Received: by 2002:a17:90a:9307:0:0:0:0 with SMTP id p7csp3963702pjo; Tue, 3 Mar 2020 10:10:45 -0800 (PST) X-Google-Smtp-Source: ADFU+vuZ/mzfJ8muKI2Z6+SogFecHPb/KFEjyJ9J8KTRTDNskRcm7ieuMQzXvpsJOUnXWw9/fJaw X-Received: by 2002:aca:ed8d:: with SMTP id l135mr3385998oih.112.1583259044828; Tue, 03 Mar 2020 10:10:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583259044; cv=none; d=google.com; s=arc-20160816; b=zzSis7vFULxSN6E5v14VAlONwKB38+nQY0MAFL1Y2hTFIlgiZYsZrPOZvKl7/IWcHc WRKTsG0x7MfFN947B4Nb9MXi2Swa6/+G5iQ2riX5r/FD5gsX2m9XN9u/1klINHd7HtxI hISKkG2NfL2JbN/0d8acVdYLoWEQsdg5CAifa+nVa87brAuGug1TfwSGi7f2rtBcvCtI xQozTBDcj6ea9GwBcAx1EtYXswYE5UTzCHBPxqcUMCXQ7qLStzB2Ky0AHuFVNDBbYnJ3 CCWwfEmXagPvYKIYFIuv49bKU+g8rea0sqjajO9J/JplflHlTBbhJ06rJqbRiwNIWiun BVxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pgQpEc5NGF224KsfkVhDXHvY1AyCmG/nKsOBx7RM5nQ=; b=O8Y4IZDjh1A/CxK85JA2dpwDf9PSNnMG8w3xPCYyYQsN4TfaHiDm9QL4rm+XIB9MLb imv/7YyeWfwpoFNRnl27mmEiLGroXbZUBeBRLEtJ889I4+VtgxnQwMgja84VPxyVuL/R zSPWv5FAEL13hjbccpEjWZ8E6qsaTEGQeubmZ/QP+bleK1jKjMwovazZhEtPLf/3HF1j dARZRQLk6ZuQjongJSVeYvZUYIO2DSxIACpykyEZe2xc6C1yZLw2sKxK8dSIp+r9YrpK BswVk2RNZ+HrZ7Qz0Fwv7x+Jv3NQ2vNj72eIcIeSYdySXPI3DZckECSFA8opsVJyR3HL Clvw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=O7a7JfqY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d185si7383008oig.189.2020.03.03.10.10.33; Tue, 03 Mar 2020 10:10:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=O7a7JfqY; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388252AbgCCSIr (ORCPT + 99 others); Tue, 3 Mar 2020 13:08:47 -0500 Received: from mail.kernel.org ([198.145.29.99]:33584 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732299AbgCCRxI (ORCPT ); Tue, 3 Mar 2020 12:53:08 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A63552072D; Tue, 3 Mar 2020 17:53:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583257988; bh=Jwgkt/6LEzf488NJYEsiuq9mm8TKBNnpaSlLsP94aMM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=O7a7JfqYohuBDjojdgabstxIda2iGSdKazfFUedjhC9n1Ep30HJtlBjTf0b8PZ8zm 2f+RJ8cIoWNCeV4Wmy5d95Sol4TrtJuyjG3U3s5vf0e1Y/OFpF6b4IzpuE6YMIOCKm blxiqQAaT1k+KT7/Z4iGENFdzM/sZhIhj/S6dQsE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ariel Elior , Michal Kalderon , "David S. Miller" Subject: [PATCH 5.4 011/152] qede: Fix race between rdma destroy workqueue and link change event Date: Tue, 3 Mar 2020 18:41:49 +0100 Message-Id: <20200303174303.796942527@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200303174302.523080016@linuxfoundation.org> References: <20200303174302.523080016@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michal Kalderon [ Upstream commit af6565adb02d3129d3fae4d9d5da945abaf4417a ] If an event is added while the rdma workqueue is being destroyed it could lead to several races, list corruption, null pointer dereference during queue_work or init_queue. This fixes the race between the two flows which can occur during shutdown. A kref object and a completion object are added to the rdma_dev structure, these are initialized before the workqueue is created. The refcnt is used to indicate work is being added to the workqueue and ensures the cleanup flow won't start while we're in the middle of adding the event. Once the work is added, the refcnt is decreased and the cleanup flow is safe to run. Fixes: cee9fbd8e2e ("qede: Add qedr framework") Signed-off-by: Ariel Elior Signed-off-by: Michal Kalderon Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/qlogic/qede/qede.h | 2 + drivers/net/ethernet/qlogic/qede/qede_rdma.c | 29 ++++++++++++++++++++++++++- 2 files changed, 30 insertions(+), 1 deletion(-) --- a/drivers/net/ethernet/qlogic/qede/qede.h +++ b/drivers/net/ethernet/qlogic/qede/qede.h @@ -163,6 +163,8 @@ struct qede_rdma_dev { struct list_head entry; struct list_head rdma_event_list; struct workqueue_struct *rdma_wq; + struct kref refcnt; + struct completion event_comp; bool exp_recovery; }; --- a/drivers/net/ethernet/qlogic/qede/qede_rdma.c +++ b/drivers/net/ethernet/qlogic/qede/qede_rdma.c @@ -59,6 +59,9 @@ static void _qede_rdma_dev_add(struct qe static int qede_rdma_create_wq(struct qede_dev *edev) { INIT_LIST_HEAD(&edev->rdma_info.rdma_event_list); + kref_init(&edev->rdma_info.refcnt); + init_completion(&edev->rdma_info.event_comp); + edev->rdma_info.rdma_wq = create_singlethread_workqueue("rdma_wq"); if (!edev->rdma_info.rdma_wq) { DP_NOTICE(edev, "qedr: Could not create workqueue\n"); @@ -83,8 +86,23 @@ static void qede_rdma_cleanup_event(stru } } +static void qede_rdma_complete_event(struct kref *ref) +{ + struct qede_rdma_dev *rdma_dev = + container_of(ref, struct qede_rdma_dev, refcnt); + + /* no more events will be added after this */ + complete(&rdma_dev->event_comp); +} + static void qede_rdma_destroy_wq(struct qede_dev *edev) { + /* Avoid race with add_event flow, make sure it finishes before + * we start accessing the list and cleaning up the work + */ + kref_put(&edev->rdma_info.refcnt, qede_rdma_complete_event); + wait_for_completion(&edev->rdma_info.event_comp); + qede_rdma_cleanup_event(edev); destroy_workqueue(edev->rdma_info.rdma_wq); } @@ -310,15 +328,24 @@ static void qede_rdma_add_event(struct q if (!edev->rdma_info.qedr_dev) return; + /* We don't want the cleanup flow to start while we're allocating and + * scheduling the work + */ + if (!kref_get_unless_zero(&edev->rdma_info.refcnt)) + return; /* already being destroyed */ + event_node = qede_rdma_get_free_event_node(edev); if (!event_node) - return; + goto out; event_node->event = event; event_node->ptr = edev; INIT_WORK(&event_node->work, qede_rdma_handle_event); queue_work(edev->rdma_info.rdma_wq, &event_node->work); + +out: + kref_put(&edev->rdma_info.refcnt, qede_rdma_complete_event); } void qede_rdma_dev_event_open(struct qede_dev *edev)