lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230627164309.59922-1-dg573847474@gmail.com>
Date:   Tue, 27 Jun 2023 16:43:09 +0000
From:   Chengfeng Ye <dg573847474@...il.com>
To:     sean.wang@...iatek.com, vkoul@...nel.org, matthias.bgg@...il.com,
        angelogioacchino.delregno@...labora.com
Cc:     dmaengine@...r.kernel.org, linux-arm-kernel@...ts.infradead.org,
        linux-mediatek@...ts.infradead.org, linux-kernel@...r.kernel.org,
        Chengfeng Ye <dg573847474@...il.com>
Subject: [PATCH] dmaengine: mediatek: mtk-hsdma: fix potential deadlock on &vc->lock

As &vc->lock is acquired by the irq mtk_hsdma_irq(), other process
context code acquiring the lock should disable irq. The terminate
callback mtk_hsdma_terminate_all() acquires the same lock without
closing irq.

Possible deadlock scenario:
mtk_hsdma_free_active_desc()
    -> spin_lock(&hvc->vc.lock)
        <irq interrupt>
        -> mtk_hsdma_irq()
        -> mtk_hsdma_free_rooms_in_ring()
        -> spin_lock(&hvc->vc.lock)  (deadlock here)

This flaw was found using an experimental static analysis tool we are
developing for irq-related deadlock.

The tentative patch fix the potential deadlock by spin_lock_irqsave().

Signed-off-by: Chengfeng Ye <dg573847474@...il.com>
---
 drivers/dma/mediatek/mtk-hsdma.c | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/drivers/dma/mediatek/mtk-hsdma.c b/drivers/dma/mediatek/mtk-hsdma.c
index 69cc61c0b262..6b6773575893 100644
--- a/drivers/dma/mediatek/mtk-hsdma.c
+++ b/drivers/dma/mediatek/mtk-hsdma.c
@@ -757,18 +757,19 @@ static void mtk_hsdma_free_active_desc(struct dma_chan *c)
 {
 	struct mtk_hsdma_vchan *hvc = to_hsdma_vchan(c);
 	bool sync_needed = false;
+	unsigned long flags;
 
 	/*
 	 * Once issue_synchronize is being set, which means once the hardware
 	 * consumes all descriptors for the channel in the ring, the
 	 * synchronization must be notified immediately it is completed.
 	 */
-	spin_lock(&hvc->vc.lock);
+	spin_lock_irqsave(&hvc->vc.lock, flags);
 	if (!list_empty(&hvc->desc_hw_processing)) {
 		hvc->issue_synchronize = true;
 		sync_needed = true;
 	}
-	spin_unlock(&hvc->vc.lock);
+	spin_unlock_irqrestore(&hvc->vc.lock, flags);
 
 	if (sync_needed)
 		wait_for_completion(&hvc->issue_completion);
-- 
2.17.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