public inbox for linux-usb@vger.kernel.org
 help / color / mirror / Atom feed
From: "Katiyar, Pooja" <pooja.katiyar@linux.intel.com>
To: Dmitry Baryshkov <dmitry.baryshkov@oss.qualcomm.com>,
	Pooja Katiyar <pooja.katiyar@intel.com>
Cc: linux-usb@vger.kernel.org, gregkh@linuxfoundation.org,
	heikki.krogerus@linux.intel.com
Subject: Re: [PATCH v5 1/4] usb: typec: ucsi: Update UCSI structure to have message in and message out fields
Date: Wed, 17 Dec 2025 17:17:11 -0800	[thread overview]
Message-ID: <66950556-3313-470b-bb51-82e14ce144cd@linux.intel.com> (raw)
In-Reply-To: <2tlusuyqp2jif37smm57skeo3g2trzdspirv6minlopo5cey7m@z23tworiljkg>

Hello,

On Fri, Dec 12, 2025 at 06:58:06PM -0800, Dmitry Baryshkov wrote:
> On Thu, Oct 30, 2025 at 07:48:55AM -0700, Pooja Katiyar wrote:
>> Update UCSI structure by adding fields for incoming and outgoing
>> messages. Update .sync_control function and other related functions
>> to use these new fields within the UCSI structure, instead of handling
>> them as separate parameters.
>>
>> Reviewed-by: Heikki Krogerus <heikki.krogerus@linux.intel.com>
>> Signed-off-by: Pooja Katiyar <pooja.katiyar@intel.com>
>> ---
>> Changelog v3:
>> - Added message fields to UCSI structure and updated sync_control handling.
> 
> Colleagues, after looking at this patch I have a question. What prevents
> message_{in,out}{,_size} to be modified concurrently? While we have PPM
> lock around command submission, size fields and buffers are modified /
> accessed outside of the lock. Granted all the notifications and async
> nature of the UCSI and USB-C protocols, what prevents two commands from
> being executed at the same time with one of the execution threads
> accessing the results returned by the other command?
> 
> In other words:
> 
> - thread A sets message_in_size, calls ucsi_send_command(CMD_A), which
>   takes PPM lock
> 
>    - meanwhile thread B writes another value to message_in_size and
>      calls ucsi_send_command(CMD_B), which now waits on PPM lock
> 
> - thread A finishes execution of the CMD_A, copies data (with the
>   wrong size!) to the message_in_buf, then it releases PPM lock.
> 
> - thread A gets preempted
> 
>     - thread B gets scheduled, it takes PPM lock, executes CMD_B, gets
>       data into the message_in_buf and finally it releases PPM lock
> 
> - finally at some later point thread A gets scheduled, it accesses
>   message_in_buf, reading data that has been overwritten by CMD_B
>   execution.
> 
> WDYT?

Thank you for identifying this race condition. You are correct about the
concurrent access issue with the message buffer fields.

Here are two potential approaches I see to resolve this:

Option 1: Separate mutex locks for message variables
Add a dedicated message_lock mutex to protect message_{in,out}{,_size}.
message_{in,out}{,_size} will only be modified within the message_lock
protection.

	mutex_lock(&ucsi->message_lock);
	ucsi->message_in_size = size;
	ret = ucsi_send_command(ucsi, cmd);
	memcpy(buffer, ucsi->message_in, size);
	mutex_unlock(&ucsi->message_lock);

Option 2: Pass message variables as function arguments
Pass message buffers and sizes as parameters down to where ppm_lock is 
acquired, ensuring protection throughout command execution.

	int ucsi_send_command(ucsi, cmd, msg_in_buf, msg_in_size, msg_out_buf,
			      msg_out_size) {
    		mutex_lock(&ucsi->ppm_lock);
    		ucsi->message_in_size = msg_in_size;
    		// execute command and copy results to msg_in_buf
		memcpy(msg_in_buf, ucsi->message_in, msg_in_size);
    		mutex_unlock(&ucsi->ppm_lock);
	}

I'm leaning toward Option 1 as it resolves the concern of passing too many args.
What are your thoughts on the suggested options or do you have alternative
suggestions? 

Best regards,
Pooja

  reply	other threads:[~2025-12-18  1:17 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-10-30 14:48 [PATCH v5 0/4] usb: typec: ucsi: Add support for SET_PDOS command Pooja Katiyar
2025-10-30 14:48 ` [PATCH v5 1/4] usb: typec: ucsi: Update UCSI structure to have message in and message out fields Pooja Katiyar
2025-12-13  2:58   ` Dmitry Baryshkov
2025-12-18  1:17     ` Katiyar, Pooja [this message]
2025-12-18  1:22       ` Dmitry Baryshkov
2025-12-23 12:06         ` Heikki Krogerus
2025-12-23 20:18           ` Katiyar, Pooja
2025-10-30 14:48 ` [PATCH v5 2/4] usb: typec: ucsi: Add support for message out data structure Pooja Katiyar
2025-10-30 14:48 ` [PATCH v5 3/4] usb: typec: ucsi: Enable debugfs for message_out " Pooja Katiyar
2025-10-30 14:48 ` [PATCH v5 4/4] usb: typec: ucsi: Add support for SET_PDOS command Pooja Katiyar
     [not found] ` <MN0PR11MB5985412F8014513916F7F4FD81CEA@MN0PR11MB5985.namprd11.prod.outlook.com>
2025-11-11  0:21   ` [PATCH v5 0/4] " Pathak, Asutosh
2025-11-11  0:46     ` gregkh

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=66950556-3313-470b-bb51-82e14ce144cd@linux.intel.com \
    --to=pooja.katiyar@linux.intel.com \
    --cc=dmitry.baryshkov@oss.qualcomm.com \
    --cc=gregkh@linuxfoundation.org \
    --cc=heikki.krogerus@linux.intel.com \
    --cc=linux-usb@vger.kernel.org \
    --cc=pooja.katiyar@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox