Message ID | TYCP286MB23235BB803E3A778C85B50F7CA379@TYCP286MB2323.JPNP286.PROD.OUTLOOK.COM |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp2370463wru; Mon, 31 Oct 2022 08:16:05 -0700 (PDT) X-Google-Smtp-Source: AMsMyM636uNUI5UlMJuIWxPJWdFb+j3ZvB2KMID8MkeCqzByJDvJBv7u4IPElCusNmQXLH0hYRRF X-Received: by 2002:a17:907:7da5:b0:78e:2c3b:55a2 with SMTP id oz37-20020a1709077da500b0078e2c3b55a2mr13286313ejc.96.1667229365158; Mon, 31 Oct 2022 08:16:05 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1667229365; cv=pass; d=google.com; s=arc-20160816; b=If+YI+ZkDtNzcgD/cqZY3ucuvH7HkCAjMvc7gFah54fSsTOlgOo0ktpFfdlX9vCriM UqR1UsiCmI030RHTQEYJRv3YwwwvDBuq4Ktb1JEQWowvi+vSLgwqZnHo3OcjE72NcrPg Q6CCBrO9vcPwZzTn1rozSpQUFqQD2ZtGT1+yIPCUcjW1F4Z4pwfhDGO6NyrxREerlTIZ 3lW05rV1K82Og1ielpZ7EUWqvhabanAuwx2gJ02lpmIjmRdEZ8pMr7cwhFyNgvwnXKPb QFMgrbWubkA50LS38KAIrxwmIORYCnRIQhNnhw209bGqR9oSb5I2qywQLkxjzltkuKy2 Ftmg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:content-transfer-encoding :message-id:date:subject:cc:to:from:dkim-signature; bh=i9dEn6D7Co1PX/Iiiw8zL1X+12AdwI+Oj3zBGlqIa08=; b=tdR6XxP1HkklVHQ56JvRXoPffZg8E0n8TW19keL9NRFfAE9o1WWJTk1OSsIvzp2O// QrygCuEVB6I0RGzSu+etpMPs0T3TjrXDLxg4jyGwNrRZbS4hnf7S5QkAoIYHMbAlXvzk 5TRuCMXsfg/scmew80Kbo4QUEzGIzRsBhYqDKEXEjiQytJ7k+OHzjwyjx9VGFeGit63D MNY0Ol61dO6th70if0LMsHQ07N7OrXsp5n0rAfKMJuxLVI7ha0lNwqL/B408nKu3Gxnu AN8fPD8OJNfgUcCONwwpQ4d4Iau8wINCML6zKbXEM1MV2UHn7SvfURaOr+KbKKyUp7Sk kJOQ== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@outlook.com header.s=selector1 header.b=Q+so7jGB; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=outlook.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r9-20020a1709063d6900b007392f9ad702si6568324ejf.741.2022.10.31.08.15.28; Mon, 31 Oct 2022 08:16:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@outlook.com header.s=selector1 header.b=Q+so7jGB; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=outlook.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231727AbiJaOxH (ORCPT <rfc822;kartikey406@gmail.com> + 99 others); Mon, 31 Oct 2022 10:53:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34000 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231715AbiJaOxG (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Mon, 31 Oct 2022 10:53:06 -0400 Received: from JPN01-TYC-obe.outbound.protection.outlook.com (mail-tycjpn01olkn2010.outbound.protection.outlook.com [40.92.99.10]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E5D5B10FFC; Mon, 31 Oct 2022 07:53:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FRCRH0ikiqwBcLX2ii96XgqRKXA8VZVanMMTjFzv2hPS0YdZyoGUozbZhmZXbDr/PmFNCqfE1mFFWTYoTO4UFNMLGxQLBPXtFSeJ4z7lYK0iyF/yAHs7vkZZvexF2zBfIK0KZC1rbfInCkjODZ3S/s5wIRdB0Y+7T1nxQMg7VSo1XXcgoIRFZ14+mu1/ivoGADVsCpEZhCTiHJnNNs/uyQ4B9c05dVUvPbAXcCWzWFfI7ntap3RfrhgfvZP0TrgrhemKXzVQIPhXxKaGEzWnhz6iyYsaOO+NbgIrOcgOHIPXdOguTGGdam/HnkIWx/hj5R1nJy8PS8gaqWsk4Rr9Zg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=i9dEn6D7Co1PX/Iiiw8zL1X+12AdwI+Oj3zBGlqIa08=; b=XVgdo4dI8ESVqcf/QdKf3an6AF5j+NnjJDbwB0Nbsp9J88UbYkfeAzqtLRV7w66dHt0z5/uC/8juE1OFqapJKbRAkaAFbHeCBDKdxCxqiknfwgrK/9fj5CdAEUhdY0hDQKoWHKIiBpvyLJRZCcxZszGpCLGSnh6fRl7Dyuq3uEAEDtP97Mzg2OGUJNezol6bS3qE9V34U3+360qh1R/5y8mVmFISVWocE09EkawNod90vqmfYQ48UCxpcEHJ0/V2wNPsguOr7ZsNkIqLGSjMP50FQzwlBeO2C8bUWJ7er79QgkKmem/9eP3OGS+hA02Y6WZ0GEFIsFZWLdvAX7xDoA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=i9dEn6D7Co1PX/Iiiw8zL1X+12AdwI+Oj3zBGlqIa08=; b=Q+so7jGBX47BTlZPClQLG/7XkqAY7eOGSdKf+heeoOZo7MLk+VhN9iO/bKuBHZYGl+CBH1FYztRWUIBz4bC0e5MKvu6Kjf/q2AjMdAcRMId+xOX0/AqJ6BocAYvs8Ed6pDlSOXci++/JJqToCW8j9J5EfMPTBI0jMXoRsFmbsRhuBJKLp11eQODZFow4tYI2Sld2ayrGGYYYw1fT7xevx85K526KBcv+dVpsxJLhuVolBvWH4BqeYupxNTzko95Dco6lT2si2i6DPIO0rEkAZ3wQtF+LRGrTIatHBpseu1NOtyXGwSv2MBO68Iy8NsvaRoB/2YeZBgm3wiMPKQPXRQ== Received: from TYCP286MB2323.JPNP286.PROD.OUTLOOK.COM (2603:1096:400:152::9) by OS3P286MB1807.JPNP286.PROD.OUTLOOK.COM (2603:1096:604:1be::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5769.19; Mon, 31 Oct 2022 14:53:01 +0000 Received: from TYCP286MB2323.JPNP286.PROD.OUTLOOK.COM ([fe80::c90e:cbf3:c23d:43a5]) by TYCP286MB2323.JPNP286.PROD.OUTLOOK.COM ([fe80::c90e:cbf3:c23d:43a5%7]) with mapi id 15.20.5769.018; Mon, 31 Oct 2022 14:53:01 +0000 From: Dawei Li <set_pte_at@outlook.com> To: sumit.semwal@linaro.org, christian.koenig@amd.com Cc: benjamin.gaignard@collabora.com, labbott@redhat.com, Brian.Starkey@arm.com, jstultz@google.com, afd@ti.com, sspatil@android.com, linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org, linux-kernel@vger.kernel.org, Dawei Li <set_pte_at@outlook.com> Subject: [PATCH v2] dma-buf: fix racing conflict of dma_heap_add() Date: Mon, 31 Oct 2022 22:52:35 +0800 Message-ID: <TYCP286MB23235BB803E3A778C85B50F7CA379@TYCP286MB2323.JPNP286.PROD.OUTLOOK.COM> X-Mailer: git-send-email 2.25.1 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-TMN: [4vwNSavDv/oZ9jpJB5pxJFgROf8JOzPGBz5aMq7ezAI=] X-ClientProxiedBy: SG3P274CA0011.SGPP274.PROD.OUTLOOK.COM (2603:1096:4:be::23) To TYCP286MB2323.JPNP286.PROD.OUTLOOK.COM (2603:1096:400:152::9) X-Microsoft-Original-Message-ID: <20221031145235.17912-1-set_pte_at@outlook.com> MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: TYCP286MB2323:EE_|OS3P286MB1807:EE_ X-MS-Office365-Filtering-Correlation-Id: 98353f0b-a22a-4e6a-36f7-08dabb4f9b68 X-MS-Exchange-SLBlob-MailProps: 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 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 98353f0b-a22a-4e6a-36f7-08dabb4f9b68 X-MS-Exchange-CrossTenant-AuthSource: TYCP286MB2323.JPNP286.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 31 Oct 2022 14:53:01.3110 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: OS3P286MB1807 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748216698781598939?= X-GMAIL-MSGID: =?utf-8?q?1748216698781598939?= |
Series |
[v2] dma-buf: fix racing conflict of dma_heap_add()
|
|
Commit Message
Dawei Li
Oct. 31, 2022, 2:52 p.m. UTC
Racing conflict could be:
task A task B
list_for_each_entry
strcmp(h->name))
list_for_each_entry
strcmp(h->name)
kzalloc kzalloc
...... .....
