Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp801762pxp; Fri, 11 Mar 2022 15:31:46 -0800 (PST) X-Google-Smtp-Source: ABdhPJysSrfxywyE1q2eMROmh4zFL2ictNJrMijwMJMhZitI7yn4lFrx57jboO7atJSikiMNAYW+ X-Received: by 2002:a17:903:4083:b0:153:4103:542d with SMTP id z3-20020a170903408300b001534103542dmr3123037plc.160.1647041505817; Fri, 11 Mar 2022 15:31:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1647041505; cv=none; d=google.com; s=arc-20160816; b=Zze5eym2Grx3Mnmweb3WAVk1QeE2l11JC9td2cdoeYdR973CZ+Y+1yum7kaYW8uJTh sme56dysRvGrkPzSYvluhk0wKxZ6UAMliujouZ425ME3KKNZQlgKZKgAxFKmJBEKZ9+L QLMPacEdVRey1PudoAUEvsP/G/lRhNfweNMiqKQ6fbbHte7lAIERC3M96B8YuJVJyB0e c4/qYFXy+SuG6zL6SY4CgiBh4rU4WrCX/HO6fuWSVtzCp+UEs2H3CFsIOI8yXU4fhuvj OydF1rcSTmwaAo0av+XZs9Rg7w8u3o+EPuwza61/u2lW0HOI2i5dcRoE5/PQ3jNBJvbe /p5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=EoGq7CQCvilBzLF7EBvLt44/XMCx9ydzBEATyyna41M=; b=ZH6/xTcReYMewN71Mr7BAG1bEKMOrKdhe1+C5gj0rtp6KYKSUv1WPCZkz+e7VS7lHm SSpOj7UjphgGw+5bvDGXX9+4Ee5sz8l+RVqZVwqtXIo/m3I2e7RmQhDYIwrWYqbCPtNj hZwzZf/gOV95p4kzlj5xOWr5G15NBRcvIIxzbSMGQkOQ2qDBMZb/UR1rzaCUosz8/A5Q ITsPOwGsHbB0K8m5aeVwaP/F5J6RbvnnUCmJvh8c+Vf2oer3FXHTaZeZO/Txy811v7dE ebl1DXA8lEOkqgupgEf2oiJiFJjKnq6yU3lkrD84AFTj8rrYrPLQQL+iL0I4SsVQwyak SZCA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=CKKJLhM3; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id j11-20020a62800b000000b004f78c5051dasi2923705pfd.209.2022.03.11.15.31.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 11 Mar 2022 15:31:45 -0800 (PST) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=CKKJLhM3; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 953F53D230E; Fri, 11 Mar 2022 14:18:19 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230040AbiCKUyE (ORCPT + 99 others); Fri, 11 Mar 2022 15:54:04 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55158 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230048AbiCKUyA (ORCPT ); Fri, 11 Mar 2022 15:54:00 -0500 Received: from mail-ot1-x32b.google.com (mail-ot1-x32b.google.com [IPv6:2607:f8b0:4864:20::32b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 19C7343ADF for ; Fri, 11 Mar 2022 12:52:48 -0800 (PST) Received: by mail-ot1-x32b.google.com with SMTP id k9-20020a056830242900b005ad25f8ebfdso7096879ots.7 for ; Fri, 11 Mar 2022 12:52:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=EoGq7CQCvilBzLF7EBvLt44/XMCx9ydzBEATyyna41M=; b=CKKJLhM3DL0STMT/zHMYyuQkf7SjzNu9GIO9XEDKVh6oPrb8hpH8CDIv32r2mMmodO OC0AXhq5oIUdcxLhu3S1kRXRl3KfkRZdrKoQonU/m+d7VeqYOA4SsEdC7qRz8Pdy9brt e6vHcthX3R55CCIZKRCwOpe8BhDcghibEyq/qUu6KKZIuDlTVhhTo2VsRhFLBhF2SL6q ARrVGlenbvXoXn4K3QM050iftag/43xdBuhk+JNoNivjvDJ+bgGMaNiijFCS1rntcrqT C2S2qT/f4accnWi7ioLEfEkhQbiTz06Y5ccVkIdpii1rRDEH+dLuTh9Knz875k1KHaAA kvnA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=EoGq7CQCvilBzLF7EBvLt44/XMCx9ydzBEATyyna41M=; b=my9Urxv++8nsdSmXDmsGexEgQ5P16cKk00N8lMRttPKOGZoQScaQWMhvN4fsnzwEMS 7MUyg2yU23ShvZ9wznRpWtPcj4uJTNTNa8nZjE0pMgktPXhZ1ZQSK21Js66k/SiPKu9Z OaAFnz+d7wa+NV79tC0kxUo/4neqQJSil3AmJ3tdUzkw7NN2ZhyuFwh0mLaKjkaEJhtF JuFtQ1xmJVPHLvk2bTo20oihQjfMOKnNQcDutM/PLC03CJGi3Kyziy6Ik9VyaUn+y36n vg6HzCE8ou9ZFBllt28sTKtAAmVDkbJAGkTr+B60/DNnaMJ5L1ExPIcd/GL259+2xmC8 RHsg== X-Gm-Message-State: AOAM5330x5v9FFnk4wWXqwGzWtFcbwHdqSQ3vCl6gzBHS8wuwvbtsPWS pyp4A6+DuGhoHRW3OySc0CV0QDm5quaYKg== X-Received: by 2002:a05:6830:1394:b0:5af:6776:ea37 with SMTP id d20-20020a056830139400b005af6776ea37mr5808079otq.80.1647031967989; Fri, 11 Mar 2022 12:52:47 -0800 (PST) Received: from builder.lan ([2600:1700:a0:3dc8:3697:f6ff:fe85:aac9]) by smtp.gmail.com with ESMTPSA id y66-20020a9d22c8000000b005c943ff75dbsm825295ota.7.2022.03.11.12.52.