[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20250920134201.18428-1-duoming@zju.edu.cn>
Date: Sat, 20 Sep 2025 21:42:01 +0800
From: Duoming Zhou <duoming@....edu.cn>
To: linux-scsi@...r.kernel.org
Cc: linux-kernel@...r.kernel.org,
James.Bottomley@...senPartnership.com,
martin.petersen@...cle.com,
christophe.jaillet@...adoo.fr,
mingo@...nel.org,
tglx@...utronix.de,
linux@...blig.org,
fourier.thomas@...il.com,
Duoming Zhou <duoming@....edu.cn>
Subject: [PATCH] scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
During the detaching of Marvell's SAS/SATA controller, the origin
code calls cancel_delayed_work() in mvs_free() to cancel the delayed
work item mwq->work_q. However, if mwq->work_q is already running,
the cancel_delayed_work() may fail to cancel it. This can lead to
use-after-free scenarios where mvs_free() frees the mvs_info while
mvs_work_queue() is still executing and attempts to access the
already-freed mvs_info.
A typical race condition is illustrated below:
CPU 0 (remove) | CPU 1 (delayed work callback)
mvs_pci_remove() |
mvs_free() | mvs_work_queue()
cancel_delayed_work() |
kfree(mvi) |
| mvi-> // UAF
Replace cancel_delayed_work() with cancel_delayed_work_sync() to
ensure that the delayed work item is properly canceled and any
executing delayed work item completes before the mvs_info is
deallocated.
This bug was found by static analysis.
Fixes: 20b09c2992fe ("[SCSI] mvsas: add support for 94xx; layout change; bug fixes")
Signed-off-by: Duoming Zhou <duoming@....edu.cn>
---
drivers/scsi/mvsas/mv_init.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/scsi/mvsas/mv_init.c b/drivers/scsi/mvsas/mv_init.c
index 2c72da6b8cf0..7f1ad305eee6 100644
--- a/drivers/scsi/mvsas/mv_init.c
+++ b/drivers/scsi/mvsas/mv_init.c
@@ -124,7 +124,7 @@ static void mvs_free(struct mvs_info *mvi)
if (mvi->shost)
scsi_host_put(mvi->shost);
list_for_each_entry(mwq, &mvi->wq_list, entry)
- cancel_delayed_work(&mwq->work_q);
+ cancel_delayed_work_sync(&mwq->work_q);
kfree(mvi->rsvd_tags);
kfree(mvi);
}
--
2.34.1
Powered by blists - more mailing lists