Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp10608351rwl; Mon, 2 Jan 2023 05:32:26 -0800 (PST) X-Google-Smtp-Source: AMrXdXtXK8jKEpKGfIym9bpbtZKKlLh/IwPb9FXfz2V6HDIB2J+RP2bJz8yU9lrLpHNX1HAz9Hcw X-Received: by 2002:a05:6a00:78b:b0:581:c9cf:3504 with SMTP id g11-20020a056a00078b00b00581c9cf3504mr13786173pfu.14.1672666345913; Mon, 02 Jan 2023 05:32:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672666345; cv=none; d=google.com; s=arc-20160816; b=xKXXkFkVxDbFnaUMmMcP8Z8tvmgAyIl8EpOyF43kVbYrndaOGNP63or5aifLHTmG2q Yv9lbQW+97Klzxc1qrXmKu36y4N5vEuIyZU3mnSlB8oEoYfM22Rl6cev6VWoEhavvPCc hv0HrMdLjT9oCLDSO9ZdQcb39nDMKMFrPEHjLhcjyyodXJT7ZZwYsgVxoKWjlJkpF+D5 ASFjRYgTm8SRlcFf0PUtrhC8OP9WzHq+Fbk5yIMV9pi51dDgcptjkPHJVhBOEL1p6Yh4 OudtPLHTAIotCxPQZWpMNTvR97whR2BxFbf7MKX11PmksJEyWDNKqh/SqB2KC9ZpZL1F JR2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=1xpu4k2D/PU+v5nzoXzMo8V939V41siBKh6dPsyMcqc=; b=iA+T2wXWhNTlEojDPQR+jdIQy8azwoQ/Y5ZbyTRWzSfFw9R4pC8I3ourK3M/hNGqmt vu/fntDc7vUICQZZosEc3lKhqpbFZiJy6RtDQ8shVBKtEbddhb7F3DgYoeh5JkxRL4f0 yhQAu9twRBdualSsCeREycVI9Im4onHN706IyghWVRdtXi4e0rnK1romFRffcnS8th5O 3q4iBaLUirVQowAvVRbnjw0ZqGh2Xa4JGyQFDRQf9q4ybsI4E6/O6+rVcVWNVHaz58Kz aPc0yBB/u44ONP5UOGQ3RxWheSLxZKBcfH/XhL5NJ6SvHOjxOPFE23MGKRplbD/5eXKx bptg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=nYw0ZWTk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b188-20020a621bc5000000b00581466232c8si18888026pfb.29.2023.01.02.05.32.13; Mon, 02 Jan 2023 05:32:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=nYw0ZWTk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232301AbjABMp0 (ORCPT + 61 others); Mon, 2 Jan 2023 07:45:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51356 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232721AbjABMpX (ORCPT ); Mon, 2 Jan 2023 07:45:23 -0500 Received: from mail-pl1-x62c.google.com (mail-pl1-x62c.google.com [IPv6:2607:f8b0:4864:20::62c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F19D06454 for ; Mon, 2 Jan 2023 04:45:20 -0800 (PST) Received: by mail-pl1-x62c.google.com with SMTP id jn22so29432645plb.13 for ; Mon, 02 Jan 2023 04:45:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=1xpu4k2D/PU+v5nzoXzMo8V939V41siBKh6dPsyMcqc=; b=nYw0ZWTkICn6x6q5dgl3GV6vwE36VwxVFH/CSeHHwpmZRFQ3sM4/VFYy2ZMDpfedcL +0VBLYySSi4y5l2sDogKxZPy0WLB7/wsLLxDj5wq25JNubULbpnlklRrTFe/dvMnRH+X UOFoD79JaJKH6JnsbdA1/Pw/4zeuxoCCmvpFs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=1xpu4k2D/PU+v5nzoXzMo8V939V41siBKh6dPsyMcqc=; b=PCS0PbUrVSNGwzmGRvQ9rI4c5VRGkLFzZT6a/6wNVI5LmnZaIwbEb0NdTvkKZ+RTgH AL6oJNVY1ushqj4DOvsMLnaM2Nf5LK58Y30FyAsQMUAyyvRCrQk8cQEfP2wI4T54kXr6 V62VRIjdcLHk1Z7S2Y4AGRQsguLzlM5hPN3o7kOyXnZzfR8PcckUy8x2/irIMY9dYW59 eWtz5k/8xuoD8j4wZD4gSNXWsfd3LlXrsqTUVjcvkk+5jHu2QuGgsZgFtfmJy1v94CPI MZxb+LPwuONwb2WlV8paSyldomJSBNNHQaChvz1vrvXYq9xVMc79+sLAb8WTfi41Jz3s lWkQ== X-Gm-Message-State: AFqh2krrH7UT0v0FIkfTnry4Hc8d8BuZMmxl/j7+DH8Fuos4KFA6ZWl8 ZBF0DrVJud+kD4JuW/T8kEtLzf/Mu9YsaTIL X-Received: by 2002:a17:902:e5cd:b0:192:9140:ee76 with SMTP id u13-20020a170902e5cd00b001929140ee76mr31092708plf.37.1672663520253; Mon, 02 Jan 2023 04:45:20 -0800 (PST) Received: from mail-pg1-f177.google.com (mail-pg1-f177.google.com. [209.85.215.177]) by smtp.gmail.com with ESMTPSA id z16-20020a170902d55000b00189db296776sm10925082plf.17.2023.01.02.04.45.18 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 02 Jan 2023 04:45:18 -0800 (PST) Received: by mail-pg1-f177.google.com with SMTP id f3so18281636pgc.2 for ; Mon, 02 Jan 2023 04:45:18 -0800 (PST) X-Received: by 2002:a65:5b81:0:b0:49c:5d81:b628 with SMTP id i1-20020a655b81000000b0049c5d81b628mr1017356pgr.213.1672663517782; Mon, 02 Jan 2023 04:45:17 -0800 (PST) MIME-Version: 1.0 References: <20221212-uvc-race-v4-0-38d7075b03f5@chromium.org> In-Reply-To: From: Ricardo Ribalda Date: Mon, 2 Jan 2023 13:45:06 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v4] media: uvcvideo: Fix race condition with usb_kill_urb To: Laurent Pinchart Cc: Sergey Senozhatsky , Mauro Carvalho