aboutsummaryrefslogtreecommitdiffstats
path: root/lib/mpi/mpi-inline.c
diff options
context:
space:
mode:
authorDuoming Zhou <[email protected]>2025-09-20 13:42:01 +0000
committerMartin K. Petersen <[email protected]>2025-09-29 21:26:20 +0000
commit60cd16a3b7439ccb699d0bf533799eeb894fd217 (patch)
tree59a772bab30f3f3ae4566e2728fb2851e79bde85 /lib/mpi/mpi-inline.c
parentscsi: ufs: core: Fix PM QoS mutex initialization (diff)
downloadkernel-60cd16a3b7439ccb699d0bf533799eeb894fd217.tar.gz
kernel-60cd16a3b7439ccb699d0bf533799eeb894fd217.zip
scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
During the detaching of Marvell's SAS/SATA controller, the original code calls cancel_delayed_work() in mvs_free() to cancel the delayed work item mwq->work_q. However, if mwq->work_q is already running, the cancel_delayed_work() may fail to cancel it. This can lead to use-after-free scenarios where mvs_free() frees the mvs_info while mvs_work_queue() is still executing and attempts to access the already-freed mvs_info. A typical race condition is illustrated below: CPU 0 (remove) | CPU 1 (delayed work callback) mvs_pci_remove() | mvs_free() | mvs_work_queue() cancel_delayed_work() | kfree(mvi) | | mvi-> // UAF Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure that the delayed work item is properly canceled and any executing delayed work item completes before the mvs_info is deallocated. This bug was found by static analysis. Fixes: 20b09c2992fe ("[SCSI] mvsas: add support for 94xx; layout change; bug fixes") Signed-off-by: Duoming Zhou <[email protected]> Signed-off-by: Martin K. Petersen <[email protected]>
Diffstat (limited to 'lib/mpi/mpi-inline.c')
0 files changed, 0 insertions, 0 deletions