Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp5466282pxu; Tue, 22 Dec 2020 19:00:21 -0800 (PST) X-Google-Smtp-Source: ABdhPJxTOy+pkvY8fhvcaU+zoRem2rLWj6ak79qj5UdAnnhUGcVcB51ssWp8OYOmp4XKhhrx2XpY X-Received: by 2002:a17:906:259a:: with SMTP id m26mr22654882ejb.399.1608692421524; Tue, 22 Dec 2020 19:00:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608692421; cv=none; d=google.com; s=arc-20160816; b=uu7y4f96c4lIFoRl2BNaBFCHodvJhEhfcyDf5KqxZROugciumyGo8BcOVA6qinCICO BKpURHZy2vJmGdNPsPXQqvZOLUaWyLjthH8w/AiON9/IO/12mhQxTZP0wgrNA9xJVw+4 c1nmDtpR6/9byl3dmrQLLA5v7tAbIRgPrvVw1keVaz2FrLOZ/+fMdr9sagwLLZc7UWnX N+TNNXhr3y7DVJfUrYfToudkPV2K3l2H6S4TAaQcsDEg/KLcnNOF1g3m+gSRc8zKgbT+ tfF4Wl9v+Alw1UX8scKfPw6e/2hvBkPBcAV0DzRHpGmbcczTrI3Ogi7i2bxdkNANXXJu OjmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=UZ8ay+wL5KFekr8hjB5MUkzGidroV5VkGID/ecWn1Io=; b=zFsimb3ZNfI7uN/N4WVNlGv3Wwuo1qwySAQCaRtI2Kq0EPPnvT0kOiJSVurtA0oG44 6aLFJV21p9tIXZq9Sv9IdyNYYKDvsxnIBlZu7mfJf266RSWWArcgW//VTfiOrRtq8cO9 WiwEaZQBAPfSZBXPADwsVeDApyoFkx68r1/noX5iQuOJAcLVrN47m/+ub0qBjWt7wv9N DjhVNQsLhqWgZiz2B3/REJ3GxWB441x8CRizwk6PYmqezNOhaTppYDhx5ZDzZFSL1TOr Vw4LJaWc4FN5mVy7tCnZci2Wb3zRvh2iaxijdeyl/8+PLUgSOSdV6Si2+829hEYTlfKH WdZg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RELys2dV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id am1si10852705ejc.463.2020.12.22.18.59.59; Tue, 22 Dec 2020 19:00:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RELys2dV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729020AbgLWCUe (ORCPT + 99 others); Tue, 22 Dec 2020 21:20:34 -0500 Received: from mail.kernel.org ([198.145.29.99]:45428 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728819AbgLWCT7 (ORCPT ); Tue, 22 Dec 2020 21:19:59 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4EE61225AB; Wed, 23 Dec 2020 02:19:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1608689984; bh=ESDOidCTiUNEdcaAW0GLG4M5bunsCs4flgEgwwblDRw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RELys2dV+q8QbeesCyVNdtS9T1Oz8WYv1vHG9NUFlTXR8zuknyLGWdJjSLXgBvOcu SRSxbVc30KKaEpW2Tf+MeZ2SI7XnM3UzgiV8Pxv/kPJX0THRnF3fc/dLLEWUYcCn4M 8jceQyGKkqjiJI6Cjw7zcA6gyJdVBR+sEDZCXaqCgm5x5gWD5bZAuzI5gvnvmyYhuM wWwDWV9AcN+TO1GI8XbZszhOBv6R7JD0+Cb0fq2u1yZ9bNyFJC8gzs6zR2MzC7PwQ/ VPtAvMk3dyQdYIEMeqczsLuIXGko7gjeEStH3BM4rLuIHo7lggl88xAtuF0Z6kHc9h 5rVB47Rdf0+Tw== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Nicolin Chen , Dmitry Osipenko , Thierry Reding , Will Deacon , Sasha Levin , linux-tegra@vger.kernel.org, iommu@lists.linux-foundation.org Subject: [PATCH AUTOSEL 5.4 070/130] iommu/tegra-smmu: Expand mutex protection range Date: Tue, 22 Dec 2020 21:17:13 -0500 Message-Id: <20201223021813.2791612-70-sashal@kernel.