Commit 009fc857 authored by Zou Wei's avatar Zou Wei Committed by David S. Miller

mISDN: fix possible use-after-free in HFC_cleanup()

This module's remove path calls del_timer(). However, that function
does not wait until the timer handler finishes. This means that the
timer handler may still be running after the driver's remove function
has finished, which would result in a use-after-free.

Fix by calling del_timer_sync(), which makes sure the timer handler
has finished, and unable to re-schedule itself.
Reported-by: default avatarHulk Robot <hulkci@huawei.com>
Signed-off-by: default avatarZou Wei <zou_wei@huawei.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 1c72e6ab
...@@ -2342,7 +2342,7 @@ static void __exit ...@@ -2342,7 +2342,7 @@ static void __exit
HFC_cleanup(void) HFC_cleanup(void)
{ {
if (timer_pending(&hfc_tl)) if (timer_pending(&hfc_tl))
del_timer(&hfc_tl); del_timer_sync(&hfc_tl);
pci_unregister_driver(&hfc_driver); pci_unregister_driver(&hfc_driver);
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment