Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp4197319rwe; Tue, 30 Aug 2022 06:19:34 -0700 (PDT) X-Google-Smtp-Source: AA6agR62AJVCmczOVuEoJF58LnHT+3Sp3yCtL6CXd5Hd5KeJqwksK+g2v/XdPVk9c+ylDUqCJMES X-Received: by 2002:a17:907:1c8b:b0:741:5f7c:804e with SMTP id nb11-20020a1709071c8b00b007415f7c804emr8992290ejc.630.1661865574540; Tue, 30 Aug 2022 06:19:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661865574; cv=none; d=google.com; s=arc-20160816; b=OKWP8O+HCT2MDoXO0SCFYYf1AkXvoZ7Tz3oFX+AlfbTj48npOV4NqqkHa668YpAKwf bAFFyGBtPi9qgBtN+9XeHtVdA1ceEsysHyrlm3WMLjZ+Cdjd2NJDyoRL3x2hOLp6o9hr VogXfnIOgCObYazXnc2jPaOtB3rxwo2hFqzs7bHExWpPJ/JFFa8WgMDGptkHD8pfdBHg bYA6sC1U25CL/dQjSnBeQiX66cxT7PmEnxNr1baxZuvsPdS6DU8CEi7tG2JuScNimn2g yq60jOJ6UdrlgMN3kgoYa92LbriW75UuAJ91wHEnct0BA6cMj9JnoBLb/7T/ebH1jSiE hLgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=UNAqdczKYAddUDIZnw9pwU24KCNjHlZgvb7jK9guiq8=; b=a/lPlb6Zb15d2yWHamfcOy2vMcHVQkTAlg4AQdW7hWGmEXm4TD0byYikO3msrOhb6v oSl+Y8ihoATsqqXQbw8Jnb7TIAkhD26xMQppUKYf1H8dDU3EsQa7I3Goj2j9v64gk431 drxO946hj49yWObQQan0Tuu8XsROZLPaa4tQBpNG5EdXAfZfy7k3mkpNZlbgoWD+f7oB wa5QRvRNfSppPDHp72GGdfOwn5zjvFgLCbiSXA6q8RL3dBB35jzVAz17MCR8OILRjidP IZpGsy7xgNcjHB+0JFbtvx7crYFlgnKrvABUsW3gKddMH+GLO4dG1XHdi/R+exssY++G 19IA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=YHaEIXCZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t19-20020aa7db13000000b00447f6290e17si7379828eds.407.2022.08.30.06.19.08; Tue, 30 Aug 2022 06:19:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=YHaEIXCZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230181AbiH3Myf (ORCPT + 99 others); Tue, 30 Aug 2022 08:54:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48844 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229636AbiH3Mx6 (ORCPT ); Tue, 30 Aug 2022 08:53:58 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 13D51132845; Tue, 30 Aug 2022 05:53:49 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 6725C616B5; Tue, 30 Aug 2022 12:53:48 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6550FC433D7; Tue, 30 Aug 2022 12:53:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661864027; bh=qQ+Ls2PqvI0VuxPbDMq27sZY6OGPoQuUGYChfjWAHP4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=YHaEIXCZ3BglGoarg69NTxqto+v+mvRSqBAdukUaNJUx/ioYDQtQGBPZoa6lSYhuS RpD7W76zc2HIhflJJx5Sg6zYZzOlfIQphHsHKS3oHGprtbS0ma/Ezw07Ozh9/iGFz7 ooE1EJUAQW6bu37/SmkG/VsTSk8BeH5LqKps+mJI= Date: Tue, 30 Aug 2022 14:53:44 +0200 From: Greg Kroah-Hartman To: Linyu Yuan Cc: Heikki Krogerus , Takashi Iwai , linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [REGRESSION 5.19] NULL dereference by ucsi_acpi driver Message-ID: References: <87r11cmbx0.wl-tiwai@suse.de> <09f1204c-1256-e737-b769-be899870c946@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Aug 30, 2022 at 02:51:54PM +0200, Greg Kroah-Hartman wrote: > On Mon, Aug 22, 2022 at 10:44:26AM +0800, Linyu Yuan wrote: > > > > On 8/21/2022 2:40 AM, Greg Kroah-Hartman wrote: > > > On Fri, Aug 19, 2022 at 06:32:43PM +0200, Takashi Iwai wrote: > > > > Hi, > > > > > > > > we've got multiple reports about 5.19 kernel starting crashing after > > > > some time, and this turned out to be triggered by ucsi_acpi driver. > > > > The details are found in: > > > > https://bugzilla.suse.com/show_bug.cgi?id=1202386 > > > > > > > > The culprit seems to be the commit 87d0e2f41b8c > > > > usb: typec: ucsi: add a common function ucsi_unregister_connectors() > > > Adding Heikki to the thread... > > > > > > > This commit looks as if it were a harmless cleanup, but this failed in > > > > a subtle way. Namely, in the error scenario, the driver gets an error > > > > at ucsi_register_altmodes(), and goes to the error handling to release > > > > the resources. Through this refactoring, the release part was unified > > > > to a funciton ucsi_unregister_connectors(). And there, it has a NULL > > > > check of con->wq, and it bails out the loop if it's NULL. > > > > Meanwhile, ucsi_register_port() itself still calls destroy_workqueue() > > > > and clear con->wq at its error path. This ended up in the leftover > > > > power supply device with the uninitialized / cleared device. > > > > > > > > It was confirmed that the problem could be avoided by a simple > > > > revert. > > > I'll be glad to revert this now, unless Heikki thinks: > > > > > > > I guess another fix could be removing the part clearing con->wq, i.e. > > > > > > > > --- a/drivers/usb/typec/ucsi/ucsi.c > > > > +++ b/drivers/usb/typec/ucsi/ucsi.c > > > > @@ -1192,11 +1192,6 @@ static int ucsi_register_port(struct ucsi *ucsi, int index) > > > > out_unlock: > > > > mutex_unlock(&con->lock); > > > > - if (ret && con->wq) { > > > > - destroy_workqueue(con->wq); > > > > - con->wq = NULL; > > > > - } > > > > - > > > > return ret; > > > > } > > > > > > > > ... but it's totally untested and I'm not entirely sure whether it's > > > > better. > > > > this part is original code, yes, but when I make the change you mentioned, > > > > as in the function ucsi_unregister_connectors(),? just use con->wq to > > represent which connector initialized previous, > > > > indeed if we clear it in ucsi_register_port(), something will left unclear. > > > > please send a patch to fix it. > > > > I think your change is good. > > Ok, can someone send me a patch to apply to the tree for this? Oh nevermind, I already have the revert in my tree, sorry for the noise. greg k-h