Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4496948ybx; Mon, 4 Nov 2019 14:23:07 -0800 (PST) X-Google-Smtp-Source: APXvYqxY9O+0J/9FssA1LB3J9Oiy7JAJbGXIXFesjin5dd0YeIhvDChS680HuHzgv1agM273OAio X-Received: by 2002:a50:9269:: with SMTP id j38mr31848683eda.5.1572906187795; Mon, 04 Nov 2019 14:23:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572906187; cv=none; d=google.com; s=arc-20160816; b=XcvnZ5GbaP5ntWPGKyUiZ4uHNVKLblscmuryEww5jQWYPuPpFYx6oMnVc/RgL3MF4r SBr9VnMY4+vgiwcYILOCRHeAjz+8QI8LIilmldgwHsQ6YjeoThZcc3GVnZqsYMKUs6ro QYxvGA9QMFiji06vmNEJz/1FAJAmZ4pyZa+RW1Hy59QJxiLpOVMzzOdXPRUPq+OWuaOM k3d+96t3Pth8XfcdQFge50v3/6X+8Q6sWbVHgg3eXTbpCLYesxyf4HzM6hZhCOGDlM2d yl1ba5RfXort5hpkkLbt+nrZKJ0vDlJ9h6hc3parSaXya1klFvvb5SRmOUheWyIgXhke SMzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mWcpvro93UtjrsOOel8DYXNUYMZh/S8SDmRQcoPU7RQ=; b=gDDR5Wwd9p9YSF/9gSjGTvbKyD+8h9eGN8VCw4rx+yCwlWNXcF20YueL5uMWtpALha 4xzRs1+WDyn6i3y3ayqDGhSnMCoKb7ScpJZvv09LX5Twey+teGYPoJMMcanatvVZ+AeJ 82fB7oYq2qNRpaQJAOTLTfh6cxv4bR6YJlIGWVrdluRBEUNJS5A/aH/Zawp3Tu6Se8MW lsAQY6Hm2JhVVw4RBq7RJSocvYFow181VFp7qi21zawirANMMYgAiYHnc8G6BWmaLpdW u6zRlKsg1YilBN5gPm/KRf3Yq3+NlDIf6h08Kyqo2eNwgQZDVk8diZgmlfNlIKQfyj3m NT6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=eCvfhjhO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t21si9136648edi.123.2019.11.04.14.22.41; Mon, 04 Nov 2019 14:23:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=eCvfhjhO; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388516AbfKDV5D (ORCPT + 99 others); Mon, 4 Nov 2019 16:57:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:52800 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388497AbfKDV47 (ORCPT ); Mon, 4 Nov 2019 16:56:59 -0500 Received: from localhost (6.204-14-84.ripe.coltfrance.com [84.14.204.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3798320650; Mon, 4 Nov 2019 21:56:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1572904617; bh=+M+LtQ7619JfQt8bc0AZRjq6lrXojmBffMf8SjsXDK0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eCvfhjhOX4cQR0sFAWa5bHtKxsQrJhqPbjfiFCd4x5quPbe5sVyiavkGef4PVFxlP 8LoAY/F8srDYAPCE/Zbq5M+XkRbh3YZfxi3JrfwjttTQTPU72uvf6dcRsZOFtr0QES v3dedGvskmsxrlZqt/KZHYgpwCjCdi4fLGE4KYP0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Phil Elwell , Sasha Levin Subject: [PATCH 4.19 011/149] sc16is7xx: Fix for "Unexpected interrupt: 8" Date: Mon, 4 Nov 2019 22:43:24 +0100 Message-Id: <20191104212132.141238950@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191104212126.090054740@linuxfoundation.org> References: <20191104212126.090054740@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Phil Elwell [ Upstream commit 30ec514d440cf2c472c8e4b0079af2c731f71a3e ] The SC16IS752 has an Enhanced Feature Register which is aliased at the same address as the Interrupt Identification Register; accessing it requires that a magic value is written to the Line Configuration Register. If an interrupt is raised while the EFR is mapped in then the ISR won't be able to access the IIR, leading to the "Unexpected interrupt" error messages. Avoid the problem by claiming a mutex around accesses to the EFR register, also claiming the mutex in the interrupt