=DKfBNtTPTPGRakjfVFxcJEaOKM6vai9FEuRadaguon4=; b=CFDyYlqS6JIOiXuFcHgIL4b18Mj+syEId9Xe+aS7KhcALrs3W23WPbj6NDcwEyMc4/ kdH04eCIQWg1YDng/KwVcXFClU9FyDVS2Zari14+K10gh0mra2SJJ6Pd9VLF5Ymt8P2S 2EroxIn86DAZ+Us/kGFX2HcCi/AuW/ubfNZxUZPp+gofpFGT/ZWAFJ9681/exeRiRmn+ jrty6i1D6GGJO7uq4PGuQa0ryjwsfU5reOUd13PSRVbRoi9tfNPQkXjaiPnuMiw3BWPX dmum4tVjYIRHiMJ2OXolGQSv6O70M6/HJHh+ZO0baX7+WRUAdu3S3QRsDrkXEV2vT8Fo SRiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2Wg6b0LZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o64si37080791pfa.274.2019.04.30.05.09.50; Tue, 30 Apr 2019 05:10:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2Wg6b0LZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727443AbfD3MHe (ORCPT + 99 others); Tue, 30 Apr 2019 08:07:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:47078 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728503AbfD3Lke (ORCPT ); Tue, 30 Apr 2019 07:40:34 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AD3EB217D8; Tue, 30 Apr 2019 11:40:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556624434; bh=CPJPH/Jy78usenS4z0bRi7H8YQmGs3/daJzXJGYgHrM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2Wg6b0LZs7If/3Goe+9dzA+oyUFdEuisupuJALHa0jJFqN/57zNl180a36mIJh4mz 0W/wOTHE9pzTz7473Z2l8cXzWGN0vdpmHtgs/f0Kd0/DbUPRKe63pqwucczHZeQ4ri Pj2Jceld4/+FDvvvPqbfBKoE6f4zlgVVPtw5RUFE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jiri Pirko , Hangbin Liu , "David S. Miller" Subject: [PATCH 4.9 34/41] team: fix possible recursive locking when add slaves Date: Tue, 30 Apr 2019 13:38:45 +0200 Message-Id: <20190430113532.534243885@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190430113524.451237916@linuxfoundation.org> References: <20190430113524.451237916@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hangbin Liu [ Upstream commit 925b0c841e066b488cc3a60272472b2c56300704 ] If we add a bond device which is already the master of the team interface, we will hold the team->lock in team_add_slave() first and then request the lock in team_set_mac_address() again. The functions are called like: - team_add_slave() - team_port_add() - team_port_enter() - team_modeop_port_enter() - __set_port_dev_addr() - dev_set_mac_address() - bond_set_mac_address() - dev_set_mac_address() - team_set_mac_address Although team_upper_dev_link() would check the upper devices but it is called too late. Fix it by adding a checking before processing the slave. v2: Do not split the string in netdev_err() Fixes: 3d249d4ca7d0 ("net: introduce ethernet teaming device") Acked-by: Jiri Pirko Signed-off-by: Hangbin Liu Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/team/team.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/drivers/net/team/team.c +++ b/drivers/net/team/team.c @@ -1163,6 +1163,12 @@ static int team_port_add(struct team *te return -EINVAL; } + if (netdev_has_upper_dev(dev, port_dev)) { + netdev_err(dev, "Device %s is already an upper device of the team interface\n", + portname); + return -EBUSY; + } + if (port_dev->features & NETIF_F_VLAN_CHALLENGED && vlan_uses_dev(dev)) { netdev_err(dev, "Device %s is VLAN challenged and team device has VLAN set up\n",