Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp2060980pxv; Sat, 26 Jun 2021 08:07:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxMHIhtPXccZy2PDZXopNVLz1nrU9Ud9llb+y5dJdSp2OBFX1josWWf/N17AAuZAL1O5LAT X-Received: by 2002:a17:907:9c9:: with SMTP id bx9mr16547541ejc.72.1624720035259; Sat, 26 Jun 2021 08:07:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624720035; cv=none; d=google.com; s=arc-20160816; b=GowJq3+g+iV8+k9uFbixTiCKrhw8a+iHUw+AHUHiFUNxar+SArpKFJ4k0czBs71jrZ LR3Pi2gPqYpp2AROpxKYblH4PmXLAuMV6xz6TwpRshmmq9NVW9t3aziVFRiUv2fZN1mu mTkWdqqYbPDYoKjaptOuJ6ROVX3SD2lRDUHRTfjz0jYD9iUSrcJgbvz67WHQglouPCaH OBif4Y5OPXPwxtVCXMHfEQjAwSza6aAurTIA9k1lsCHBVbe2lxGr8pyjgbT72qdzrKe9 yB80i7MGcz9ykTZFZmZJXJ29bsnaFlEsc8IIhO2Il70Rv6KmX4boAMtKmGiC9QeukrDM tHwg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=M5WfBoRIC7GQMa7cXEzfjXPZenh5iqSBlf3XVGbWvvo=; b=AkFMBQ9YfvX0/gFjQ+ivDd8QaOJPHBRk/z1tMRpQEAhuSLKzUuOsy0SP6SjotSZBlU iypUFTurY8tUhuwu0SYUHnWzKo9QOPtUBk+whZTw6aFQlkF8AyvHDBISiyJ+1Cn23iYZ RlJT+5oQ1sM+4egb66n4VgVIvtKmA9izQieuibwRQal1WKvCWig4OgWk0ys4vib2RB0F wOyDh2FnkNZ9xrr6eg453lKvpO+mHJQs8BI4O8wQQZbejE8iRvMOL5qOHSwlqy53kReY saJKWbIdnMnkRJ2X2XCOQiPWrd+C+DHktMQ4SK2mW2T7Ou60TIDQDTTzgnWhfmx/KXn3 2CeA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v11si6583883edc.610.2021.06.26.08.06.40; Sat, 26 Jun 2021 08:07:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230013AbhFZPFa (ORCPT + 99 others); Sat, 26 Jun 2021 11:05:30 -0400 Received: from netrider.rowland.org ([192.131.102.5]:37607 "HELO netrider.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S229871AbhFZPF2 (ORCPT ); Sat, 26 Jun 2021 11:05:28 -0400 Received: (qmail 602741 invoked by uid 1000); 26 Jun 2021 11:03:04 -0400 Date: Sat, 26 Jun 2021 11:03:04 -0400 From: Alan Stern To: linyyuan@codeaurora.org Cc: Felipe Balbi , Thinh Nguyen , Greg Kroah-Hartman , linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, Jack Pham Subject: Re: [PATCH] usb: dwc3: fix race of usb_gadget_driver operation Message-ID: <20210626150304.GA601624@rowland.harvard.edu> References: <20210625104415.8072-1-linyyuan@codeaurora.org> <20210625163707.GC574023@rowland.harvard.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jun 26, 2021 at 09:16:25AM +0800, linyyuan@codeaurora.org wrote: > On 2021-06-26 00:37, Alan Stern wrote: > > On Fri, Jun 25, 2021 at 06:44:15PM +0800, Linyu Yuan wrote: > > > --- a/drivers/usb/dwc3/ep0.c > > > +++ b/drivers/usb/dwc3/ep0.c > > > @@ -597,10 +597,11 @@ static int dwc3_ep0_set_address(struct dwc3 > > > *dwc, struct usb_ctrlrequest *ctrl) > > > > > > static int dwc3_ep0_delegate_req(struct dwc3 *dwc, struct > > > usb_ctrlrequest *ctrl) > > > { > > > - int ret; > > > + int ret = 0; > > > > > > spin_unlock(&dwc->lock); > > > - ret = dwc->gadget_driver->setup(dwc->gadget, ctrl); > > > + if (dwc->async_callbacks) > > > + ret = dwc->gadget_driver->setup(dwc->gadget, ctrl); > > > spin_lock(&dwc->lock); > > > > Here and in the other places, you should test dwc->async_callbacks > > _before_ dropping the spinlock. Otherwise there is a race (the flag > > could be written at about the same time it is checked). > thanks for your comments, > > if you think there is race here, how to make sure gadget_driver pointer is > safe, > this is closest place where we can confirm it is non-NULL by checking > async_callbacks ? I explained this twice already: We know that gadget_driver is not NULL because usb_gadget_remove_driver calls synchronize_irq before doing usb_gadget_udc_stop. Look at this timing diagram: CPU0 CPU1 ---- ---- IRQ happens for setup packet Handler sees async_callbacks is enabled Handler unlocks dwc->lock usb_gadget_remove_driver runs Disables async callbacks Calls synchronize_irq Handler calls dwc-> . waits for IRQ handler to gadget_driver->setup . return Handler locks dwc-lock . ... . Handler returns . . synchronize_irq returns Calls usb_gadget_udc_stop dwc->gadget_driver is set to NULL As you can see, dwc->gadget_driver is non-NULL when CPU0 uses it, even though async_callbacks gets cleared during the time when the lock is released. Alan Stern