Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp680440ybh; Tue, 10 Mar 2020 06:22:12 -0700 (PDT) X-Google-Smtp-Source: ADFU+vuM2RSIxLIoyyhW9Pqt7885JA0eVvlGzBiLAhpubEQLliOWbkJf66KhNZdk1sWp0vp1z1Nr X-Received: by 2002:a9d:750d:: with SMTP id r13mr6086835otk.321.1583846532357; Tue, 10 Mar 2020 06:22:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583846532; cv=none; d=google.com; s=arc-20160816; b=MdUVB4FVh61zOkQmvLsgxvvveBAs4RYIkvjJHJA6NnEXSDsnxqJZgnKNytJYikPCgd Le31rt8FCoTJaWQKiMbPWOaRpriSBkyTRd4wtRDb3ojRU51JtN9gsJ1Q7wrz/cG69+nv rMc4tAmeuzJVK6ftuzInNRrg1onqf/SXP+gmFx4m9yB8hmlsnMo7nEEbrD8OF3HOcFzM HK16pq2bAskjHdcURJiqWULjRohknpio8l6gSoA38uWy6e2cYJfr1l9Mc0A75wDEEQ70 eO1jr1b4N5K0T9ASsQwc9zRsW1Hd/t9GLeL/Jpj5AMMjnGsnU7tPd73UsHdMK0RHLUbv kthg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vNIF0HvLjtzs9psAQ1VCSvUCaUNoKta4xcZa16gzwlY=; b=S5+s/KLHN5rKAIUf9yIbJ7qhRL58ucsvlJX3bOD/Rhf4LDwmRlm2iRPN5pxdaojJB9 ubaKgt2FYOt9Fd1Xlgxp3aKdimu7riKWpxgjM5OGUX7hhwTdzIOVE2mLlT1mUExWxYU4 Z86ZPeKM+36MjoibA9w8WMptO4f002jOE5TKi7Pe/vd4q5v5U8C5IgoC8GTlay0fgp1w tMXRx0eE7Kysjk5h+aDbPsFsmTu0TlzyjIl8vDqb8lqC3KqrY6rSFF0ja2OeCnCoMDwA ZEO2IMYK5Ks2Sxu+2SYjMfrEIlvLRIhtxVA8YmRkdfWcPJHSGJLTfhwfhci1FDvCWdVR yBzQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RACrcRD1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i19si5655662oie.131.2020.03.10.06.21.58; Tue, 10 Mar 2020 06:22:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RACrcRD1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730129AbgCJNGj (ORCPT + 99 others); Tue, 10 Mar 2020 09:06:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:52236 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730426AbgCJNGh (ORCPT ); Tue, 10 Mar 2020 09:06:37 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6A65820409; Tue, 10 Mar 2020 13:06:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583845596; bh=XvpgVEZcTBXlGEW1+OoMZPzzlwMiuEY5782FmmRHtAA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RACrcRD1NcY+l3qWBf0NgufoTwRKsJNUxghfNjHpdZtClo0bbvKZir2K0C4aBDxVu z6w2CqpdoBoiTmov+wkRmZ8KzAKrM+ngDmK5OnDczzBqf95tvNobtykv0PMqPT/o2f lCzGzazC9loCjyjQfyXw+D1hABgM2IpyKQj4tTXM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ariel Elior , Michal Kalderon , "David S. Miller" Subject: [PATCH 4.14 032/126] qede: Fix race between rdma destroy workqueue and link change event Date: Tue, 10 Mar 2020 13:40:53 +0100 Message-Id: <20200310124206.474412924@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200310124203.704193207@linuxfoundation.org> References: <20200310124203.704193207@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michal Kalderon [ Upstream commit af6565adb02d3129d3fae4d9d5da945abaf4417a ] If an event is added while the rdma workqueue is being destroyed it could lead to several races, list corruption, null pointer dereference during queue_work or init_queue. This fixes the race between the two flows which can occur during shutdown. A kref object and a completion object are added to the rdma_dev structure, these are initialized before the workqueue is created. The refcnt is used to indicate work is being added to the workqueue and ensures the cleanup flow won't start while we're in the middle of adding the event. Once the work is added, the refcnt is decreased and the cleanup flow is safe to run. Fixes: cee9fbd8e2e ("qede: Add qedr framework") Signed-off-by: Ariel Elior Signed-off-by: Michal Kalderon Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/qlogic/qede/qede.h | 2 + drivers/net/ethernet/qlogic/qede/qede_rdma.c | 29 ++++++++++++++++++++++++++- 2 files changed, 30 insertions(+), 1 deletion(-) --- a/drivers/net/ethernet/qlogic/qede/qede.h +++ b/drivers/net/ethernet/qlogic/qede/qede.h @@ -156,6 +156,8 @@ struct qede_rdma_dev { struct list_head entry; struct list_head rdma_event_list; struct workqueue_struct *rdma_wq; + struct kref refcnt; + struct completion event_comp; }; struct qede_ptp; --- a/drivers/net/ethernet/qlogic/qede/qede_rdma.c +++ b/drivers/net/ethernet/qlogic/qede/qede_rdma.c @@ -57,6 +57,9 @@ static void _qede_rdma_dev_add(struct qe static int qede_rdma_create_wq(struct qede_dev *edev) { INIT_LIST_HEAD(&edev->rdma_info.rdma_event_list); + kref_init(&edev->rdma_info.refcnt); + init_completion(&edev->rdma_info.event_comp); + edev->rdma_info.rdma_wq = create_singlethread_workqueue("rdma_wq"); if (!edev->rdma_info.rdma_wq) { DP_NOTICE(edev, "qedr: Could not create workqueue\n"); @@ -81,8 +84,23 @@ static void qede_rdma_cleanup_event(stru } } +static void qede_rdma_complete_event(struct kref *ref) +{ + struct qede_rdma_dev *rdma_dev = + container_of(ref, struct qede_rdma_dev, refcnt); + + /* no more events will be added after this */ + complete(&rdma_dev->event_comp); +} + static void qede_rdma_destroy_wq(struct qede_dev *edev) { + /* Avoid race with add_event flow, make sure it finishes before + * we start accessing the list and cleaning up the work + */ + kref_put(&edev->rdma_info.refcnt, qede_rdma_complete_event); + wait_for_completion(&edev->rdma_info.event_comp); + qede_rdma_cleanup_event(edev); destroy_workqueue(edev->rdma_info.rdma_wq); } @@ -287,15 +305,24 @@ static void qede_rdma_add_event(struct q if (!edev->rdma_info.qedr_dev) return; + /* We don't want the cleanup flow to start while we're allocating and + * scheduling the work + */ + if (!kref_get_unless_zero(&edev->rdma_info.refcnt)) + return; /* already being destroyed */ + event_node = qede_rdma_get_free_event_node(edev); if (!event_node) - return; + goto out; event_node->event = event; event_node->ptr = edev; INIT_WORK(&event_node->work, qede_rdma_handle_event); queue_work(edev->rdma_info.rdma_wq, &event_node->work); + +out: + kref_put(&edev->rdma_info.refcnt, qede_rdma_complete_event); } void qede_rdma_dev_event_open(struct qede_dev *edev)