Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2470118imm; Mon, 24 Sep 2018 05:04:07 -0700 (PDT) X-Google-Smtp-Source: ACcGV60QfhH3OdCXc6/5S/qpP+27boQWSOdgLDpXhtxn43fNlcpBTWqgqAopsAtyfQfHcQch1JXu X-Received: by 2002:a17:902:bd04:: with SMTP id p4-v6mr2648341pls.265.1537790647301; Mon, 24 Sep 2018 05:04:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537790647; cv=none; d=google.com; s=arc-20160816; b=X/8vK17109htA31UJgkVAn57DE/KqOzfXHC4sUTZyTaPSkKf10402ZBRwbsJLQodbg hclkb7mjj4GY3/9YrpiPngWRb46OTuKtw04XqFHkdkxS9yWkiqtESfqW9eSrsTcwBHSW 7ycPi9KdqwjMItnQpzdQEO7kXnDEytMC5UOc58WjQFbHRyl3kpf3UAa7iUVRuW53E9A9 C7OQbUPgeDyBKfoTFPMVCmMdsmIEMo+DeHa1lnNSjzdmbead5Ljs3TrJ66MR0aNRG7Af uut97pKtlLBIhc9i3522bTFber3AP8svdmiGcWc4ZaqHughWvgcC7hLOIf2Ep6yg/1m+ Ouyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from; bh=xSJuDB8Qinsm8zay2ZHxNUWtkIAIDQyz99aEvnzK0wo=; b=Juyd32QvcZbhbW7wwRzhYGBgqBUe7KTAxkS87XXCMi7HKlyKsXim6igA2dUwhfl905 Mse4YA3JEQndMErA1B9hau9HTmEmap4Xh8airyXMY3qVvo9D+K4J+7Vs67bryxeM+e24 BgmyahUeeD9VsMN/VEKQ2j/jY8GbVf9bnUSKrh9NoKJDU3Vu8EXvxpH4cQy8WN++goGE V/qXRmhZOBgoqlRnYyDJXHjuPQklaqFK/EM/2oVAPiM5vlxk2UYZT7R33t4sFIjH7nMY iBe6PqmhJiHR63DZ7vR9p4BcqvIM3/2jCQYYU0VY2iwY4bKvoJOmnlhQV5eVQ0BWf0BN Vlfg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g15-v6si33198930plq.243.2018.09.24.05.03.52; Mon, 24 Sep 2018 05:04:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730778AbeIXSD2 (ORCPT + 99 others); Mon, 24 Sep 2018 14:03:28 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:53618 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729750AbeIXSD1 (ORCPT ); Mon, 24 Sep 2018 14:03:27 -0400 Received: from localhost (ip-213-127-77-73.ip.prioritytelecom.net [213.127.77.73]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 5B5621080; Mon, 24 Sep 2018 12:01:40 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pingfan Liu , "Rafael J. Wysocki" , Sasha Levin Subject: [PATCH 4.9 043/111] drivers/base: stop new probing during shutdown Date: Mon, 24 Sep 2018 13:52:10 +0200 Message-Id: <20180924113109.233881162@linuxfoundation.org> X-Mailer: git-send-email 2.19.0 In-Reply-To: <20180924113103.337261320@linuxfoundation.org> References: <20180924113103.337261320@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Pingfan Liu [ Upstream commit 3297c8fc65af5d40501ea7cddff1b195cae57e4e ] There is a race window in device_shutdown(), which may cause -1. parent device shut down before child or -2. no shutdown on a new probing device. For 1st, taking the following scenario: device_shutdown new plugin device list_del_init(parent_dev); spin_unlock(list_lock); device_add(child) probe child shutdown parent_dev --> now child is on the tail of devices_kset For 2nd, taking the following scenario: device_shutdown new plugin device device_add(dev) device_lock(dev); ... device_unlock(dev); probe dev --> now, the new occurred dev has no opportunity to shutdown To fix this race issue, just prevent the new probing request. With this logic, device_shutdown() is more similar to dpm_prepare(). Signed-off-by: Pingfan Liu Reviewed-by: Rafael J. Wysocki Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/base/core.c | 3 +++ 1 file changed, 3 insertions(+) --- a/drivers/base/core.c +++ b/drivers/base/core.c @@ -2072,6 +2072,9 @@ void device_shutdown(void) { struct device *dev, *parent; + wait_for_device_probe(); + device_block_probing(); + spin_lock(&devices_kset->list_lock); /* * Walk the devices list backward, shutting down each in turn.