Received: by 2002:a05:6358:701b:b0:131:369:b2a3 with SMTP id 27csp4696212rwo; Tue, 25 Jul 2023 09:35:55 -0700 (PDT) X-Google-Smtp-Source: APBJJlEQmPyrVamYUZKno9vxmWgxPv6ii+A8PnJtA6QBsVR/E2FZUANtiMWEiYXS0AhgINnufwl6 X-Received: by 2002:aa7:d502:0:b0:521:8d64:df1c with SMTP id y2-20020aa7d502000000b005218d64df1cmr12322260edq.0.1690302955225; Tue, 25 Jul 2023 09:35:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690302955; cv=none; d=google.com; s=arc-20160816; b=ghh5XSWMJsiwuPf29DPXzppK6R+AZbtHi5LhCDxEtVX3ULNbrP63gQWLpIvCYVOIGA SdhcQo1yWenzZ7ox80+96J6+gfDunKSYNS4SyHwfpMruP5FlKLF+llfyvfOOxzglEV6M +UQ9kOaDpfLV5y4/PxXCTFCAiYLisH6P59aOWYms8n/YOvGvPoV347zaOSCDyrxMuwKv C9EVPotx3/uFm6WHDiw7LuAE5Dp6WUZqXx7Yq/0MOW/vgt3VnQqqa2gL/PBNKQGnxLJE mnyKjPFffITqff0//4Q3Qnu9/AVstJExRl5QRf5XSqN626L2tFO89gF1R0zbSQ+z0zff 73hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=PNM2+wxeZARzSkQ/4NLBTlxq8VR/UGI6SEgq0/2JQvs=; fh=KvbvaDiCzPancAhPXDOzqMlDvp8ImIkcjZBd+rkI/eA=; b=R5HI6bqfdbl6Tnzc/FoiiDkklU9atG3h4Gmnd4yTBhqNxW/VOmApDcejj7Wk6moh3o +QoNkJHCkr+prXNS3UvrIenFmdy15FrsaYu8aInksevKWbOL7PXvE7RA4VM0farH0J3U nZnpe1JN6gd2Ukc2g6LEm+pxbcBiKDcNAhNrMc3lOVh3Y1gg3fAXh2orKg2Vkrf+nN92 W8MzHS002rsVMIJ7OMszMJGkyCAWDgoUfw2j7CSRUTrBHPaKPYc4CVrPxgO1ErY4hQW4 cpOpWq2pTGfN+0Y/Hrt2Bcjxb5nrC0PDm9u1Eh9GBR1KvQgGifiGCky9IQVTFdUgVc+K 6GXw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=N7ovGpor; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s9-20020a056402164900b005223842d65fsi2692472edx.222.2023.07.25.09.35.31; Tue, 25 Jul 2023 09:35:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20221208 header.b=N7ovGpor; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232996AbjGYPz6 (ORCPT + 99 others); Tue, 25 Jul 2023 11:55:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36598 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232997AbjGYPzz (ORCPT ); Tue, 25 Jul 2023 11:55:55 -0400 Received: from mail-pf1-x435.google.com (mail-pf1-x435.google.com [IPv6:2607:f8b0:4864:20::435]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BE5B0211F; Tue, 25 Jul 2023 08:55:48 -0700 (PDT) Received: by mail-pf1-x435.google.com with SMTP id d2e1a72fcca58-666e5f0d60bso3261407b3a.3; Tue, 25 Jul 2023 08:55:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1690300548; x=1690905348; h=message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=PNM2+wxeZARzSkQ/4NLBTlxq8VR/UGI6SEgq0/2JQvs=; b=N7ovGporZk8JwJJGCKYIxsLfzgG0Hy/tvkZM1AWWvqjNR91WDbugxebDEp+p9FIHwx /mBJpy6Tcn68qVbbzZuKmch4mEIc34xZCCAmOvLli5axEGU9kUf3q0HG6nSal9HRgd5a cC2GedWhNUg+S843Ab8GC7yqjwWn/0usLJlpyJ1myeOM8GF/VjfFxBARhXmxF+jbfMuq nzN7z/+UoPSp1n4K6HLS3jg6LJfFU2tfLKZKnhjOuMFFsKRY1Z51qqqkskSpyo3+ik2k C/NzkVpKKjUxKntfdxyQ3ZrqHSpXTsLImCM5so6QtE6IBjDv0vrKTmRrtu+7eptv7mOq t4Nw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1690300548; x=1690905348; h=message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=PNM2+wxeZARzSkQ/4NLBTlxq8VR/UGI6SEgq0/2JQvs=; b=iFvCVEf1cNhusZhkGgsrbxgBLmY6jcSANNunaT02BeR2Ib+5IhOGGnHw90N04YqJ/X E0UXqj+LrwSByX+eFqME+sRKz10qKEzCEOn3+0MdbIEgRVNYhPyDdhX4PtWShMNkT4TW mWn8VtE/QhWgb6nAgEi55aIhEme18Z5QTSI65If+LkkgNqeRZpgRugwHevKBUDED1PjJ BvG0EVH4vOMFlqYteqGs7NfD1HruGzjl2BaLGU8n15H3BbZJc8JguP3wRGLJNAaIs2QO YORAZBo2IU4JmCbHdWO8XmBkoEMKVXB83Kxjg2KQdGybwvLbkjC4HKTdVj41i4nIOrlg TPaA== X-Gm-Message-State: ABy/qLZsAcva+OEvX2zRk0R5K9u9Kr/e24ZEhYktXrTTdLp2USW49Zwi peSpxm37d24WEqEfP8/k+ro= X-Received: by 2002:a05:6a00:1484:b0:675:70d7:1eb4 with SMTP id v4-20020a056a00148400b0067570d71eb4mr9800163pfu.14.1690300548068; Tue, 25 Jul 2023 08:55:48 -0700 (PDT) Received: from 377044c6c369.cse.ust.hk (191host097.mobilenet.cse.ust.hk. [143.89.191.97]) by smtp.gmail.com with ESMTPSA id a18-20020a62bd12000000b0064fd4a6b306sm9777443pff.76.2023.07.25.08.55.