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20201223021813.2791612-1-sashal@kernel.org> References: <20201223021813.2791612-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicolin Chen [ Upstream commit d5f583bf8654c231b781096bc1a186065cda72b3 ] This is used to protect potential race condition at use_count. since probes of client drivers, calling attach_dev(), may run concurrently. Signed-off-by: Nicolin Chen Tested-by: Dmitry Osipenko Reviewed-by: Dmitry Osipenko Acked-by: Thierry Reding Link: https://lore.kernel.org/r/20201125101013.14953-3-nicoleotsuka@gmail.com Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- drivers/iommu/tegra-smmu.c | 34 +++++++++++++++++++++------------- 1 file changed, 21 insertions(+), 13 deletions(-) diff --git a/drivers/iommu/tegra-smmu.c b/drivers/iommu/tegra-smmu.c index dd486233e2828..41be3e2202971 100644 --- a/drivers/iommu/tegra-smmu.c +++ b/drivers/iommu/tegra-smmu.c @@ -247,26 +247,19 @@ static int tegra_smmu_alloc_asid(struct tegra_smmu *smmu, unsigned int *idp) { unsigned long id; - mutex_lock(&smmu->lock); - id = find_first_zero_bit(smmu->asids, smmu->soc->num_asids); - if (id >= smmu->soc->num_asids) { - mutex_unlock(&smmu->lock); + if (id >= smmu->soc->num_asids) return -ENOSPC; - } set_bit(id, smmu->asids); *idp = id; - mutex_unlock(&smmu->lock); return 0; } static void tegra_smmu_free_asid(struct tegra_smmu *smmu, unsigned int id) { - mutex_lock(&smmu->lock); clear_bit(id, smmu->asids); - mutex_unlock(&smmu->lock); } static bool tegra_smmu_capable(enum iommu_cap cap) @@ -404,17 +397,21 @@ static int tegra_smmu_as_prepare(struct tegra_smmu *smmu, struct tegra_smmu_as *as) { u32 value; - int err; + int err = 0; + + mutex_lock(&smmu->lock); if (as->use_count > 0) { as->use_count++; - return 0; + goto unlock; } as->pd_dma = dma_map_page(smmu->dev, as->pd, 0, SMMU_SIZE_PD, DMA_TO_DEVICE); - if (dma_mapping_error(smmu->dev, as->pd_dma)) - return -ENOMEM; + if (dma_mapping_error(smmu->dev, as->pd_dma)) { + err = -ENOMEM; + goto unlock; + } /* We can't handle 64-bit DMA addresses */ if (!smmu_dma_addr_valid(smmu, as->pd_dma)) { @@ -437,24 +434,35 @@ static int tegra_smmu_as_prepare(struct tegra_smmu *smmu, as->smmu = smmu; as->use_count++; + mutex_unlock(&smmu->lock); + return 0; err_unmap: dma_unmap_page(smmu->dev, as->pd_dma, SMMU_SIZE_PD, DMA_TO_DEVICE); +unlock: + mutex_unlock(&smmu->lock); + return err; } static void tegra_smmu_as_unprepare(struct tegra_smmu *smmu, struct tegra_smmu_as *as) { - if (--as->use_count > 0) + mutex_lock(&smmu->lock); + + if (--as->use_count > 0) { + mutex_unlock(&smmu->lock); return; + } tegra_smmu_free_asid(smmu, as->id); dma_unmap_page(smmu->dev, as->pd_dma, SMMU_SIZE_PD, DMA_TO_DEVICE); as->smmu = NULL; + + mutex_unlock(&smmu->lock); } static int tegra_smmu_attach_dev(struct iommu_domain *domain, -- 2.27.0