Skip to content

Commit de1bf25

Browse files
Mike TiptonGeorgi Djakov
authored andcommitted
interconnect: Don't access req_list while it's being manipulated
The icc_lock mutex was split into separate icc_lock and icc_bw_lock mutexes in [1] to avoid lockdep splats. However, this didn't adequately protect access to icc_node::req_list. The icc_set_bw() function will eventually iterate over req_list while only holding icc_bw_lock, but req_list can be modified while only holding icc_lock. This causes races between icc_set_bw(), of_icc_get(), and icc_put(). Example A: CPU0 CPU1 ---- ---- icc_set_bw(path_a) mutex_lock(&icc_bw_lock); icc_put(path_b) mutex_lock(&icc_lock); aggregate_requests() hlist_for_each_entry(r, ... hlist_del(... <r = invalid pointer> Example B: CPU0 CPU1 ---- ---- icc_set_bw(path_a) mutex_lock(&icc_bw_lock); path_b = of_icc_get() of_icc_get_by_index() mutex_lock(&icc_lock); path_find() path_init() aggregate_requests() hlist_for_each_entry(r, ... hlist_add_head(... <r = invalid pointer> Fix this by ensuring icc_bw_lock is always held before manipulating icc_node::req_list. The additional places icc_bw_lock is held don't perform any memory allocations, so we should still be safe from the original lockdep splats that motivated the separate locks. [1] commit af42269 ("interconnect: Fix locking for runpm vs reclaim") Signed-off-by: Mike Tipton <[email protected]> Fixes: af42269 ("interconnect: Fix locking for runpm vs reclaim") Reviewed-by: Rob Clark <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Georgi Djakov <[email protected]>
1 parent 59097a2 commit de1bf25

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

drivers/interconnect/core.c

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -176,6 +176,8 @@ static struct icc_path *path_init(struct device *dev, struct icc_node *dst,
176176

177177
path->num_nodes = num_nodes;
178178

179+
mutex_lock(&icc_bw_lock);
180+
179181
for (i = num_nodes - 1; i >= 0; i--) {
180182
node->provider->users++;
181183
hlist_add_head(&path->reqs[i].req_node, &node->req_list);
@@ -186,6 +188,8 @@ static struct icc_path *path_init(struct device *dev, struct icc_node *dst,
186188
node = node->reverse;
187189
}
188190

191+
mutex_unlock(&icc_bw_lock);
192+
189193
return path;
190194
}
191195

@@ -792,12 +796,16 @@ void icc_put(struct icc_path *path)
792796
pr_err("%s: error (%d)\n", __func__, ret);
793797

794798
mutex_lock(&icc_lock);
799+
mutex_lock(&icc_bw_lock);
800+
795801
for (i = 0; i < path->num_nodes; i++) {
796802
node = path->reqs[i].node;
797803
hlist_del(&path->reqs[i].req_node);
798804
if (!WARN_ON(!node->provider->users))
799805
node->provider->users--;
800806
}
807+
808+
mutex_unlock(&icc_bw_lock);
801809
mutex_unlock(&icc_lock);
802810

803811
kfree_const(path->name);

0 commit comments

Comments
 (0)