Received: by 10.192.165.148 with SMTP id m20csp886845imm; Wed, 25 Apr 2018 09:08:20 -0700 (PDT) X-Google-Smtp-Source: AIpwx4987091BebaN5MA87qb0Ig1X8R75qfcaRFEMQu/fxPxTP3cLhT0ZHQhyE4+fx6KWvclYzUf X-Received: by 10.99.160.106 with SMTP id u42mr23420643pgn.389.1524672500736; Wed, 25 Apr 2018 09:08:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524672500; cv=none; d=google.com; s=arc-20160816; b=q0fFSbx46An7JR4oenj0uGTJ6mhoaQqHGqFWHTjv7mFZVn0VKWJkZXxWWz5hKynRmx AcI66kmQOUWtv4cLo5rurkl+pfDhFjf2Ei7dvd78mZ6XMkUfhlr55P/hcPRDg6XKlWEC vwVpG78XljT393Evf5BK6Z0Ia4CoyxxMatqXTmAIIGdAbZ31F3nmB5nTg4ilc3Wt9a7Q cJ2IHkNXTqayrJ2rfjmytUGyIcx0B/iTTeOzRbg8YKakPE5f45It3+SR07aM3wgKCr0Z YE40Qpxx3gQ37+oReWTdzv7s+Z8znPpsUMl70DmjZOJY1jb1jUfwsJWDXgofQzImIlc4 PWkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=uuTJJBPmiq7FiiekmP+6GeqRw58aJqhoEs1SjkTFUao=; b=jPdCKExoQvDLODIIHL34y93HJGn4QD0YvwrSdDgjchznG12vox60rf9FOZcYVWswNA 3MdjnnV28HPqKzgdevfQy3nkHVu6nmJu++Uf4JveAsgD1btPq4e5yGDPoLTzE3sJbSXD xUKItgLIVbqFGFYNF5yRrnQveyO21Cn2otztFTa1BNFmKaoT5p7ce7ARLkcBKh3SLBkM 2RdfiZENvYNEaD7IPadMRhcwZa71kJtMRey4c+He2eblZpcMUEyeG6KachqNe84EtGNP htZ/AC9siUAppdgMjl3ps92tbwDzMlKUpFbQ4wgWPLnwb53JxBVJuywmri0b1mAlSmXh O/Tw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g9si15704395pfi.113.2018.04.25.09.08.04; Wed, 25 Apr 2018 09:08:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932214AbeDYQG4 (ORCPT + 99 others); Wed, 25 Apr 2018 12:06:56 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:56840 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755820AbeDYQGx (ORCPT ); Wed, 25 Apr 2018 12:06:53 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 29CBC93E; Wed, 25 Apr 2018 16:06:51 +0000 (UTC) Date: Wed, 25 Apr 2018 18:06:45 +0200 From: Greg Kroah-Hartman To: Geert Uytterhoeven Cc: Russell King , Adrian Salido , Nicolai Stange , Sasha Levin , Todd Kjos , linux-kernel@vger.kernel.org Subject: Re: [PATCH v2 2/4] ARM: amba: Fix race condition with driver_override Message-ID: <20180425160645.GA16732@kroah.com> References: <1523366506-19832-1-git-send-email-geert+renesas@glider.be> <1523366506-19832-3-git-send-email-geert+renesas@glider.be> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1523366506-19832-3-git-send-email-geert+renesas@glider.be> User-Agent: Mutt/1.9.5 (2018-04-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 10, 2018 at 03:21:44PM +0200, Geert Uytterhoeven wrote: > The driver_override implementation is susceptible to a race condition > when different threads are reading vs storing a different driver > override. Add locking to avoid this race condition. > > Cfr. commits 6265539776a0810b ("driver core: platform: fix race > condition with driver_override") and 9561475db680f714 ("PCI: Fix race > condition with driver_override"). > > Fixes: 3cf385713460eb2b ("ARM: 8256/1: driver coamba: add device binding path 'driver_override'") > Signed-off-by: Geert Uytterhoeven > Reviewed-by: Todd Kjos > Cc: stable > --- > drivers/amba/bus.c | 11 +++++++++-- > 1 file changed, 9 insertions(+), 2 deletions(-) > > diff --git a/drivers/amba/bus.c b/drivers/amba/bus.c > index 6ffd778352e6d953..36c5653ced5742b7 100644 > --- a/drivers/amba/bus.c > +++ b/drivers/amba/bus.c > @@ -69,8 +69,12 @@ static ssize_t driver_override_show(struct device *_dev, > struct device_attribute *attr, char *buf) > { > struct amba_device *dev = to_amba_device(_dev); > + ssize_t len; > > - return sprintf(buf, "%s\n", dev->driver_override); > + device_lock(_dev); > + len = sprintf(buf, "%s\n", dev->driver_override); > + device_unlock(_dev); > + return len; > } > > static ssize_t driver_override_store(struct device *_dev, > @@ -78,7 +82,7 @@ static ssize_t driver_override_store(struct device *_dev, > const char *buf, size_t count) > { > struct amba_device *dev = to_amba_device(_dev); > - char *driver_override, *old = dev->driver_override, *cp; > + char *driver_override, *old, *cp; > > if (count > PATH_MAX) > return -EINVAL; > @@ -91,12 +95,15 @@ static ssize_t driver_override_store(struct device *_dev, > if (cp) > *cp = '\0'; > > + device_lock(_dev); > + old = dev->driver_override; > if (strlen(driver_override)) { > dev->driver_override = driver_override; > } else { > kfree(driver_override); > dev->driver_override = NULL; > } > + device_unlock(_dev); > > kfree(old); > > -- > 2.7.4 As this should go to stable kernels, I've fixed it up to apply without patch 1 as that's not a real "fix" that anyone needs... Please try to remember to put fixes first, and then "trivial" things later on in a series. thanks, greg k-h