Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1045571pxk; Thu, 10 Sep 2020 05:50:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz7ZCh/Ns2Ebj9XDgCDqE42OlbvWNzoYyyUYy225RfoQ1UwU26ur6bjKR8T490IR4DVPv86 X-Received: by 2002:aa7:c885:: with SMTP id p5mr8894375eds.127.1599742240422; Thu, 10 Sep 2020 05:50:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599742240; cv=none; d=google.com; s=arc-20160816; b=R9gl7iJmWWGOdyIPOFTXCOM6IurIx74PtuZGUvoWIVnpM98trBhq6ZoHIC5jK0ifYO IDOoUnCnIq4nlSSNf7VyF3vLF3ZcVaP9yXtTZmFFaQLLBqi/TuErfOEDdDIWoH4WkU8n GwWEhfF4y0cgt5w4BwYXzrMWwweQkHGY7U3+UZIPDbSvJnnpuHfu+RuzyuSVnERtEQNN hDM8DA+W1ixxsoKPnBG7Ko1LRTZTckMuxmz8Ih9zUISt6H8s2H6/jItxA/hOWvmpk1yW NQy6SuEYUJ8NaTwv8MpbxUkftK+kgF0mmQHVcdfo9GYfwXPqDdp5D/ZvL84LMNY8Icqj 4PKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=k2Ffz96tf7aTHZf5z+DmGKI3/pUHW7lSepl0zm0EhOg=; b=KFQeLHVdmybXad1gbXPCBsjlPfKpxnu+46pgnKMBfQ4MdzP2aLAATEdv2sUqzHhc7i LxwFwzVyMPKgPUiPPpCUaiYqCEY7Ij/01UxmC+OmjYmW2pqarq4+0f1L/zcMOLlhPr7e rejQ5QJa0ldWyjx3ybqNYnq2t6KtcreKV+4Z0/sQj5n5DliVnf/wwriBtTvvP1XsXyIJ LWfrE7UWtOudoVXs5xUXpC2dp9mPdWWv/CfZjbhW6dbIiI3BnTTq06LiCMqfwbBc+INq rGeTipmwye0y8q8OY0QlENuic17K6TQWNxRNyMpr/LamyGH3qd0nj+YP0Y9iBoVuo0AE +Sjg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z12si3639637edp.120.2020.09.10.05.50.17; Thu, 10 Sep 2020 05:50:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730871AbgIJMrO (ORCPT + 99 others); Thu, 10 Sep 2020 08:47:14 -0400 Received: from alexa-out.qualcomm.com ([129.46.98.28]:45909 "EHLO alexa-out.qualcomm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730474AbgIJMo7 (ORCPT ); Thu, 10 Sep 2020 08:44:59 -0400 Received: from ironmsg09-lv.qualcomm.com ([10.47.202.153]) by alexa-out.qualcomm.com with ESMTP; 10 Sep 2020 05:44:35 -0700 Received: from ironmsg02-blr.qualcomm.com ([10.86.208.131]) by ironmsg09-lv.qualcomm.com with ESMTP/TLS/AES256-SHA; 10 Sep 2020 05:44:34 -0700 Received: from c-mansur-linux.qualcomm.com ([10.204.90.208]) by ironmsg02-blr.qualcomm.com with ESMTP; 10 Sep 2020 18:14:23 +0530 Received: by c-mansur-linux.qualcomm.com (Postfix, from userid 461723) id 5305E21D23; Thu, 10 Sep 2020 18:14:22 +0530 (IST) From: Mansur Alisha Shaik To: linux-media@vger.kernel.org, stanimir.varbanov@linaro.org Cc: linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, vgarodia@codeaurora.org, Mansur Alisha Shaik Subject: [PATCH v2 1/3] venus: core: handle race condititon for core ops Date: Thu, 10 Sep 2020 18:14:14 +0530 Message-Id: <1599741856-16239-2-git-send-email-mansur@codeaurora.org> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1599741856-16239-1-git-send-email-mansur@codeaurora.org> References: <1599741856-16239-1-git-send-email-mansur@codeaurora.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For core ops we are having only write protect but there is no read protect, because of this in multthreading and concurrency, one CPU core is reading without wait which is causing the NULL pointer dereferece crash. one such scenario is as show below, where in one CPU core, core->ops becoming NULL and in another CPU core calling core->ops->session_init(). CPU: core-7: Call trace: hfi_session_init+0x180/0x1dc [venus_core] vdec_queue_setup+0x9c/0x364 [venus_dec] vb2_core_reqbufs+0x1e4/0x368 [videobuf2_common] vb2_reqbufs+0x4c/0x64 [videobuf2_v4l2] v4l2_m2m_reqbufs+0x50/0x84 [v4l2_mem2mem] v4l2_m2m_ioctl_reqbufs+0x2c/0x38 [v4l2_mem2mem] v4l_reqbufs+0x4c/0x5c __video_do_ioctl+0x2b0/0x39c CPU: core-0: Call trace: venus_shutdown+0x98/0xfc [venus_core] venus_sys_error_handler+0x64/0x148 [venus_core] process_one_work+0x210/0x3d0 worker_thread+0x248/0x3f4 kthread+0x11c/0x12c Signed-off-by: Mansur Alisha Shaik Acked-by: Stanimir Varbanov --- Changes in V2: - Addressed review comments by stan by validating on top - of https://lore.kernel.org/patchwork/project/lkml/list/?series=455962 drivers/media/platform/qcom/venus/hfi.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/drivers/media/platform/qcom/venus/hfi.c b/drivers/media/platform/qcom/venus/hfi.c index a59022a..3137071 100644 --- a/drivers/media/platform/qcom/venus/hfi.c +++ b/drivers/media/platform/qcom/venus/hfi.c @@ -195,7 +195,7 @@ EXPORT_SYMBOL_GPL(hfi_session_create); int hfi_session_init(struct venus_inst *inst, u32 pixfmt) { struct venus_core *core = inst->core; - const struct hfi_ops *ops = core->ops; + const struct hfi_ops *ops; int ret; if (inst->state != INST_UNINIT) @@ -204,10 +204,13 @@ int hfi_session_init(struct venus_inst *inst, u32 pixfmt) inst->hfi_codec = to_codec_type(pixfmt); reinit_completion(&inst->done); + mutex_lock(&core->lock); + ops = core->ops; ret = ops->session_init(inst, inst->session_type, inst->hfi_codec); if (ret) return ret; + mutex_unlock(&core->lock); ret = wait_session_msg(inst); if (ret) return ret; -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation