Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp2202092lqb; Mon, 27 May 2024 11:02:54 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWFLqhRMolb1wmMc1BVhG5gmcCtLUpzTdpQ/8piZvpCY7lFSupjLGMRQza4wgccRL+H95Rmb+zuR87CTuamTPgStAp18OQWk/h27oDeiw== X-Google-Smtp-Source: AGHT+IGUoqSyKJHQR85hHkl4IIjxK5XDYsP7vRdPIAjIvgpLSjJOgQyLH898dqFvFrLhwczNIVLq X-Received: by 2002:a17:902:f987:b0:1e6:7700:1698 with SMTP id d9443c01a7336-1f448c266e3mr86301985ad.35.1716832973825; Mon, 27 May 2024 11:02:53 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716832973; cv=pass; d=google.com; s=arc-20160816; b=zpvk0DwBW51SrfckydnTzCObV+DAaWvQRwbf6ORmgHKppcACCyfqYPFcztrWcYpNud g6I1LIKvnQjTNsnIOgf2oty1rSFTYUKkBBMgXJwCkLh08DqQtWE4qqeZg8BqgIXfJU96 jG8V9s/N/LhOehz26AJ/wAWKlGhUC/JpbP7RCDWtfLu6jPk8NKCRrwOr2+o/OensJyps Op2hyJ50Y0h5RshJUcrywhojlDrXH6PkmJamrF66KdlubwruKBrX28diUBxPnHuJMlCX /DgIhG0BNeyhm4utcyryoB7S8wkTV9y9dSXUQRiBRqxyov/L+F7yhUWqNsWHcFaLCCCj 2aUw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=pEWfxwCTmdixhELCn7XIjki2dS3F2Sosog69ucpgf7U=; fh=rkraikRHCFJTluuheplx+qlwCP3SJZSDkdhgtMGwXno=; b=wNk5uUPwY96ArpiThLoCzKwyI/IgOZCC1n2OSGny3DKKyE8xlAqzmGJMVHC2J9NSBh eyIfKoRByct+0vh3VVgWrPBi5G1HVU7R4uaEKPCulBUPgTfSkh51XCh4z61kdkBpTrfG 5bB42pTsH67zNIvbLS7j0zUv0yrpBTNFLx9Y8Aem7oSxDc2fnu5R9ir+E2VTf9AcGQD6 l/zpCW0s1bGdL6PpWel+jLeVIsTmMHYF1r0CpmM7ARimswKGI3VasmarmvT+sDpjEUAj F/g0DQcUX/0ufqK6Add6LUVgB4gJlUqRLJNaNMoQ5jKPGC6Y9ny9GhHPgRkwQiZR0B3l gJJQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b="fc/XjUnZ"; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-191294-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-191294-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id d9443c01a7336-1f44c9ae57bsi64717005ad.419.2024.05.27.11.02.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 27 May 2024 11:02:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-191294-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b="fc/XjUnZ"; arc=pass (i=1 spf=pass spfdomain=linux.dev dkim=pass dkdomain=linux.dev dmarc=pass fromdomain=linux.dev); spf=pass (google.com: domain of linux-kernel+bounces-191294-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-191294-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 123C5B24EED for ; Mon, 27 May 2024 17:36:03 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1CFB215F30F; Mon, 27 May 2024 17:35:51 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b="fc/XjUnZ" Received: from out-182.mta1.migadu.com (out-182.mta1.migadu.com [95.215.58.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0B801155CA7 for ; Mon, 27 May 2024 17:35:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=95.215.58.182 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716831350; cv=none; b=ps5kdoooNJ8vps/dyoWkRMwmpJIlp8fHfrj89kxI2vGwG2xkSJCILXk5Qoo5iEp9HYIvuI1X5atQsVQSp9IydBAU9WL02gYeD92PZPwkGkN2aVbTMepDrxReLk0qe8bubMbAXohutO/w1o4l85Fd33I+irGaJpjkf2CkVDwuIGo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716831350; c=relaxed/simple; bh=eqsM9OWmuqNXSpnv48+FEe/l3/yyOY8xDbhO8EW91Sw=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=nmfsF3AJRE4d3jtmwSNTpno3MuamFJB7dMmz+rcE6knvxj8wwQZ5YxPjpZYXHHDTjP6CAYIpIxMhZWiSIB2kr7E1VG8dOW9i5FIM3J41QtoBuNJbjRNCvYk1cq3Tkda0U39LhBCm7uxmcFv6GJC4D2srKeddWM6L++yFe6IZ1Yw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev; spf=pass smtp.mailfrom=linux.dev; dkim=pass (1024-bit key) header.d=linux.dev header.i=@linux.dev header.b=fc/XjUnZ; arc=none