Revision 84811412464d66fcf73661a279aa1d7985166495 authored by Prashant Malani on 20 November 2019, 19:40:21 UTC, committed by David S. Miller on 20 November 2019, 20:48:13 UTC
Both rtl_work_func_t() and rtl8152_close() call napi_disable().
Since the two calls aren't protected by a lock, if the close
function starts executing before the work function, we can get into a
situation where the napi_disable() function is called twice in
succession (first by rtl8152_close(), then by set_carrier()).

In such a situation, the second call would loop indefinitely, since
rtl8152_close() doesn't call napi_enable() to clear the NAPI_STATE_SCHED
bit.

The rtl8152_close() function in turn issues a
cancel_delayed_work_sync(), and so it would wait indefinitely for the
rtl_work_func_t() to complete. Since rtl8152_close() is called by a
process holding rtnl_lock() which is requested by other processes, this
eventually leads to a system deadlock and crash.

Re-order the napi_disable() call to occur after the work function
disabling and urb cancellation calls are issued.

Change-Id: I6ef0b703fc214998a037a68f722f784e1d07815e
Reported-by: http://crbug.com/1017928
Signed-off-by: Prashant Malani <pmalani@chromium.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
1 parent b172845
History
File Mode Size
Kconfig -rw-r--r-- 843 bytes
Makefile -rw-r--r-- 303 bytes
crypto.c -rw-r--r-- 61.3 KB
debug.c -rw-r--r-- 3.0 KB
dentry.c -rw-r--r-- 2.0 KB
ecryptfs_kernel.h -rw-r--r-- 24.5 KB
file.c -rw-r--r-- 11.2 KB
inode.c -rw-r--r-- 32.2 KB
keystore.c -rw-r--r-- 78.5 KB
kthread.c -rw-r--r-- 4.2 KB
main.c -rw-r--r-- 24.7 KB
messaging.c -rw-r--r-- 12.9 KB
miscdev.c -rw-r--r-- 14.0 KB
mmap.c -rw-r--r-- 15.1 KB
read_write.c -rw-r--r-- 7.8 KB
super.c -rw-r--r-- 5.4 KB

back to top