Chehab , Max Staudt , linux-media@vger.kernel.org, stable@vger.kernel.org, Yunke Cao , linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Laurent Thanks for your review! On Tue, 27 Dec 2022 at 15:37, Laurent Pinchart wrote: > > On Tue, Dec 27, 2022 at 04:25:01PM +0200, Laurent Pinchart wrote: > > Hi Ricardo, > > > > Thank you for the patch. > > > > On Wed, Dec 14, 2022 at 05:31:55PM +0100, Ricardo Ribalda wrote: > > > usb_kill_urb warranties that all the handlers are finished when it > > > returns, but does not protect against threads that might be handling > > > asynchronously the urb. > > > > > > For UVC, the function uvc_ctrl_status_event_async() takes care of > > > control changes asynchronously. > > > > > > If the code is executed in the following order: > > > > > > CPU 0 CPU 1 > > > ===== ===== > > > uvc_status_complete() > > > uvc_status_stop() > > > uvc_ctrl_status_event_work() > > > uvc_status_start() -> FAIL > > > > > > Then uvc_status_start will keep failing and this error will be shown: > > > > > > <4>[ 5.540139] URB 0000000000000000 submitted while active > > > drivers/usb/core/urb.c:378 usb_submit_urb+0x4c3/0x528 > > > > > > Let's improve the current situation, by not re-submiting the urb if > > > we are stopping the status event. Also process the queued work > > > (if any) during stop. > > > > > > CPU 0 CPU 1 > > > ===== ===== > > > uvc_status_complete() > > > uvc_status_stop() > > > uvc_status_start() > > > uvc_ctrl_status_event_work() -> FAIL > > > > > > Hopefully, with the usb layer protection this should be enough to cover > > > all the cases. > > > > > > Cc: stable@vger.kernel.org > > > Fixes: e5225c820c05 ("media: uvcvideo: Send a control event when a Control Change interrupt arrives") > > > Reviewed-by: Yunke Cao > > > Signed-off-by: Ricardo Ribalda > > > --- > > > uvc: Fix race condition on uvc > > > > > > Make sure that all the async work is finished when we stop the status urb. > > > > > > To: Yunke Cao > > > To: Sergey Senozhatsky > > > To: Max Staudt > > > To: Laurent Pinchart > > > To: Mauro Carvalho Chehab > > > Cc: linux-media@vger.kernel.org > > > Cc: linux-kernel@vger.kernel.org > > > --- > > > Changes in v4: > > > - Replace bool with atomic_t to avoid compiler reordering > > > - First complete the async work and then kill the urb to avoid race (Thanks Laurent!) > > > - Link to v3: https://lore.kernel.org/r/20221212-uvc-race-v3-0-954efc752c9a@chromium.org > > > > > > Changes in v3: > > > - Remove the patch for dev->status, makes more sense in another series, and makes > > > the zero day less nervous. > > > - Update reviewed-by (thanks Yunke!). > > > - Link to v2: https://lore.kernel.org/r/20221212-uvc-race-v2-0-54496cc3b8ab@chromium.org > > > > > > Changes in v2: > > > - Add a patch for not kalloc dev->status > > > - Redo the logic mechanism, so it also works with suspend (Thanks Yunke!) > > > - Link to v1: https://lore.kernel.org/r/20221212-uvc-race-v1-0-c52e1783c31d@chromium.org > > > --- > > > drivers/media/usb/uvc/uvc_ctrl.c | 3 +++ > > > drivers/media/usb/uvc/uvc_status.c | 6 ++++++ > > > drivers/media/usb/uvc/uvcvideo.h | 1 + > > > 3 files changed, 10 insertions(+) > > > > > > diff --git a/drivers/media/usb/uvc/uvc_ctrl.c b/drivers/media/usb/uvc/uvc_ctrl.c > > > index c95a2229f4fa..1be6897a7d6d 100644 > > > --- a/drivers/media/usb/uvc/uvc_ctrl.c > > > +++ b/drivers/media/usb/uvc/uvc_ctrl.c > > > @@ -1442,6 +1442,9 @@ static void uvc_ctrl_status_event_work(struct work_struct *work) > > > > > > uvc_ctrl_status_event(w->chain, w->ctrl, w->data); > > > > > > + if (atomic_read(&dev->flush_status)) > > > + return; > > > + > > > /* Resubmit the URB. */ > > > w->urb->interval = dev->int_ep->desc.bInterval; > > > ret = usb_submit_urb(w->urb, GFP_KERNEL); > > > diff --git a/drivers/media/usb/uvc/uvc_status.c b/drivers/media/usb/uvc/uvc_status.c > > > index 7518ffce22ed..4a95850cdc1b 100644 > > > --- a/drivers/media/usb/uvc/uvc_status.c > > > +++ b/drivers/media/usb/uvc/uvc_status.c > > > @@ -304,10 +304,16 @@ int uvc_status_start(struct uvc_device *dev, gfp_t flags) > > > if (dev->int_urb == NULL) > > > return 0; > > > > > > + atomic_set(&dev->flush_status, 0); > > > return usb_submit_urb(dev->int_urb, flags); > > > } > > > > > > void uvc_status_stop(struct uvc_device *dev) > > > { > > > + struct uvc_ctrl_work *w = &dev->async_ctrl; > > > + > > > + atomic_set(&dev->flush_status, 1); > > > > Note that atomic_read() and atomic_set() do no imply any memory barrier > > on most architectures, as far as I can tell. They essentially become > > READ_ONCE() and WRITE_ONCE() calls, which guarantee that the compiler > > will not merge or split loads or stores, or reorder them with respect to > > load and stores to the *same* memory location, but nothing else. I think > > you need to add proper barriers, and you can then probably also drop > > usage of atomic_t. You are absolutely right! Only a subset of atomic implies memory barriers. Found this doc particularly good: https://www.kernel.org/doc/html/v5.10/core-api/atomic_ops.html > > > > > + if (cancel_work_sync(&w->work)) > > > + uvc_ctrl_status_event(w->chain, w->ctrl, w->data); > > > usb_kill_urb(dev->int_urb); > > > > This should get rid of the main race (possibly save the barrier issue), > > but it's not the most efficient option, and can still be problematic. > > Consider the following case: > > > > CPU0 CPU1 > > ---- ---- > > > > void uvc_status_stop(struct uvc_device *dev) uvc_ctrl_status_event_async() > > { { > > ... > > atomic_set(&dev->flush_status, 1); ... > > if (cancel_work_sync()) > > ... > > schedule_work(); > > usb_kill_urb(); } > > } > > > > The usb_kill_urb() call ensures that uvc_ctrl_status_event_async() > > completes before uvc_status_stop() returns, but there will still be work > > scheduled in that case. uvc_ctrl_status_event_work() will be run later, > > and as flush_status is set to 1, the function will not resubmit the URB. > > That fixes the main race, but leaves the asynchronous control status > > event handling for after uvc_status_stop() returns, which isn't great. > > > > Now, if we consider that uvc_status_start() could be called shortly > > after uvc_status_stop(), we may get in a situation where > > uvc_status_start() will reset flush_status to 0 before > > uvc_ctrl_status_event_async() runs. Both uvc_ctrl_status_event_async() > > and uvc_status_start() will thus submit the same URB. > > > > You can't fix this by first killing the URB and then cancelling the > > work, as there would then be a risk that uvc_ctrl_status_event_work() > > would be running in parallel, going past the flush_status check before > > flush_status gets set to 1 in uvc_status_stop(), and submitting the URB > > after usb_kill_urb() is called. > > > > I think a good fix would be to check flush_status in > > uvc_ctrl_status_event_async() and avoid the schedule_work() call in that > > case. If we do that, then we will be losing an event. I would rather call cancel_work_sync() again after usb_kill_urb(). > >You could then also move the atomic_set(..., 0) call from > > uvc_status_start() to the end of uvc_status_stop() (again with proper > > barriers). Will do that, it is more "elegant". > > Also, as all of this is tricky, comments in appropriate places in the > code would be very helpful to avoid breaking things later. > > > Could you please check the memory barriers and test the above proposal > > (after double-checking it of course, I may have missed something) ? > > > > > } > > > diff --git a/drivers/media/usb/uvc/uvcvideo.h b/drivers/media/usb/uvc/uvcvideo.h > > > index df93db259312..1274691f157f 100644 > > > --- a/drivers/media/usb/uvc/uvcvideo.h > > > +++ b/drivers/media/usb/uvc/uvcvideo.h > > > @@ -560,6 +560,7 @@ struct uvc_device { > > > struct usb_host_endpoint *int_ep; > > > struct urb *int_urb; > > > u8 *status; > > > + atomic_t flush_status; > > > struct input_dev *input; > > > char input_phys[64]; > > > > > -- > Regards, > > Laurent Pinchart -- Ricardo Ribalda