Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp2831576pxb; Mon, 11 Jan 2021 22:40:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJxmFsGTBPFhXheBZTf8lQup9zeQsF78zPmxSU2i8a5WkYysUg8BtQAzXGqJYrYZzqwHGO2W X-Received: by 2002:a17:906:bcd5:: with SMTP id lw21mr171038ejb.408.1610433658655; Mon, 11 Jan 2021 22:40:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610433658; cv=none; d=google.com; s=arc-20160816; b=H4GGeiGuAk2EuvZAAGbTOBggDDXmdgAddLD8MOjikmJUJZYLrcOMYQWu1Pc9y03ZX3 lg9Udg43FIvx7c3Rux7Rj63pqkYpC6Ifvi6IhpH8Xkuqf4ZDRuqpFJqXHrTmB3WPIZt7 2x19WECIaj6BPtknJhlUnyvU7lT9aisf+QmZ41K4cwm1KulH0CY9oioX/2AiKs2MIXdH b0UGBYEORS+hvGWziGAhL0p1/c4Bkndr5mGkN3MpnEqzdy/LBIXoUwONU86EcHQxMqxT iPiVNzgipXDVNyznyx97Y6FwHXuADtuc1gI+4FXB88fUNS93z9sRQMCxrBpG/q/GcEpp AjNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EBE2+ouYPx/olEvUTziTrvLPIjFQyj0bM19Tch35/SI=; b=LtEjCi/zkWlftpiTpgKRgPcqAijK2g2Iwao9OcaoB8RLTM+1YkoAP9nwrYkWq8ap6Y xmvpVB+WiPq7wua39fQWtsClAp6VQD0Ryd7pwXPkDMwiY/J2t1QrOhUyFocvN3u3BKZa /q+P4mtIteg+nC0cnRPvpk6/H6YS1L0WjDp3ONzctvwuEOD/JxeItJ83s+/AULEPPtym KnEBI8WVoQKu1pUWWSbmh2bkuVm0v9OXsg8ub3BsMZvqtrbINIrUz5dYT+u5dGDovD39 ziGHv+B6V99szovg/rNVlk7FHBBzp7JVq10FIGqa4unwzCDiGDKjEMtHD58NZbGzxrbj N2fg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=as97cqfb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w20si733256ejc.188.2021.01.11.22.40.35; Mon, 11 Jan 2021 22:40:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=as97cqfb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387915AbhAKN6n (ORCPT + 99 others); Mon, 11 Jan 2021 08:58:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:54304 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728199AbhAKNGo (ORCPT ); Mon, 11 Jan 2021 08:06:44 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id DBCE2225AC; Mon, 11 Jan 2021 13:06:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1610370363; bh=gUtW2hs3cQfjq3jLCaO0K0UfyvlU2IVIVjgIyOmwL7E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=as97cqfboCxKVEG2s2JNi0jnBMlOEOimKCZ10UDC1xI7d87YTr0hvrSQXGvfg7tBW bLUiepPZDZ6izZTTWQPs9De68/rCKP4SxMHFfz93Wn5DsjmaErqx0jLwT1/VVbYXFl onqvWttfAkD5rBi9epsGq7GkFbRpT/YGhTAwci6Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Peter Chen , Sriharsha Allenki Subject: [PATCH 4.14 46/57] usb: gadget: Fix spinlock lockup on usb_function_deactivate Date: Mon, 11 Jan 2021 14:02:05 +0100 Message-Id: <20210111130035.951405553@linuxfoundation.org> X-Mailer: git-send-email 2.30.0 In-Reply-To: <20210111130033.715773309@linuxfoundation.org> References: <20210111130033.715773309@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sriharsha Allenki commit 5cc35c224a80aa5a5a539510ef049faf0d6ed181 upstream. There is a spinlock lockup as part of composite_disconnect when it tries to acquire cdev->lock as part of usb_gadget_deactivate. This is because the usb_gadget_deactivate is called from usb_function_deactivate with the same spinlock held. This would result in the below call stack and leads to stall. rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: rcu: 3-...0: (1 GPs behind) idle=162/1/0x4000000000000000 softirq=10819/10819 fqs=2356 (detected by 2, t=5252 jiffies, g=20129, q=3770) Task dump for CPU 3: task:uvc-gadget_wlhe state:R running task stack: 0 pid: 674 ppid: 636 flags:0x00000202 Call trace: __switch_to+0xc0/0x170 _raw_spin_lock_irqsave+0x84/0xb0 composite_disconnect+0x28/0x78 configfs_composite_disconnect+0x68/0x70 usb_gadget_disconnect+0x10c/0x128 usb_gadget_deactivate+0xd4/0x108 usb_function_deactivate+0x6c/0x80 uvc_function_disconnect+0x20/0x58 uvc_v4l2_release+0x30/0x88 v4l2_release+0xbc/0xf0 __fput+0x7c/0x230 ____fput+0x14/0x20 task_work_run+0x88/0x140 do_notify_resume+0x240/0x6f0 work_pending+0x8/0x200 Fix this by doing an unlock on cdev->lock before the usb_gadget_deactivate call from usb_function_deactivate. The same lockup can happen in the usb_gadget_activate path. Fix that path as well. Reported-by: Peter Chen Link: https://lore.kernel.org/linux-usb/20201102094936.GA29581@b29397-desktop/ Tested-by: Peter Chen Signed-off-by: Sriharsha Allenki Cc: stable Link: https://lore.kernel.org/r/20201202130220.24926-1-sallenki@codeaurora.org Signed-off-by: Greg Kroah-Hartman --- drivers/usb/gadget/composite.c | 10 ++++++++-- 1 file changed, 8 insertions(+), 2 deletions(-) --- a/drivers/usb/gadget/composite.c +++ b/drivers/usb/gadget/composite.c @@ -395,8 +395,11 @@ int usb_function_deactivate(struct usb_f spin_lock_irqsave(&cdev->lock, flags); - if (cdev->deactivations == 0) + if (cdev->deactivations == 0) { + spin_unlock_irqrestore(&cdev->lock, flags); status = usb_gadget_deactivate(cdev->gadget); + spin_lock_irqsave(&cdev->lock, flags); + } if (status == 0) cdev->deactivations++; @@ -427,8 +430,11 @@ int usb_function_activate(struct usb_fun status = -EINVAL; else { cdev->deactivations--; - if (cdev->deactivations == 0) + if (cdev->deactivations == 0) { + spin_unlock_irqrestore(&cdev->lock, flags); status = usb_gadget_activate(cdev->gadget); + spin_lock_irqsave(&cdev->lock, flags); + } } spin_unlock_irqrestore(&cdev->lock, flags);