smtp.client-ip=95.215.58.182 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.dev Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.dev X-Envelope-To: stern@rowland.harvard.edu DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1716831345; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=pEWfxwCTmdixhELCn7XIjki2dS3F2Sosog69ucpgf7U=; b=fc/XjUnZYKe5+qYincocV22pjc/DU3WBGv7dtgPIjAT7Jc7/Dp/WFkOPwv4JW5cU0Jg3NV HacSXngspRrEGU5yJoty6Nk3MB2LukGsKVGblfIvpwNYHtJcPiEUjtXrPksZkzku09Zp6k ztYUV7lUpx0WLU+vzEfBN9Ri50l6r28= X-Envelope-To: gregkh@linuxfoundation.org X-Envelope-To: andreyknvl@gmail.com X-Envelope-To: dvyukov@google.com X-Envelope-To: elver@google.com X-Envelope-To: glider@google.com X-Envelope-To: kasan-dev@googlegroups.com X-Envelope-To: penguin-kernel@i-love.sakura.ne.jp X-Envelope-To: tj@kernel.org X-Envelope-To: linux-usb@vger.kernel.org X-Envelope-To: linux-kernel@vger.kernel.org X-Envelope-To: stable@vger.kernel.org X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: andrey.konovalov@linux.dev To: Alan Stern , Greg Kroah-Hartman Cc: Andrey Konovalov , Dmitry Vyukov , Marco Elver , Alexander Potapenko , kasan-dev@googlegroups.com, Tetsuo Handa , Tejun Heo , linux-usb@vger.kernel.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: [PATCH v3] kcov, usb: disable interrupts in kcov_remote_start_usb_softirq Date: Mon, 27 May 2024 19:35:38 +0200 Message-Id: <20240527173538.4989-1-andrey.konovalov@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT From: Andrey Konovalov After commit 8fea0c8fda30 ("usb: core: hcd: Convert from tasklet to BH workqueue"), usb_giveback_urb_bh() runs in the BH workqueue with interrupts enabled. Thus, the remote coverage collection section in usb_giveback_urb_bh()-> __usb_hcd_giveback_urb() might be interrupted, and the interrupt handler might invoke __usb_hcd_giveback_urb() again. This breaks KCOV, as it does not support nested remote coverage collection sections within the same context (neither in task nor in softirq). Update kcov_remote_start/stop_usb_softirq() to disable interrupts for the duration of the coverage collection section to avoid nested sections in the softirq context (in addition to such in the task context, which are already handled). Reported-by: Tetsuo Handa Closes: https://lore.kernel.org/linux-usb/0f4d1964-7397-485b-bc48-11c01e2fcbca@I-love.SAKURA.ne.jp/ Closes: https://syzkaller.appspot.com/bug?extid=0438378d6f157baae1a2 Suggested-by: Alan Stern Fixes: 8fea0c8fda30 ("usb: core: hcd: Convert from tasklet to BH workqueue") Cc: stable@vger.kernel.org Acked-by: Dmitry Vyukov Signed-off-by: Andrey Konovalov --- Changes v2->v3: - Cc: stable@vger.kernel.org. --- drivers/usb/core/hcd.c | 12 ++++++----- include/linux/kcov.h | 47 ++++++++++++++++++++++++++++++++++-------- 2 files changed, 45 insertions(+), 14 deletions(-) diff --git a/drivers/usb/core/hcd.c b/drivers/usb/core/hcd.c index c0e005670d67..fb1aa0d4fc28 100644 --- a/drivers/usb/core/hcd.c +++ b/drivers/usb/core/hcd.c @@ -1623,6 +1623,7 @@ static void __usb_hcd_giveback_urb(struct urb *urb) struct usb_hcd *hcd = bus_to_hcd(urb->dev->bus); struct usb_anchor *anchor = urb->anchor; int status = urb->unlinked; + unsigned long flags; urb->hcpriv = NULL; if (unlikely((urb->transfer_flags & URB_SHORT_NOT_OK) && @@ -1640,13 +1641,14 @@ static void __usb_hcd_giveback_urb(struct urb *urb) /* pass ownership to the completion handler */ urb->status = status; /* - * This function can be called in task context inside another remote - * coverage collection section, but kcov doesn't support that kind of - * recursion yet. Only collect coverage in softirq context for now. + * Only collect coverage in the softirq context and disable interrupts + * to avoid scenarios with nested remote coverage collection sections + * that KCOV does not support. + * See the comment next to kcov_remote_start_usb_softirq() for details. */ - kcov_remote_start_usb_softirq((u64)urb->dev->bus->busnum); + flags = kcov_remote_start_usb_softirq((u64)urb->dev->bus->busnum); urb->complete(urb); - kcov_remote_stop_softirq(); + kcov_remote_stop_softirq(flags); usb_anchor_resume_wakeups(anchor); atomic_dec(&urb->use_count); diff --git a/include/linux/kcov.h b/include/linux/kcov.h index b851ba415e03..1068a7318d89 100644 --- a/include/linux/kcov.h +++ b/include/linux/kcov.h @@ -55,21 +55,47 @@ static inline void kcov_remote_start_usb(u64 id) /* * The softirq flavor of kcov_remote_*() functions is introduced as a temporary - * work around for kcov's lack of nested remote coverage sections support in - * task context. Adding support for nested sections is tracked in: - * https://bugzilla.kernel.org/show_bug.cgi?id=210337 + * workaround for KCOV's lack of nested remote coverage sections support. + * + * Adding support is tracked in https://bugzilla.kernel.org/show_bug.cgi?id=210337. + * + * kcov_remote_start_usb_softirq(): + * + * 1. Only collects coverage when called in the softirq context. This allows + * avoiding nested remote coverage collection sections in the task context. + * For example, USB/IP calls usb_hcd_giveback_urb() in the task context + * within an existing remote coverage collection section. Thus, KCOV should + * not attempt to start collecting coverage within the coverage collection + * section in __usb_hcd_giveback_urb() in this case. + * + * 2. Disables interrupts for the duration of the coverage collection section. + * This allows avoiding nested remote coverage collection sections in the + * softirq context (a softirq might occur during the execution of a work in + * the BH workqueue, which runs with in_serving_softirq() > 0). + * For example, usb_giveback_urb_bh() runs in the BH workqueue with + * interrupts enabled, so __usb_hcd_giveback_urb() might be interrupted in + * the middle of its remote coverage collection section, and the interrupt + * handler might invoke __usb_hcd_giveback_urb() again. */ -static inline void kcov_remote_start_usb_softirq(u64 id) +static inline unsigned long kcov_remote_start_usb_softirq(u64 id) { - if (in_serving_softirq()) + unsigned long flags = 0; + + if (in_serving_softirq()) { + local_irq_save(flags); kcov_remote_start_usb(id); + } + + return flags; } -static inline void kcov_remote_stop_softirq(void) +static inline void kcov_remote_stop_softirq(unsigned long flags) { - if (in_serving_softirq()) + if (in_serving_softirq()) { kcov_remote_stop(); + local_irq_restore(flags); + } } #ifdef CONFIG_64BIT @@ -103,8 +129,11 @@ static inline u64 kcov_common_handle(void) } static inline void kcov_remote_start_common(u64 id) {} static inline void kcov_remote_start_usb(u64 id) {} -static inline void kcov_remote_start_usb_softirq(u64 id) {} -static inline void kcov_remote_stop_softirq(void) {} +static inline unsigned long kcov_remote_start_usb_softirq(u64 id) +{ + return 0; +} +static inline void kcov_remote_stop_softirq(unsigned long flags) {} #endif /* CONFIG_KCOV */ #endif /* _LINUX_KCOV_H */ -- 2.25.1