[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20221208182142.250084-1-brgl@bgdev.pl>
Date: Thu, 8 Dec 2022 19:21:40 +0100
From: Bartosz Golaszewski <brgl@...ev.pl>
To: Wolfram Sang <wsa@...nel.org>
Cc: linux-i2c@...r.kernel.org, linux-kernel@...r.kernel.org,
Bartosz Golaszewski <bartosz.golaszewski@...aro.org>
Subject: [PATCH 0/2] i2c: fortify the subsystem against user-space induced deadlocks
From: Bartosz Golaszewski <bartosz.golaszewski@...aro.org>
Several subsystems in the kernel that export device files to user-space
suffer from a bug where keeping an open file descriptor associated with
this device file, unbinding the device from its driver and then calling
any of the supported system calls on that file descriptor will result in
either a crash or - as is the case with i2c - a deadlock.
This behavior has been blamed on extensive usage of device resource
management interfaces but it seems that devres has nothing to do with it,
the problem would be the same whether using devres or freeing resources
in .remove() that should survive the driver detach.
Many subsystems already deal with this by implementing some kind of flags
in the character device data together with locking preventing the
user-space from dropping the subsystem data from under the open device.
In i2c the deadlock comes from the fact that the function unregistering
the adapter waits for a completion which will not be passed until all
references to the character device are dropped.
The first patch in this series is just a tweak of return values of the
notifier callback. The second addresses the deadlock problem in a way
similar to how we fixed this issue in the GPIO subystem. Details are in
the commit message.
Bartosz Golaszewski (2):
i2c: dev: fix notifier return values
i2c: dev: don't allow user-space to deadlock the kernel
drivers/i2c/i2c-core-base.c | 18 ------
drivers/i2c/i2c-dev.c | 112 +++++++++++++++++++++++++++++-------
include/linux/i2c.h | 2 -
3 files changed, 91 insertions(+), 41 deletions(-)
--
2.37.2
Powered by blists - more mailing lists