]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
media: venus: fix use after free bug in venus_remove due to race condition
authorZheng Wang <zyytlz.wz@163.com>
Tue, 18 Jun 2024 09:25:59 +0000 (14:55 +0530)
committerHans Verkuil <hverkuil-cisco@xs4all.nl>
Sun, 25 Aug 2024 07:16:07 +0000 (09:16 +0200)
in venus_probe, core->work is bound with venus_sys_error_handler, which is
used to handle error. The code use core->sys_err_done to make sync work.
The core->work is started in venus_event_notify.

If we call venus_remove, there might be an unfished work. The possible
sequence is as follows:

CPU0                  CPU1

                     |venus_sys_error_handler
venus_remove         |
hfi_destroy    |
venus_hfi_destroy  |
kfree(hdev);      |
                     |hfi_reinit
 |venus_hfi_queues_reinit
                     |//use hdev

Fix it by canceling the work in venus_remove.

Cc: stable@vger.kernel.org
Fixes: af2c3834c8ca ("[media] media: venus: adding core part and helper functions")
Signed-off-by: Zheng Wang <zyytlz.wz@163.com>
Signed-off-by: Dikshita Agarwal <quic_dikshita@quicinc.com>
Signed-off-by: Stanimir Varbanov <stanimir.k.varbanov@gmail.com>
Signed-off-by: Hans Verkuil <hverkuil-cisco@xs4all.nl>
drivers/media/platform/qcom/venus/core.c

index 165c947a67035433589d79ea93adca170184ad2d..84e95a46dfc9832981ac1c0c58e226a506896ade 100644 (file)
@@ -430,6 +430,7 @@ static void venus_remove(struct platform_device *pdev)
        struct device *dev = core->dev;
        int ret;
 
+       cancel_delayed_work_sync(&core->work);
        ret = pm_runtime_get_sync(dev);
        WARN_ON(ret < 0);