Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp3269628rwl; Tue, 27 Dec 2022 06:51:35 -0800 (PST) X-Google-Smtp-Source: AMrXdXv8hMQHX/bGPWUqpVso7d/dTaXziv/lGBLRTp9cVauM8tlhOc2mEyRAb3LiytNe3Hzj4jsj X-Received: by 2002:a17:906:85c2:b0:7ad:aed6:5224 with SMTP id i2-20020a17090685c200b007adaed65224mr18578054ejy.74.1672152695625; Tue, 27 Dec 2022 06:51:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672152695; cv=none; d=google.com; s=arc-20160816; b=BRilLxmlFWMMFhNyGT35Do00NdBeNKfkL0IxbE5+3v3a+lSdE5SNpeiNV4ecsBYspk UTKLd3IUNqcKcarJIgBWMgVvxbWX2BBhO7I0rj8C8ME7/m+zNt54Ero2Vid9NY8PUloC 7wZ1ipOQweu2slS+MGO3I21tC3Tr4cDt/0ZuH6epY+EMvgFL77LeLFmLOar7lEcV0/xo dycGthHFMmhot6bfq+mAYBJ8lU2Acco94UoFBDznBphyJCnPlS1jTtn4ieJMnMIOkzS/ S7ePXq7RZI/hGnoC1oi/ov3bzEbHuO5G378FcrSfBoRvH9jplSnxYAIZmeFoLLkI/prK ALLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=C5BLFX8bAUOo8auuGM/BDNWVlJvBHpMNjLSskP3wJjQ=; b=LX5T8KctJ9eokA6/2T/MOYGDE9cEy/WXyhGRq85hcxPKr/W5ojJcDtx4eoNMxKM9Jd 9/piSicHo8IhU5CG383imoIP0e6xj2iMwXe8v41KqGZmR82KHaRXq3Dlc6+b3Xq6yjr4 1gKkzG8SKp/dGOjysCVqtvhfFoPLvF40iidtpweeHynUpcd/PwBtng5R5uLQK2x2scAy BNP2WMqNIfEL+OjuKJAe3x9rJAotEhggQqa60tMOULmeDzGsxvkHYEnve9Wq1FxfmLqp J2PhAEW5/L/vru790ufhPOOqPXt7R+LpfcEj/QPyNW8Ov0kAJNUfaozNCvBI6qvH6dwZ vgaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass (test mode) header.i=@ideasonboard.com header.s=mail header.b=iUSkEaWu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ds5-20020a170907724500b007c08bfea548si10300541ejc.382.2022.12.27.06.51.19; Tue, 27 Dec 2022 06:51:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass (test mode) header.i=@ideasonboard.com header.s=mail header.b=iUSkEaWu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231271AbiL0OZM (ORCPT + 66 others); Tue, 27 Dec 2022 09:25:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43638 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229452AbiL0OZK (ORCPT ); Tue, 27 Dec 2022 09:25:10 -0500 Received: from perceval.ideasonboard.com (perceval.ideasonboard.com [213.167.242.64]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C7F9C65CA; Tue, 27 Dec 2022 06:25:04 -0800 (PST) Received: from pendragon.ideasonboard.com (213-243-189-158.bb.dnainternet.fi [213.243.189.158]) by perceval.ideasonboard.com (Postfix) with ESMTPSA id 74B76514; Tue, 27 Dec 2022 15:25:02 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ideasonboard.com; s=mail; t=1672151102; bh=wVffXrSrfpVZx+CPuE+hZ4szBkA23nWWv1euDjeYaRc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=iUSkEaWu8o4GhaqlHTB4TxhSud5iJF2DkGCFPH/pB/JnitMA26jZcur7ILtnd9xB4 4+puwHZsMRKUf3U7seHOrnoKQez0OJ32DCYGqVm/I1OS/Dy3rn/WwCH3bETGSbfsJe 0bujjS+Gc7ZVer1fybXiiEVY5vRO7mwL3PlvtD3Y= Date: Tue, 27 Dec 2022 16:24:59 +0200 From: Laurent Pinchart To: Ricardo Ribalda Cc: Sergey Senozhatsky , Mauro Carvalho Chehab , Max Staudt , linux-media@vger.kernel.org, stable@vger.kernel.org, Yunke Cao , linux-kernel@vger.kernel.org Subject: Re: [PATCH v4] media: uvcvideo: Fix race condition with usb_kill_urb Message-ID: References: <20221212-uvc-race-v4-0-38d7075b03f5@chromium.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20221212-uvc-race-v4-0-38d7075b03f5@chromium.org> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ricardo, Thank you for the patch. On Wed, Dec 14, 2022 at 05:31:55PM +0100, Ricardo Ribalda wrote: > usb_kill_urb warranties that all the handlers are finished when it > returns, but does not protect against threads that might be handling > asynchronously the urb. > > For UVC, the function uvc_ctrl_status_event_async() takes care of > control changes asynchronously. > > If the code is executed in the following order: > > CPU 0 CPU 1 > ===== ===== > uvc_status_complete() > uvc_status_stop() > uvc_ctrl_status_event_work() > uvc_status_start() -> FAIL > > Then uvc_status_start will keep failing and this error will be shown: > > <4>[ 5.540139] URB 0000000000000000 submitted while active > drivers/usb/core/urb.c:378 usb_submit_urb+0x4c3/0x528 > > Let's improve the current situation, by not re-submiting the urb if > we are stopping the status event. Also process the queued work > (if any) during stop. > > CPU 0 CPU 1 > ===== ===== > uvc_status_complete() > uvc_status_stop() > uvc_status_start() > uvc_ctrl_status_event_work() -> FAIL > > Hopefully, with the usb layer protection this should be enough to cover > all the cases. > > Cc: stable@vger.kernel.org > Fixes: e5225c820c05 ("media: uvcvideo: Send a control event when a Control Change interrupt arrives") > Reviewed-by: Yunke Cao > Signed-off-by: Ricardo Ribalda > --- > uvc: Fix race condition on uvc > > Make sure that all the async work is finished when we stop the status urb. > > To: Yunke Cao > To: Sergey Senozhatsky > To: Max Staudt > To: Laurent Pinchart > To: Mauro Carvalho Chehab > Cc: linux-media@vger.kernel.org > Cc: linux-kernel@vger.kernel.org > --- > Changes in v4: > - Replace bool with atomic_t to avoid compiler reordering > - First complete the async work and then kill the urb to avoid race (Thanks Laurent!) > - Link to v3: https://lore.kernel.org/r/20221212-uvc-race-v3-0-954efc752c9a@chromium.org > > Changes in v3: > - Remove the patch for dev->status, makes more sense in another series, and makes > the zero day less nervous. > - Update reviewed-by (thanks Yunke!). > - Link to v2: https://lore.kernel.org/r/20221212-uvc-race-v2-0-54496cc3b8ab@chromium.org > > Changes in v2: > - Add a patch for not kalloc dev->status > - Redo the logic mechanism, so it also works with suspend (Thanks Yunke!) > - Link to v1: https://lore.kernel.org/r/20221212-uvc-race-v1-0-c52e1783c31d@chromium.org > --- > drivers/media/usb/uvc/uvc_ctrl.c | 3 +++ > drivers/media/usb/uvc/uvc_status.c | 6 ++++++ > drivers/media/usb/uvc/uvcvideo.h | 1 + > 3 files changed, 10 insertions(+) > > diff --git a/drivers/media/usb/uvc/uvc_ctrl.c b/drivers/media/usb/uvc/uvc_ctrl.c > index c95a2229f4fa..1be6897a7d6d 100644 > --- a/drivers/media/usb/uvc/uvc_ctrl.c > +++ b/drivers/media/usb/uvc/uvc_ctrl.c > @@ -1442,6 +1442,9 @@ static void uvc_ctrl_status_event_work(struct work_struct *work) > > uvc_ctrl_status_event(w->chain, w->ctrl, w->data); > > + if (atomic_read(&dev->flush_status)) > + return; > + > /* Resubmit the URB. */ > w->urb->interval = dev->int_ep->desc.bInterval; > ret = usb_submit_urb(w->urb, GFP_KERNEL); > diff --git a/drivers/media/usb/uvc/uvc_status.c b/drivers/media/usb/uvc/uvc_status.c > index 7518ffce22ed..4a95850cdc1b 100644 > --- a/drivers/media/usb/uvc/uvc_status.c > +++ b/drivers/media/usb/uvc/uvc_status.c > @@ -304,10 +304,16 @@ int uvc_status_start(struct uvc_device *dev, gfp_t flags) > if (dev->int_urb == NULL) > return 0; > > + atomic_set(&dev->flush_status, 0); > return usb_submit_urb(dev->int_urb, flags); > } > > void uvc_status_stop(struct uvc_device *dev) > { > + struct uvc_ctrl_work *w = &dev->async_ctrl; > + > + atomic_set(&dev->flush_status, 1); Note that atomic_read() and atomic_set() do no imply any memory barrier on most architectures, as far as I can tell. They essentially become READ_ONCE() and WRITE_ONCE() calls, which guarantee that the compiler will not merge or split loads or stores, or reorder them with respect to load and stores to the *same* memory location, but nothing else. I think you need to add proper barriers, and you can then probably also drop usage of atomic_t. > + if (cancel_work_sync(&w->work)) > + uvc_ctrl_status_event(w->chain, w->ctrl, w->data); > usb_kill_urb(dev->int_urb); This should get rid of the main race (possibly save the barrier issue), but it's not the most efficient option, and can still be problematic. Consider the following case: CPU0 CPU1 ---- ---- void uvc_status_stop(struct uvc_device *dev) uvc_ctrl_status_event_async() { { ... atomic_set(&dev->flush_status, 1); ... if (cancel_work_sync()) ... schedule_work(); usb_kill_urb(); } } The usb_kill_urb() call ensures that uvc_ctrl_status_event_async() completes before uvc_status_stop() returns, but there will still be work scheduled in that case. uvc_ctrl_status_event_work() will be run later, and as flush_status is set to 1, the function will not resubmit the URB. That fixes the main race, but leaves the asynchronous control status event handling for after uvc_status_stop() returns, which isn't great. Now, if we consider that uvc_status_start() could be called shortly after uvc_status_stop(), we may get in a situation where uvc_status_start() will reset flush_status to 0 before uvc_ctrl_status_event_async() runs. Both uvc_ctrl_status_event_async() and uvc_status_start() will thus submit the same URB. You can't fix this by first killing the URB and then cancelling the work, as there would then be a risk that uvc_ctrl_status_event_work() would be running in parallel, going past the flush_status check before flush_status gets set to 1 in uvc_status_stop(), and submitting the URB after usb_kill_urb() is called. I think a good fix would be to check flush_status in uvc_ctrl_status_event_async() and avoid the schedule_work() call in that case. You could then also move the atomic_set(..., 0) call from uvc_status_start() to the end of uvc_status_stop() (again with proper barriers). Could you please check the memory barriers and test the above proposal (after double-checking it of course, I may have missed something) ? > } > diff --git a/drivers/media/usb/uvc/uvcvideo.h b/drivers/media/usb/uvc/uvcvideo.h > index df93db259312..1274691f157f 100644 > --- a/drivers/media/usb/uvc/uvcvideo.h > +++ b/drivers/media/usb/uvc/uvcvideo.h > @@ -560,6 +560,7 @@ struct uvc_device { > struct usb_host_endpoint *int_ep; > struct urb *int_urb; > u8 *status; > + atomic_t flush_status; > struct input_dev *input; > char input_phys[64]; > -- Regards, Laurent Pinchart