Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1936662ybt; Mon, 15 Jun 2020 13:24:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxAc+nQmprvieEGnOu6sjUBqrgEniUwAfbnB3Q9R8iefaPJ5ICaFml0KZJNo4rIARdSYUpH X-Received: by 2002:a50:b964:: with SMTP id m91mr8941926ede.37.1592252673045; Mon, 15 Jun 2020 13:24:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592252673; cv=none; d=google.com; s=arc-20160816; b=oTigj7yLO5PrI8g83UPTb0wekbAMok0TT9k1Gn1HPHn7s65B4XkhS04EeLfkCkzBad 6nwfoJE+0tJBho07Lxw46oqoityBWl7VwYZDN+b1A+PygoZbolV0jVeCiM+cpvyl3TRQ Rcf0NAsM1wbJ7q5WjF/ZdO0BATKJBT+PxU4741bSDoPN/stC7kxvHPc55uz39L5HHuG7 iyUozTWIsHPpnhDQ0fneAcRGWoYR5dSVejrKXebZ+NXzqZc6bvm5UKqV8zz8sWUu7VBS HvxbsjXMJDs4PSgR/wCChmOQwRgjyjYEZJEfHiGQy6I3XhStgOdCCfyKbWZA24FkZQYZ psYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=LB0Wo+G0cRZI1g16alG8VKdqFnblvgn0NUPY55qqSLo=; b=GtC/AkPrYDgCGCgmGD7nCSKedpAfbzGaAn3Wr7+265v5dgirkZKCoNnuD6ECLffvZN x0Nl8zwp1rKdNkfrEeIDmmQrp55B0YOKj1sYyEDO3wq9EMV4eHFCKt2vMjx9u4GwyaEH 0mCggJfRZ3qRweZDGZ+ZhnawZyrw/eYoWJ1LRQvcJ1TgMGNoYYCrs4wJ5m+XECMLEIoV xVSZmDkH9qoMW8+LNsg9833/f0+YJgOQJe0s8sQhx8P7Gq0yuq6/CvZB7RbddmJa1NuF 34fosjR6xg7J89hrjUepFvhmwWLtzVGFfbzvXQtxHF37m3OCvUUFzKsqvz0SWkOxQl/l A7eg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w23si9423583edv.71.2020.06.15.13.24.11; Mon, 15 Jun 2020 13:24:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731432AbgFOUUd (ORCPT + 99 others); Mon, 15 Jun 2020 16:20:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35962 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731249AbgFOUUd (ORCPT ); Mon, 15 Jun 2020 16:20:33 -0400 Received: from shards.monkeyblade.net (shards.monkeyblade.net [IPv6:2620:137:e000::1:9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3D1C2C061A0E; Mon, 15 Jun 2020 13:20:32 -0700 (PDT) Received: from localhost (unknown [IPv6:2601:601:9f00:477::3d5]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 0CC09120ED49A; Mon, 15 Jun 2020 13:20:32 -0700 (PDT) Date: Mon, 15 Jun 2020 13:20:31 -0700 (PDT) Message-Id: <20200615.132031.260816488025362367.davem@davemloft.net> To: bruceshenzk@gmail.com Cc: jcliburn@gmail.com, chris.snook@gmail.com, kuba@kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] net: alx: fix race condition in alx_remove From: David Miller In-Reply-To: <20200615155029.21002-1-bruceshenzk@gmail.com> References: <20200614165912.25622-1-bruceshenzk@gmail.com> <20200615155029.21002-1-bruceshenzk@gmail.com> X-Mailer: Mew version 6.8 on Emacs 26.3 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Mon, 15 Jun 2020 13:20:32 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Zekun Shen Date: Mon, 15 Jun 2020 11:50:29 -0400 > There is a race condition exist during termination. The path is > alx_stop and then alx_remove. An alx_schedule_link_check could be called > before alx_stop by interrupt handler and invoke alx_link_check later. > Alx_stop frees the napis, and alx_remove cancels any pending works. > If any of the work is scheduled before termination and invoked before > alx_remove, a null-ptr-deref occurs because both expect alx->napis[i]. > > This patch fix the race condition by moving cancel_work_sync functions > before alx_free_napis inside alx_stop. Because interrupt handler can call > alx_schedule_link_check again, alx_free_irq is moved before > cancel_work_sync calls too. > > Signed-off-by: Zekun Shen Applied, thank you.