device_create device_create
list_add
list_add
The root cause is that task B has no idea about the fact someone
else(A) has inserted heap with same name when it calls list_add,
so a potential collision occurs.
v1: https://lore.kernel.org/all/TYCP286MB2323950197F60FC3473123B7CA349@TYCP286MB2323.JPNP286.PROD.OUTLOOK.COM/
v1->v2: Narrow down locking scope, check the existence of heap before
insertion, as suggested by Andrew Davis.
Fixes: c02a81fba74f ("dma-buf: Add dma-buf heaps framework")
base-commit: 447fb14bf07905b880c9ed1ea92c53d6dd0649d7
Signed-off-by: Dawei Li <set_pte_at@outlook.com>
---
drivers/dma-buf/dma-heap.c | 37 ++++++++++++++++++++++++++++---------
1 file changed, 28 insertions(+), 9 deletions(-)
Comments
On Mon, Oct 31, 2022 at 7:53 AM Dawei Li <set_pte_at@outlook.com> wrote: > > Racing conflict could be: > task A task B > list_for_each_entry > strcmp(h->name)) > list_for_each_entry > strcmp(h->name) > kzalloc kzalloc > ...... ..... > device_create device_create > list_add > list_add > > The root cause is that task B has no idea about the fact someone > else(A) has inserted heap with same name when it calls list_add, > so a potential collision occurs. > > v1: https://lore.kernel.org/all/TYCP286MB2323950197F60FC3473123B7CA349@TYCP286MB2323.JPNP286.PROD.OUTLOOK.COM/ > > v1->v2: Narrow down locking scope, check the existence of heap before > insertion, as suggested by Andrew Davis. > > Fixes: c02a81fba74f ("dma-buf: Add dma-buf heaps framework") > > base-commit: 447fb14bf07905b880c9ed1ea92c53d6dd0649d7 > > Signed-off-by: Dawei Li <set_pte_at@outlook.com> > --- > drivers/dma-buf/dma-heap.c | 37 ++++++++++++++++++++++++++++--------- > 1 file changed, 28 insertions(+), 9 deletions(-) > > diff --git a/drivers/dma-buf/dma-heap.c b/drivers/dma-buf/dma-heap.c > index 8f5848aa144f..1c787a147e3a 100644 > --- a/drivers/dma-buf/dma-heap.c > +++ b/drivers/dma-buf/dma-heap.c > @@ -216,9 +216,21 @@ const char *dma_heap_get_name(struct dma_heap *heap) > return heap->name; > } > > +static inline bool dma_heap_exist(const char *name) > +{ > + struct dma_heap *h; > + > + list_for_each_entry(h, &heap_list, list) { > + if (!strcmp(h->name, name)) > + return true; > + } > + > + return false; > +} > + > struct dma_heap *dma_heap_add(const struct dma_heap_export_info *exp_info) > { > - struct dma_heap *heap, *h, *err_ret; > + struct dma_heap *heap, *err_ret; > struct device *dev_ret; > unsigned int minor; > int ret; > @@ -235,13 +247,11 @@ struct dma_heap *dma_heap_add(const struct dma_heap_export_info *exp_info) > > /* check the name is unique */ > mutex_lock(&heap_list_lock); > - list_for_each_entry(h, &heap_list, list) { > - if (!strcmp(h->name, exp_info->name)) { > - mutex_unlock(&heap_list_lock); > - pr_err("dma_heap: Already registered heap named %s\n", > - exp_info->name); > - return ERR_PTR(-EINVAL); > - } > + if (dma_heap_exist(exp_info->name)) { > + mutex_unlock(&heap_list_lock); > + pr_err("dma_heap: Already registered heap named %s\n", > + exp_info->name); > + return ERR_PTR(-EINVAL); Hi Dawei, What Andrew was suggesting was that you entirely move the check from here to the critical section down below, not duplicate the check. I don't think we want to check this twice. We should be able to do this by taking the heap_list_lock only once. > } > mutex_unlock(&heap_list_lock); > > @@ -283,13 +293,22 @@ struct dma_heap *dma_heap_add(const struct dma_heap_export_info *exp_info) > err_ret = ERR_CAST(dev_ret); > goto err2; > } > + > /* Add heap to the list */ > mutex_lock(&heap_list_lock); > + if (unlikely(dma_heap_exist(exp_info->name))) { > + mutex_unlock(&heap_list_lock); > + pr_err("dma_heap: Already registered heap named %s\n", > + exp_info->name); > + err_ret = ERR_PTR(-EINVAL); > + goto err3; > + } > list_add(&heap->list, &heap_list); > mutex_unlock(&heap_list_lock); > > return heap; > - > +err3: > + device_destroy(dma_heap_class, heap->heap_devt); > err2: > cdev_del(&heap->heap_cdev); > err1: > -- > 2.25.1 >
diff --git a/drivers/dma-buf/dma-heap.c b/drivers/dma-buf/dma-heap.c index 8f5848aa144f..1c787a147e3a 100644 --- a/drivers/dma-buf/dma-heap.c +++ b/drivers/dma-buf/dma-heap.c @@ -216,9 +216,21 @@ const char *dma_heap_get_name(struct dma_heap *heap) return heap->name; } +static inline bool dma_heap_exist(const char *name) +{ + struct dma_heap *h; + + list_for_each_entry(h, &heap_list, list) { + if (!strcmp(h->name, name)) + return true; + } + + return false; +} + struct dma_heap *dma_heap_add(const struct dma_heap_export_info *exp_info) { - struct dma_heap *heap, *h, *err_ret; + struct dma_heap *heap, *err_ret; struct device *dev_ret; unsigned int minor; int ret; @@ -235,13 +247,11 @@ struct dma_heap *dma_heap_add(const struct dma_heap_export_info *exp_info) /* check the name is unique */ mutex_lock(&heap_list_lock); - list_for_each_entry(h, &heap_list, list) { - if (!strcmp(h->name, exp_info->name)) { - mutex_unlock(&heap_list_lock); - pr_err("dma_heap: Already registered heap named %s\n", - exp_info->name); - return ERR_PTR(-EINVAL); - } + if (dma_heap_exist(exp_info->name)) { + mutex_unlock(&heap_list_lock); + pr_err("dma_heap: Already registered heap named %s\n", + exp_info->name); + return ERR_PTR(-EINVAL); } mutex_unlock(&heap_list_lock); @@ -283,13 +293,22 @@ struct dma_heap *dma_heap_add(const struct dma_heap_export_info *exp_info) err_ret = ERR_CAST(dev_ret); goto err2; } + /* Add heap to the list */ mutex_lock(&heap_list_lock); + if (unlikely(dma_heap_exist(exp_info->name))) { + mutex_unlock(&heap_list_lock); + pr_err("dma_heap: Already registered heap named %s\n", + exp_info->name); + err_ret = ERR_PTR(-EINVAL); + goto err3; + } list_add(&heap->list, &heap_list); mutex_unlock(&heap_list_lock); return heap; - +err3: + device_destroy(dma_heap_class, heap->heap_devt); err2: cdev_del(&heap->heap_cdev); err1: