Received: by 2002:ab2:6816:0:b0:1f9:5764:f03e with SMTP id t22csp2703576lqo; Mon, 20 May 2024 13:59:16 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVVLNzudoBr8S6ALpkNgkbpzBB3I6ynkCJbSs3Coccd+V5Jk2NIYV+D4+INZtlAWG92qBROQygFybaiQqLfkzqApaAUwuHiSd0qhrw5+A== X-Google-Smtp-Source: AGHT+IFAKw0VwQVUC4HI8vuysq6tf7M7lQnvvApd0LZYJDRpW36Q/FLdvtJEI0OdiAXDoH9zlcfE X-Received: by 2002:a17:903:244c:b0:1f2:ff65:d2d8 with SMTP id d9443c01a7336-1f2ff65d60bmr57178985ad.27.1716238756644; Mon, 20 May 2024 13:59:16 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716238756; cv=pass; d=google.com; s=arc-20160816; b=fzNVL1GKREYFuFTVXkSAONrDeSKMvMO1HHT9zjIe4QiS0qT5TY9m0zYSJExj/N1EER p21RNxl9UEQlrdY8H5Wjc7zNCfIBGzAskkywLEg6nw8Tt4t/q7l+6z/LvxL7qzlfqT1O BIq7USkDIW0aVg8RVDDsOdi6S+ezEbSIC9inX/HMAjccJguLtjNBmmZCEr6aW8LrFCwu BQpRCiTfC0TqaQqAlHtMCdRJJVmpaLOG3dibDUdmpkZrSckpGRweMsF3j8dEQQvneoC3 9HYZvyOv4HqFnvVD+AyGpgHFz/8+/sHkD3Ky2YCbiw2aUJkb0unfvIGpjvSii9+EPQTU 8N7Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=dVtkm6Cg+QhrfgIVN0pjJZdjkLBJfP8oJdEHuFJPJQU=; fh=vzUw7PUiCZFQ+9TOy7Fqic/NTmihsgiz7wHWl8OdU2Q=; b=WR+vPrvI7AkpMe0VdXhqwPJUkZRGYU6FwmAFxp2Vox3IO601KGPnd5/rUYCf18Kh5B 2Is5n37a+xz4bXMei/MfIp61Q3lwKzH6aoM9ULbVb+Vdq4NiSDhcZBrnChDJCCu+ewry iJmDcSJ6joFNtcOQo6WeDc1M6hU9IFJpw93nHSBPTfZ/y5zg4z0A4uYY0Jwcg6cPNGTx P8wFmt44lIVsYUMJDB3lsMcvdxYOaq/Y01yuB5sAhQejw6R1mOKYSkryA+VE1MvFJfii yPXFEk7o7WeQnY3eQBvfqZBYF+qJ1efMQgVDH3U8VwZVk10kpkQqaXCyD2QYRZrAuekO qqlQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=C1JjhjK3; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-184174-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-184174-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id d9443c01a7336-1ef0c26a14asi33376395ad.602.2024.05.20.13.59.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 May 2024 13:59:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-184174-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=C1JjhjK3; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-184174-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-184174-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 2ECF4281DCE for ; Mon, 20 May 2024 20:59:16 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 81CDE139CF1; Mon, 20 May 2024 20:59:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="C1JjhjK3" Received: from out-180.mta0.migadu.com (out-180.mta0.migadu.com [91.218.175.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4A1DF168BD for ; Mon, 20 May 2024 20:59:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=91.218.175.180 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716238745; cv=none; b=FRXLj6Hg/HKtCLgR9DAUzXZjJ7ecX5mIjKqXD2KikFksJEpGgPSOuKZ3y19460ecD1iNfPf9gmIe3a37X2agvoPXQttGrUrVDY1cW7zfIwxOSLMWRfyzCs59TkIBRkd74ikNfIevQ/7+XO8F+oqAKRGu4ZIqIVASuuITxxf/h6U= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716238745; c=relaxed/simple; bh=y7/tHkkU+6LM/sgkkjIZQzGhCN3OQBbKgY5ooxhPzP4=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=kS9FhzI6tb9MxXCOTf5KktOKpO3luECtn6AG9d9NRDGD/rOV82Et5LgxRQZ+IiicjZJ1Y1z23OlKbC6y+FEXvk33XcJil4TqTiZnG0iLoUHfcgkC0YLzO6O1rApkWLX6qH1NaE3Utj/5oVOfnFnpFEP0cN+oTsiPMHjq9FTlyBU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=C1JjhjK3; arc=none smtp.client-ip=91.218.175.180 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev X-Envelope-To: stern@rowland.harvard.edu DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1716238740; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=dVtkm6Cg+QhrfgIVN0pjJZdjkLBJfP8oJdEHuFJPJQU=; b=C1JjhjK3Pqg679wyMjVHSms1bdU0ECv8draV03dcUKEV4zOhFgXdAD0U+Rj/yjW6ouYM3Z xyqddroJwKLa/md5O2X55MpRyNbuELtln3f2RROOinm9I5bw1Qf1053pDCaLgqL9j4pxZ+ rC/dX8KF8d81RHiPRxxqSJL4nEKV5dg= X-Envelope-To: gregkh@linuxfoundation.org X-Envelope-To: andreyknvl@gmail.com X-Envelope-To: dvyukov@google.com X-Envelope-To: elver@google.com X-Envelope-To: glider@google.com X-Envelope-To: kasan-dev@googlegroups.com X-Envelope-To: penguin-kernel@i-love.sakura.ne.jp X-Envelope-To: tj@kernel.org X-Envelope-To: linux-usb@vger.kernel.org X-Envelope-To: linux-kernel@vger.kernel.org X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: andrey.konovalov@linux.dev To: Alan Stern , Greg Kroah-Hartman Cc: Andrey Konovalov , Dmitry Vyukov , Marco Elver , Alexander Potapenko , kasan-dev@googlegroups.com, Tetsuo Handa , Tejun Heo , linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] kcov, usb: disable interrupts in kcov_remote_start_usb_softirq Date: Mon, 20 May 2024 22:58:56 +0200 Message-Id: <20240520205856.162910-1-andrey.konovalov@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT From: Andrey Konovalov After commit 8fea0c8fda30 ("usb: core: hcd: Convert from tasklet to BH workqueue"), usb_giveback_urb_bh() runs in the BH workqueue with interrupts enabled. Thus, the remote coverage collection section in usb_giveback_urb_bh()-> __usb_hcd_giveback_urb() might be interrupted, and the interrupt handler might invoke __usb_hcd_giveback_urb() again. This breaks KCOV, as it does not support nested remote coverage collection sections within the same context (neither in task nor in softirq). Update kcov_remote_start/stop_usb_softirq() to disable interrupts for the duration of the coverage collection section to avoid nested sections in the softirq context (in addition to such in the task context, which are already handled). Reported-by: Tetsuo Handa Closes: https://lore.kernel.org/linux-usb/0f4d1964-7397-485b-bc48-11c01e2fcbca@I-love.SAKURA.ne.jp/ Closes: https://syzkaller.appspot.com/bug?extid=0438378d6f157baae1a2 Suggested-by: Alan Stern Fixes: 8fea0c8fda30 ("usb: core: hcd: Convert from tasklet to BH workqueue") Signed-off-by: Andrey Konovalov --- drivers/usb/core/hcd.c | 12 +++++++----- include/linux/kcov.h | 44 +++++++++++++++++++++++++++++++++--------- 2 files changed, 42 insertions(+), 14 deletions(-) diff --git a/drivers/usb/core/hcd.c b/drivers/usb/core/hcd.c index c0e005670d67..fb1aa0d4fc28 100644 --- a/drivers/usb/core/hcd.c +++ b/drivers/usb/core/hcd.c @@ -1623,6 +1623,7 @@ static void __usb_hcd_giveback_urb(struct urb *urb) struct usb_hcd *hcd = bus_to_hcd(urb->dev->bus); struct usb_anchor *anchor = urb->anchor; int status = urb->unlinked; + unsigned long flags; urb->hcpriv = NULL; if (unlikely((urb->transfer_flags & URB_SHORT_NOT_OK) && @@ -1640,13 +1641,14 @@ static void __usb_hcd_giveback_urb(struct urb *urb) /* pass ownership to the completion handler */ urb->status = status; /* - * This function can be called in task context inside another remote - * coverage collection section, but kcov doesn't support that kind of - * recursion yet. Only collect coverage in softirq context for now. + * Only collect coverage in the softirq context and disable interrupts + * to avoid scenarios with nested remote coverage collection sections + * that KCOV does not support. + * See the comment next to kcov_remote_start_usb_softirq() for details. */ - kcov_remote_start_usb_softirq((u64)urb->dev->bus->busnum); + flags = kcov_remote_start_usb_softirq((u64)urb->dev->bus->busnum); urb->complete(urb); - kcov_remote_stop_softirq(); + kcov_remote_stop_softirq(flags); usb_anchor_resume_wakeups(anchor); atomic_dec(&urb->use_count); diff --git a/include/linux/kcov.h b/include/linux/kcov.h index b851ba415e03..ebcfc271aee3 100644 --- a/include/linux/kcov.h +++ b/include/linux/kcov.h @@ -55,21 +55,47 @@ static inline void kcov_remote_start_usb(u64 id) /* * The softirq flavor of kcov_remote_*() functions is introduced as a temporary - * work around for kcov's lack of nested remote coverage sections support in - * task context. Adding support for nested sections is tracked in: - * https://bugzilla.kernel.org/show_bug.cgi?id=210337 + * workaround for KCOV's lack of nested remote coverage sections support. + * + * Adding support is tracked in https://bugzilla.kernel.org/show_bug.cgi?id=210337. + * + * kcov_remote_start_usb_softirq(): + * + * 1. Only collects coverage when called in the softirq context. This allows + * avoiding nested remote coverage collection sections in the task context. + * For example, USB/IP calls usb_hcd_giveback_urb() in the task context + * within an existing remote coverage collection section. Thus, KCOV should + * not attempt to start collecting coverage within the coverage collection + * section in __usb_hcd_giveback_urb() in this case. + * + * 2. Disables interrupts for the duration of the coverage collection section. + * This allows avoiding nested remote coverage collection sections in the + * softirq context (a softirq might occur during the execution of a work in + * the BH workqueue, which runs with in_serving_softirq() > 0). + * For example, usb_giveback_urb_bh() runs in the BH workqueue with + * interrupts enabled, so __usb_hcd_giveback_urb() might be interrupted in + * the middle of its remote coverage collection section, and the interrupt + * handler might invoke __usb_hcd_giveback_urb() again. */ -static inline void kcov_remote_start_usb_softirq(u64 id) +static inline unsigned long kcov_remote_start_usb_softirq(u64 id) { - if (in_serving_softirq()) + unsigned long flags = 0; + + if (in_serving_softirq()) { + local_irq_save(flags); kcov_remote_start_usb(id); + } + + return flags; } -static inline void kcov_remote_stop_softirq(void) +static inline void kcov_remote_stop_softirq(unsigned long flags) { - if (in_serving_softirq()) + if (in_serving_softirq()) { kcov_remote_stop(); + local_irq_restore(flags); + } } #ifdef CONFIG_64BIT @@ -103,8 +129,8 @@ static inline u64 kcov_common_handle(void) } static inline void kcov_remote_start_common(u64 id) {} static inline void kcov_remote_start_usb(u64 id) {} -static inline void kcov_remote_start_usb_softirq(u64 id) {} -static inline void kcov_remote_stop_softirq(void) {} +static inline unsigned long kcov_remote_start_usb_softirq(u64 id) {} +static inline void kcov_remote_stop_softirq(unsigned long flags) {} #endif /* CONFIG_KCOV */ #endif /* _LINUX_KCOV_H */ -- 2.25.1