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 11 Mar 2022 12:52:47 -0800 (PST) Date: Fri, 11 Mar 2022 14:52:45 -0600 From: Bjorn Andersson To: Deepak Kumar Singh Cc: swboyd@chromium.org, quic_clew@quicinc.com, mathieu.poirier@linaro.org, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-remoteproc@vger.kernel.org, Ohad Ben-Cohen Subject: Re: [PATCH V1 2/3] rpmsg: glink: Add lock to avoid race when rpmsg device is released Message-ID: References: <1643223886-28170-1-git-send-email-quic_deesin@quicinc.com> <1643223886-28170-3-git-send-email-quic_deesin@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1643223886-28170-3-git-send-email-quic_deesin@quicinc.com> X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 26 Jan 13:04 CST 2022, Deepak Kumar Singh wrote: > When remote host goes down glink char device channel is freed, > At the same time user space apps can still try to open rpmsg_char > device which will result in calling rpmsg_create_ept. This may cause > reference to already freed context of glink chardev channel. > Hi Deepak, Could you please be a little bit more specific on the details of where you're seeing this race? Perhaps I'm just missing something obvious? > Use per ept lock to avoid race between rpmsg_destroy_ept and > rpmsg_destory_ept. I presume one of these should say rpmsg_eptdev_open(). Regards, Bjorn > --- > drivers/rpmsg/rpmsg_char.c | 12 ++++++++++++ > 1 file changed, 12 insertions(+) > > diff --git a/drivers/rpmsg/rpmsg_char.c b/drivers/rpmsg/rpmsg_char.c > index 72ee101..2108ef8 100644 > --- a/drivers/rpmsg/rpmsg_char.c > +++ b/drivers/rpmsg/rpmsg_char.c > @@ -85,6 +85,7 @@ static int rpmsg_eptdev_destroy(struct device *dev, void *data) > struct rpmsg_eptdev *eptdev = dev_to_eptdev(dev); > > mutex_lock(&eptdev->ept_lock); > + eptdev->rpdev = NULL; > if (eptdev->ept) { > rpmsg_destroy_ept(eptdev->ept); > eptdev->ept = NULL; > @@ -145,15 +146,24 @@ static int rpmsg_eptdev_open(struct inode *inode, struct file *filp) > > get_device(dev); > > + mutex_lock(&eptdev->ept_lock); > + if (!eptdev->rpdev) { > + put_device(dev); > + mutex_unlock(&eptdev->ept_lock); > + return -ENETRESET; > + } > + > ept = rpmsg_create_ept(rpdev, rpmsg_ept_cb, eptdev, eptdev->chinfo); > if (!ept) { > dev_err(dev, "failed to open %s\n", eptdev->chinfo.name); > + mutex_unlock(&eptdev->ept_lock); > put_device(dev); > return -EINVAL; > } > > ept->sig_cb = rpmsg_sigs_cb; > eptdev->ept = ept; > + mutex_unlock(&eptdev->ept_lock); > filp->private_data = eptdev; > > return 0; > @@ -285,7 +295,9 @@ static __poll_t rpmsg_eptdev_poll(struct file *filp, poll_table *wait) > if (eptdev->sig_pending) > mask |= EPOLLPRI; > > + mutex_lock(&eptdev->ept_lock); > mask |= rpmsg_poll(eptdev->ept, filp, wait); > + mutex_unlock(&eptdev->ept_lock); > > return mask; > } > -- > 2.7.4 >