[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID:
<TYUPR06MB62173B558D42E47CD7BCDF7AD2202@TYUPR06MB6217.apcprd06.prod.outlook.com>
Date: Tue, 19 Nov 2024 12:33:01 +0000
From: 胡连勤 <hulianqin@...o.com>
To: Prashanth K <quic_prashk@...cinc.com>, "gregkh@...uxfoundation.org"
<gregkh@...uxfoundation.org>, "quic_jjohnson@...cinc.com"
<quic_jjohnson@...cinc.com>, "mwalle@...nel.org" <mwalle@...nel.org>
CC: "linux-usb@...r.kernel.org" <linux-usb@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
opensource.kernel <opensource.kernel@...o.com>
Subject:
答复: [PATCH] usb: gadget: u_serial: Fix the issue that gs_start_io crashed due to accessing null pointer
Hello Prashanth:
> > Considering that in some extreme cases, when u_serial driver is
> > accessed by multiple threads, Thread A is executing the open operation
> > and calling the gs_open, Thread B is executing the disconnect
> > operation and calling the gserial_disconnect function,The
> > port->port_usb pointer will be set to NULL.
> >
> [...]
> > ---
> > drivers/usb/gadget/function/u_serial.c | 25 +++++++++++++++----------
> > 1 file changed, 15 insertions(+), 10 deletions(-)
> >
> > diff --git a/drivers/usb/gadget/function/u_serial.c
> > b/drivers/usb/gadget/function/u_serial.c
> > index 0a8c05b2746b..9ab2dbed60a8 100644
> > --- a/drivers/usb/gadget/function/u_serial.c
> > +++ b/drivers/usb/gadget/function/u_serial.c
> > @@ -124,6 +124,7 @@ struct gs_port {
> > struct kfifo port_write_buf;
> > wait_queue_head_t drain_wait; /* wait while writes drain */
> > bool write_busy;
> > + bool read_busy;
> > wait_queue_head_t close_wait;
> > bool suspended; /* port suspended */
> > bool start_delayed; /* delay start when
> suspended */
> > @@ -331,9 +332,11 @@ __acquires(&port->port_lock)
> > /* drop lock while we call out; the controller driver
> > * may need to call us back (e.g. for disconnect)
> > */
> > + port->read_busy = true;
> > spin_unlock(&port->port_lock);
> > status = usb_ep_queue(out, req, GFP_ATOMIC);
> > spin_lock(&port->port_lock);
> > + port->read_busy = false;
> >
> > if (status) {
> > pr_debug("%s: %s %s err %d\n",
> > @@ -1412,19 +1415,21 @@ void gserial_disconnect(struct gserial *gser)
> > /* tell the TTY glue not to do I/O here any more */
> > spin_lock(&port->port_lock);
> >
> > - gs_console_disconnect(port);
> > + if (!port->read_busy) {
> start_tx/rx rely on port->port_usb for queuing the requests, and if its not
> null during disconnect, tx/rx would keep on queuing requests to UDC even
> after disconnect (which is not ideal). Here in your case, after read_busy is set,
> start_rx would queue something outside of spinlock, meanwhile disconnect
> happens but port_usb is still valid (because read_busy is set) and start_rx
> would break early. But start_tx could continue queuing into disconnected
> UDC (if 'started' is non-zero, which could happen due to timing). Can't you try
> something like this,
>
> --- a/drivers/usb/gadget/function/u_serial.c
> +++ b/drivers/usb/gadget/function/u_serial.c
> @@ -579,9 +579,12 @@ static int gs_start_io(struct gs_port *port)
> * we didn't in gs_start_tx() */
> tty_wakeup(port->port.tty);
> } else {
> - gs_free_requests(ep, head, &port->read_allocated);
> - gs_free_requests(port->port_usb->in, &port->write_pool,
> - &port->write_allocated);
> + /* Free reqs only if we are still connected */
> + if (port->port_usb) {
> + gs_free_requests(ep, head, &port->read_allocated);
> + gs_free_requests(port->port_usb->in,
> &port->write_pool,
> + &port->write_allocated);
> + }
> status = -EIO;
> }
>
> This will skip freeing reqs (and your crash) if port_usb is null and freeing
> would be taken care by disconnect callback.
>
>
First of all, the patch you gave can solve the problem we are currently facing.
When we first encountered this problem, we also thought about adding a null check operation to deal with it,
but we saw that the entry of this function (gs_start_io) had a null check operation for port->port_usb, so I gave up
the idea of null check during free_req (maybe I made a simple problem complicated),
and thought about optimizing it from the software logic, so that the port->port_usb pointer is always valid before gs_start_io is executed.
Thanks
Powered by blists - more mailing lists