handler work item (this is equivalent to disabling interrupts to interlock against a non-threaded interrupt handler). See: https://github.com/raspberrypi/linux/issues/2529 Signed-off-by: Phil Elwell Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/tty/serial/sc16is7xx.c | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/drivers/tty/serial/sc16is7xx.c b/drivers/tty/serial/sc16is7xx.c index 372cc7ff228fc..ebea4a9d8e694 100644 --- a/drivers/tty/serial/sc16is7xx.c +++ b/drivers/tty/serial/sc16is7xx.c @@ -328,6 +328,7 @@ struct sc16is7xx_port { struct kthread_worker kworker; struct task_struct *kworker_task; struct kthread_work irq_work; + struct mutex efr_lock; struct sc16is7xx_one p[0]; }; @@ -499,6 +500,21 @@ static int sc16is7xx_set_baud(struct uart_port *port, int baud) div /= 4; } + /* In an amazing feat of design, the Enhanced Features Register shares + * the address of the Interrupt Identification Register, and is + * switched in by writing a magic value (0xbf) to the Line Control + * Register. Any interrupt firing during this time will see the EFR + * where it expects the IIR to be, leading to "Unexpected interrupt" + * messages. + * + * Prevent this possibility by claiming a mutex while accessing the + * EFR, and claiming the same mutex from within the interrupt handler. + * This is similar to disabling the interrupt, but that doesn't work + * because the bulk of the interrupt processing is run as a workqueue + * job in thread context. + */ + mutex_lock(&s->efr_lock); + lcr = sc16is7xx_port_read(port, SC16IS7XX_LCR_REG); /* Open the LCR divisors for configuration */ @@ -514,6 +530,8 @@ static int sc16is7xx_set_baud(struct uart_port *port, int baud) /* Put LCR back to the normal mode */ sc16is7xx_port_write(port, SC16IS7XX_LCR_REG, lcr); + mutex_unlock(&s->efr_lock); + sc16is7xx_port_update(port, SC16IS7XX_MCR_REG, SC16IS7XX_MCR_CLKSEL_BIT, prescaler); @@ -696,6 +714,8 @@ static void sc16is7xx_ist(struct kthread_work *ws) { struct sc16is7xx_port *s = to_sc16is7xx_port(ws, irq_work); + mutex_lock(&s->efr_lock); + while (1) { bool keep_polling = false; int i; @@ -705,6 +725,8 @@ static void sc16is7xx_ist(struct kthread_work *ws) if (!keep_polling) break; } + + mutex_unlock(&s->efr_lock); } static irqreturn_t sc16is7xx_irq(int irq, void *dev_id) @@ -899,6 +921,9 @@ static void sc16is7xx_set_termios(struct uart_port *port, if (!(termios->c_cflag & CREAD)) port->ignore_status_mask |= SC16IS7XX_LSR_BRK_ERROR_MASK; + /* As above, claim the mutex while accessing the EFR. */ + mutex_lock(&s->efr_lock); + sc16is7xx_port_write(port, SC16IS7XX_LCR_REG, SC16IS7XX_LCR_CONF_MODE_B); @@ -920,6 +945,8 @@ static void sc16is7xx_set_termios(struct uart_port *port, /* Update LCR register */ sc16is7xx_port_write(port, SC16IS7XX_LCR_REG, lcr); + mutex_unlock(&s->efr_lock); + /* Get baud rate generator configuration */ baud = uart_get_baud_rate(port, termios, old, port->uartclk / 16 / 4 / 0xffff, @@ -1185,6 +1212,7 @@ static int sc16is7xx_probe(struct device *dev, s->regmap = regmap; s->devtype = devtype; dev_set_drvdata(dev, s); + mutex_init(&s->efr_lock); kthread_init_worker(&s->kworker); kthread_init_work(&s->irq_work, sc16is7xx_ist); -- 2.20.1