ipmi: fix potential deadlock on &kcs_bmc->lock
authorChengfeng Ye <dg573847474@gmail.com>
Tue, 27 Jun 2023 15:24:49 +0000 (15:24 +0000)
committerCorey Minyard <minyard@acm.org>
Tue, 4 Jul 2023 14:22:45 +0000 (09:22 -0500)
As kcs_bmc_handle_event() is executed inside both a timer and a hardirq,
it should disable irq before lock acquisition otherwise deadlock could
happen if the timmer is preemtped by the irq.

Possible deadlock scenario:
aspeed_kcs_check_obe() (timer)
    -> kcs_bmc_handle_event()
    -> spin_lock(&kcs_bmc->lock)
        <irq interruption>
        -> aspeed_kcs_irq()
        -> kcs_bmc_handle_event()
        -> spin_lock(&kcs_bmc->lock) (deadlock here)

This flaw was found using an experimental static analysis tool we are
developing for irq-related deadlock.

The tentative patch fix the potential deadlock by spin_lock_irqsave()

Signed-off-by: Chengfeng Ye <dg573847474@gmail.com>
Message-Id: <20230627152449.36093-1-dg573847474@gmail.com>
Signed-off-by: Corey Minyard <minyard@acm.org>
drivers/char/ipmi/kcs_bmc.c

index 03d02a8..8b1161d 100644 (file)
@@ -56,12 +56,13 @@ irqreturn_t kcs_bmc_handle_event(struct kcs_bmc_device *kcs_bmc)
 {
        struct kcs_bmc_client *client;
        irqreturn_t rc = IRQ_NONE;
+       unsigned long flags;
 
-       spin_lock(&kcs_bmc->lock);
+       spin_lock_irqsave(&kcs_bmc->lock, flags);
        client = kcs_bmc->client;
        if (client)
                rc = client->ops->event(client);
-       spin_unlock(&kcs_bmc->lock);
+       spin_unlock_irqrestore(&kcs_bmc->lock, flags);
 
        return rc;
 }