Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp6093795pxb; Mon, 8 Nov 2021 03:06:40 -0800 (PST) X-Google-Smtp-Source: ABdhPJyUkvq9rH5aZiTzGjDQ+YYePoaLnjqpFxeSn/p0jbqHglxmBJk+6o43S0uodTey9ycTXmmw X-Received: by 2002:a17:906:6549:: with SMTP id u9mr95676602ejn.514.1636369599988; Mon, 08 Nov 2021 03:06:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1636369599; cv=none; d=google.com; s=arc-20160816; b=X44MfDdnBDHtgFeUHvNutvljpx2xprDM9BbgqmFh4sxnvcJbrrYfo7CkrSOTB/Yckd dXOuBQogXxHnSvr90Iw54looByAabeUtiLl9ZVBVyazlwlCAwvQM2gWuowUZ5vuM01i0 2S8C323bZ7yfPEusMYiGfvp9npQEnI45PXnDNPM5FaXnQv391bsd9LZzAn+lOCYLKa8K 7j2ndEVGn8iHweAIFzR+ciA9BfFzsQnJLTXLBQThG3c725hxAdFY+rOtqILil75+y1Re l17Hnr94JdgCgmmGTQhjaUa29bOsFFy0u5NcNHTM+56TjYQmx2Ui1mrVEAACglMkOvOx 6Vbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=sfLOFYBNA8coitW65U96Y3xRuao7lTAbltMz3H2zQ1g=; b=afn06oKNqVbZ2snPgafZaEhlQ+wayTbbu6sbTgSlblm3uqbc6Z/xo0D4lffSjecWuZ 5p8Ya/WloQ8phipNvkiuFspUdCIPTOyXfgAgU2CkbNG50i13NKF3rTlieUjltlpjTB4y xLOb0yhY+tYNRjSHDxfp6e1s0ewHUQV1ObSpjFmrjL7FRJq2WbDiVjL4XPdiy0lLcGGG xs7ALaz94vSWg7ggMJ0waCF0xTiUF6IjjMkZDvLjt6Gc9XjRZTmDJMpNakmTvP+dKcvj otVif8doB3wo1kUVxpEAuczTxzgwbcgu1o4T/+2274VRc+DMnL1AQfeKwGOyaNIbgaUA b2ug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id js5si10316090ejc.656.2021.11.08.03.06.16; Mon, 08 Nov 2021 03:06:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236097AbhKHGVD (ORCPT + 99 others); Mon, 8 Nov 2021 01:21:03 -0500 Received: from mga07.intel.com ([134.134.136.100]:43721 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229807AbhKHGVA (ORCPT ); Mon, 8 Nov 2021 01:21:00 -0500 X-IronPort-AV: E=McAfee;i="6200,9189,10161"; a="295611078" X-IronPort-AV: E=Sophos;i="5.87,217,1631602800"; d="scan'208";a="295611078" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Nov 2021 22:18:16 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.87,217,1631602800"; d="scan'208";a="491091846" Received: from allen-box.sh.intel.com ([10.239.159.118]) by orsmga007.jf.intel.com with ESMTP; 07 Nov 2021 22:18:13 -0800 From: Lu Baolu To: Joerg Roedel , Will Deacon Cc: Ashish Mhetre , Jason Gunthorpe , kevin.tian@intel.com, ashok.raj@intel.com, iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Lu Baolu Subject: [PATCH 1/1] iommu: Extend mutex lock scope in iommu_probe_device() Date: Mon, 8 Nov 2021 14:13:49 +0800 Message-Id: <20211108061349.1985579-1-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Extend the scope of holding group->mutex so that it can cover the default domain check/attachment and direct mappings of reserved regions. Cc: Ashish Mhetre Fixes: 211ff31b3d33b ("iommu: Fix race condition during default domain allocation") Signed-off-by: Lu Baolu --- drivers/iommu/iommu.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index dd7863e453a5..8b86406b7162 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -288,11 +288,11 @@ int iommu_probe_device(struct device *dev) */ mutex_lock(&group->mutex); iommu_alloc_default_domain(group, dev); - mutex_unlock(&group->mutex); if (group->default_domain) { ret = __iommu_attach_device(group->default_domain, dev); if (ret) { + mutex_unlock(&group->mutex); iommu_group_put(group); goto err_release; } @@ -300,6 +300,7 @@ int iommu_probe_device(struct device *dev) iommu_create_device_direct_mappings(group, dev); + mutex_unlock(&group->mutex); iommu_group_put(group); if (ops->probe_finalize) -- 2.25.1