Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp4643725pxv; Tue, 29 Jun 2021 11:55:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw87A2kyj26jn1UkRWsGRpKsLctH8FY+p8FB1W81M0YDjhSn/mtXAdTWCAELxcjfCn0TpDP X-Received: by 2002:a02:3781:: with SMTP id r123mr5620878jar.26.1624992932544; Tue, 29 Jun 2021 11:55:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624992932; cv=none; d=google.com; s=arc-20160816; b=oAVwMB3Q9G5caq9hC1kH/zSOX6Gjq9jQsVWDtBRzVtzEzZwD7LDDvHw1iG37eI5MMS kzLZQgGgp+nJFn+3xfr3xZbTFoH1HuR5qbhCQX/q8MqYmaFQpia0E2YrzdergDi/wHpF rmwN0rASHPZaQY5mdcf6XU6fSXItjiHsAbSpRwz9h0LuHOn0yn4BCaxoOsnvcN2IesTM 3RCGoTyir2wQXUVZ2c5v0V+DzKmzbt8YSVdjSQXUb85jWWfCvZ1Phm32NJtfbLpommSh Obqp8fSN1JestXGcWWM90pTn4QLrw0sQym++JXEhsnaz4LtfQx7N6B7m0pty//X7ZenF oGwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=8VFTBNoqeNid7ps5b5JaesQS7mJ2LOHm8KRRU0vuHB8=; b=mBewZU5oGBV+4L0Rf0/oh3S2k7CxmD6zyCV7TL0BZ7BMDkgSmdYbLPmTrNjXstmmjl A+8j7CZ+OtUJ+5/5u4dabEK+8d7Bkt7Hdx31vPl2v1odPPwa6Bx7B1TL9vRTOAuTpE5E cfOmRaSQ3zgY1O18U3sFJTVeGpHGBarcCxKqfSvCAit0MZB5a0AB0GLi/61pmLUpWcXg LVO49Q5yv1vw04Z8I69bKHRH6snnoh7F+tc/miUrVKEPXW6iRsiNlpBNfrLGWiIiQOhT H3qF3l0E6R1xMM/vaEcZ1LgJlIKUXB7F4hwHjSbcUkc7XoMjPA+tqB1n8nNYF31cFr0w K65g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=dEkr2G06; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a1si21039178ioe.96.2021.06.29.11.55.16; Tue, 29 Jun 2021 11:55:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=dEkr2G06; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234139AbhF2R3b (ORCPT + 99 others); Tue, 29 Jun 2021 13:29:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:33986 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233106AbhF2R3a (ORCPT ); Tue, 29 Jun 2021 13:29:30 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CB1C561D8E; Tue, 29 Jun 2021 17:27:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624987623; bh=Fiyq8xQDH18p8i42/BBHJsOdmil86LfKlHbmik4QPqw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=dEkr2G062XoUHkfTNTd+ZcmImQUgBmpzv8OzOKQQysYTfcTC/TfvKJTgJj9sufFdW sD15/6ICokwg14m4PEOVikUlyhXUhvJCacA6GEfcLQdGwO6Pvt0Awg0CTfg51ohpDz sNK6saZ+0Cm8G5OyTnD7/galyNEE/5Jkv5LQIOhdBXM6gEowO7fb34kOPEUmWhmaWT WpD3BvyYX1Fv64U0C4T8w5anoh4s7Kh8HU/gzZBpO289iGQV5KcwVzqvw9IVH0LOo6 ViyWOSN42cNna8np4bhIuLJ8G4/OYrCNcukBTVZX5NaUEU9Ob/epK9OAiqqJ/m2cxP gvJSt641F/nQw== Date: Tue, 29 Jun 2021 20:27:00 +0300 From: Jarkko Sakkinen To: Saubhik Mukherjee Cc: peterhuewe@gmx.de, jgg@ziepe.ca, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, ldv-project@linuxtesting.org, andrianov@ispras.ru Subject: Re: [PATCH] char: tpm: vtpm_proxy: Fix race in init Message-ID: <20210629172700.yxqnedbayumo5f24@kernel.org> References: <20210623132226.140341-1-saubhik.mukherjee@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210623132226.140341-1-saubhik.mukherjee@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 23, 2021 at 06:52:26PM +0530, Saubhik Mukherjee wrote: > vtpm_module_init calls vtpmx_init which calls misc_register. The file > operations callbacks are registered. So, vtpmx_fops_ioctl can execute in > parallel with rest of vtpm_module_init. vtpmx_fops_ioctl calls > vtpmx_ioc_new_dev, which calls vtpm_proxy_create_device, which calls > vtpm_proxy_work_start, which could read uninitialized workqueue. > > To avoid this, create workqueue before vtpmx init. > > Found by Linux Driver Verification project (linuxtesting.org). > > Signed-off-by: Saubhik Mukherjee > --- > drivers/char/tpm/tpm_vtpm_proxy.c | 19 +++++++++---------- > 1 file changed, 9 insertions(+), 10 deletions(-) > > diff --git a/drivers/char/tpm/tpm_vtpm_proxy.c b/drivers/char/tpm/tpm_vtpm_proxy.c > index 91c772e38bb5..225dfa026a8f 100644 > --- a/drivers/char/tpm/tpm_vtpm_proxy.c > +++ b/drivers/char/tpm/tpm_vtpm_proxy.c > @@ -697,23 +697,22 @@ static int __init vtpm_module_init(void) > { > int rc; > > - rc = vtpmx_init(); > - if (rc) { > - pr_err("couldn't create vtpmx device\n"); > - return rc; > - } > - > workqueue = create_workqueue("tpm-vtpm"); > if (!workqueue) { > pr_err("couldn't create workqueue\n"); > - rc = -ENOMEM; > - goto err_vtpmx_cleanup; > + return -ENOMEM; > + } > + > + rc = vtpmx_init(); > + if (rc) { > + pr_err("couldn't create vtpmx device\n"); > + goto err_destroy_workqueue; > } > > return 0; > > -err_vtpmx_cleanup: > - vtpmx_cleanup(); > +err_destroy_workqueue: > + destroy_workqueue(workqueue); > > return rc; > } > -- > 2.30.2 > > Reviewed-by: Jarkko Sakkinen /Jarkko