Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp1863555rwb; Fri, 19 Aug 2022 10:38:32 -0700 (PDT) X-Google-Smtp-Source: AA6agR5rMiiuBgt7MphAxu+fTL2J/qprBCq7Gz0At+oMJROlFgtfYjYZNXRr4HuF59c1dtDuXZM6 X-Received: by 2002:a17:90b:38c8:b0:1fa:c125:bd9b with SMTP id nn8-20020a17090b38c800b001fac125bd9bmr12000571pjb.219.1660930711743; Fri, 19 Aug 2022 10:38:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660930711; cv=none; d=google.com; s=arc-20160816; b=Kd6WvyHVzH1CXXBXup16kGp7DCa5o3D+CnMfKWkx95OobuCuEnIHm1BchHYlxQvr2h nfgB5GUOfB1JgLnlyARjPLPdIzepYK6uo68pIyGlaOSGok7NBnI/jkoB5Ohw+he7w9RH Sv46fBij/YSmzrkcsjnwyciEvDFW44soExBq5HabxRxRycwylOnIxW8xnYFbYSrC9uMy QcXAHuvrgUwL9JDRdbwrFmQps96dxNIcVnsi0LdPMwf30oY0TK1DnLHXtH8PbOMhKzw9 UCOYfctJ80N0k1qU/R8Jeo8tQC+u3Y7jbHyqh6q9S3NuuLAh6LeRaLV2QCWwYgV0ajBj H8Xg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=QbBWWilInTjrtqSgOS9AVQewBHKlNZeKe7SdyBsKsLI=; b=ZQfzIC+/+A/cHEtnW+nimz6BU+/llKwASpC3FTUL2hiF8K9WSnnEug4kiFw5W03Hrn S2y5mXx6X5PC6llyhtLyCAooCL4AfM1vSxXGEl2/0NiuZ2iZzVQIUIfj6vDP4Nss6N4j Ln/x1pEvf+NUM3gpbOAmiKdvMiti0gRuq/K77o3Trbxhz5wZcsQo0N/Bzb24cybldtWJ l+I+lObwL8nBCVN1jnYpeKmClgNGDYsDZ8c+c7gGz+sW3W8nQcg1LjE4NrZTFxfdpIzZ rpx8rFUOU5/TvD4Kx+BP0Rztp1sr2vrjL8DEmoaXzYqvsdbdg37TKJeAEnkdcBzbAZ7G zA8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Yy2gfx3e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f1-20020a056a00228100b00534f2eff1d3si1379262pfe.173.2022.08.19.10.38.19; Fri, 19 Aug 2022 10:38:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Yy2gfx3e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350483AbiHSP5m (ORCPT + 99 others); Fri, 19 Aug 2022 11:57:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40678 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1350903AbiHSP4A (ORCPT ); Fri, 19 Aug 2022 11:56:00 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 26797105F24; Fri, 19 Aug 2022 08:50:44 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 26B7BB8280F; Fri, 19 Aug 2022 15:50:41 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8D3F9C433D6; Fri, 19 Aug 2022 15:50:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1660924239; bh=4pNbcfBY7sSXixtKDEXaS8TRXL9OvdOoDNaQXO+z7ao=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Yy2gfx3ebm06IqvRg7V3RvLTqjfeB27/9OCi4b6L4LG8yTiLU3zL+e66ZyFuE8g1O T7bBpYqE0HTyB40vt0sICyz/YIPZMEaN4RF5Qby+Hax9eVCf4cB5D14TddQNDi3bpf GZyzMGi4sBHC3tjTPzzdRj532iTnmJY+SD5DBXCI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Uwe=20Kleine-K=C3=B6nig?= , Guenter Roeck , Sasha Levin Subject: [PATCH 5.10 103/545] hwmon: (sht15) Fix wrong assumptions in device remove callback Date: Fri, 19 Aug 2022 17:37:53 +0200 Message-Id: <20220819153833.892684504@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220819153829.135562864@linuxfoundation.org> References: <20220819153829.135562864@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Uwe Kleine-König [ Upstream commit 7d4edccc9bbfe1dcdff641343f7b0c6763fbe774 ] Taking a lock at the beginning of .remove() doesn't prevent new readers. With the existing approach it can happen, that a read occurs just when the lock was taken blocking the reader until the lock is released at the end of the remove callback which then accessed *data that is already freed then. To actually fix this problem the hwmon core needs some adaption. Until this is implemented take the optimistic approach of assuming that all readers are gone after hwmon_device_unregister() and sysfs_remove_group() as most other drivers do. (And once the core implements that, taking the lock would deadlock.) So drop the lock, move the reset to after device unregistration to keep the device in a workable state until it's deregistered. Also add a error message in case the reset fails and return 0 anyhow. (Returning an error code, doesn't stop the platform device unregistration and only results in a little helpful error message before the devm cleanup handlers are called.) Signed-off-by: Uwe Kleine-König Link: https://lore.kernel.org/r/20220725194344.150098-1-u.kleine-koenig@pengutronix.de Signed-off-by: Guenter Roeck Signed-off-by: Sasha Levin --- drivers/hwmon/sht15.c | 17 ++++++----------- 1 file changed, 6 insertions(+), 11 deletions(-) diff --git a/drivers/hwmon/sht15.c b/drivers/hwmon/sht15.c index 7f4a63959730..ae4d14257a11 100644 --- a/drivers/hwmon/sht15.c +++ b/drivers/hwmon/sht15.c @@ -1020,25 +1020,20 @@ static int sht15_probe(struct platform_device *pdev) static int sht15_remove(struct platform_device *pdev) { struct sht15_data *data = platform_get_drvdata(pdev); + int ret; - /* - * Make sure any reads from the device are done and - * prevent new ones beginning - */ - mutex_lock(&data->read_lock); - if (sht15_soft_reset(data)) { - mutex_unlock(&data->read_lock); - return -EFAULT; - } hwmon_device_unregister(data->hwmon_dev); sysfs_remove_group(&pdev->dev.kobj, &sht15_attr_group); + + ret = sht15_soft_reset(data); + if (ret) + dev_err(&pdev->dev, "Failed to reset device (%pe)\n", ERR_PTR(ret)); + if (!IS_ERR(data->reg)) { regulator_unregister_notifier(data->reg, &data->nb); regulator_disable(data->reg); } - mutex_unlock(&data->read_lock); - return 0; } -- 2.35.1