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 25 Jul 2023 08:55:47 -0700 (PDT) From: Chengfeng Ye To: mchehab@kernel.org, hverkuil-cisco@xs4all.nl, tiwai@suse.de Cc: linux-media@vger.kernel.org, linux-kernel@vger.kernel.org, Chengfeng Ye Subject: [PATCH] media: dvb-core: Fix potential deadlock on &dmxdevfilter->dev->lock Date: Tue, 25 Jul 2023 15:55:30 +0000 Message-Id: <20230725155530.63315-1-dg573847474@gmail.com> X-Mailer: git-send-email 2.17.1 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As &dmxdevfilter->dev->lock acquired by timer dvb_dmxdev_filter_timeout() softirq context, other acquisition of the same lock under process context should disable irq, otherwise deadlock could happen if the soft irq preempt the execution while the lock is held in process context on the same CPU. The dvb_dmxdev_section_callback() and dvb_dmxdev_ts_callback() callbacks acquires the lock without disabling irq inside the function. [Possible deadlock scenario] dvb_dmxdev_section_callback() -> spin_lock(&dmxdevfilter->dev->lock); -> dvb_dmxdev_filter_timeout() -> spin_lock_irq(&dmxdevfilter->dev->lock); This flaw was found by an experimental static analysis tool I am developing for irq-related deadlock. The tentative patch fixes the potential deadlock by spin_lock_bh() disable softirq. Signed-off-by: Chengfeng Ye --- drivers/media/dvb-core/dmxdev.c | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/drivers/media/dvb-core/dmxdev.c b/drivers/media/dvb-core/dmxdev.c index 9ce5f010de3f..e4b6427230ed 100644 --- a/drivers/media/dvb-core/dmxdev.c +++ b/drivers/media/dvb-core/dmxdev.c @@ -386,9 +386,9 @@ static int dvb_dmxdev_section_callback(const u8 *buffer1, size_t buffer1_len, wake_up(&dmxdevfilter->buffer.queue); return 0; } - spin_lock(&dmxdevfilter->dev->lock); + spin_lock_bh(&dmxdevfilter->dev->lock); if (dmxdevfilter->state != DMXDEV_STATE_GO) { - spin_unlock(&dmxdevfilter->dev->lock); + spin_unlock_bh(&dmxdevfilter->dev->lock); return 0; } del_timer(&dmxdevfilter->timer); @@ -413,7 +413,7 @@ static int dvb_dmxdev_section_callback(const u8 *buffer1, size_t buffer1_len, dmxdevfilter->buffer.error = ret; if (dmxdevfilter->params.sec.flags & DMX_ONESHOT) dmxdevfilter->state = DMXDEV_STATE_DONE; - spin_unlock(&dmxdevfilter->dev->lock); + spin_unlock_bh(&dmxdevfilter->dev->lock); wake_up(&dmxdevfilter->buffer.queue); return 0; } @@ -430,9 +430,9 @@ static int dvb_dmxdev_ts_callback(const u8 *buffer1, size_t buffer1_len, #endif int ret; - spin_lock(&dmxdevfilter->dev->lock); + spin_lock_bh(&dmxdevfilter->dev->lock); if (dmxdevfilter->params.pes.output == DMX_OUT_DECODER) { - spin_unlock(&dmxdevfilter->dev->lock); + spin_unlock_bh(&dmxdevfilter->dev->lock); return 0; } @@ -457,7 +457,7 @@ static int dvb_dmxdev_ts_callback(const u8 *buffer1, size_t buffer1_len, buffer_flags); } else { if (buffer->error) { - spin_unlock(&dmxdevfilter->dev->lock); + spin_unlock_bh(&dmxdevfilter->dev->lock); wake_up(&buffer->queue); return 0; } @@ -468,7 +468,7 @@ static int dvb_dmxdev_ts_callback(const u8 *buffer1, size_t buffer1_len, } if (ret < 0) buffer->error = ret; - spin_unlock(&dmxdevfilter->dev->lock); + spin_unlock_bh(&dmxdevfilter->dev->lock); wake_up(&buffer->queue); return 0; } -- 2.17.1