Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2923012ybx; Fri, 8 Nov 2019 11:18:57 -0800 (PST) X-Google-Smtp-Source: APXvYqwVh4kFYUPp77WnsrEWR//xYDJ/Ui8ZzhevliGIU4WoftmLV1M5T0oVdJwNj5tLJD5IP/5V X-Received: by 2002:a17:906:4bd7:: with SMTP id x23mr10281133ejv.245.1573240737172; Fri, 08 Nov 2019 11:18:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573240737; cv=none; d=google.com; s=arc-20160816; b=l5Koo3KkPYLYqlTmBP231zhwNMxtC7+bFOgRdrXQ1m9XqkjwUACx0IxLMM6pY7eQR5 nFkr6pZh5+JRFMxDPWEA0mDLGCmwbYKjF5L7fNjN6+VO5ASooEg1wALrNq467nB3xzSu yK4xBdMLS0x7QD+eBBSXPOJ6XhPc+owXrQKhIFiYdd3E5ESD1awSQR0sn963cH2M6uyk r7QErtMBxEszZMDFNqITcEeVHx93+uElLeFkULaj3UvpRFcwBJD2zdDJfFQFG6A92QHe q3toMoZNaiZaq5ttmUefofRys8dCtwKDG6DolD2Bs4cMG5xtn/AFxHnFYQA9aUtimkM+ 6WLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ILGTfTgZf4NmHWSWB4qI/Rd3lLJoiyAhzAB0/XOrOxo=; b=ZhFjaapgtYmVtoRHXH3AeL2wbwCYVHcGuCpi+1e5EAx/e2YR0esEjgXx9cTPtKWt3N T1JefMaANJEsVvGn2VC+SMVAKe57lKKc9jl9Oyz5injjQncfC6fksdDXkbnM6/pwbFE6 Fixs8x/gwXs0RSZgNLz2TdYm8AYKxHjRsyfMPcAnSZqNcCDvv/wNY0c2Iny8NqaytRg6 DNSxxoiD2ZPkjfEwcq/qBwSjzhbuIpTIMwwjoDALMN3ulB6LeMt/Ena+tZ4xdn/nfBkF TbBI5iCyjgd1N0EO1Tx7i1EZ/WLWhWN1s+uU3KY9f1xnKr4m0K9mQSTbnD5FPEg2KXSl OdOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AAspifYt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k43si5148592edb.150.2019.11.08.11.18.33; Fri, 08 Nov 2019 11:18:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AAspifYt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390415AbfKHTCI (ORCPT + 99 others); Fri, 8 Nov 2019 14:02:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:59616 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390411AbfKHTCE (ORCPT ); Fri, 8 Nov 2019 14:02:04 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CFB6120650; Fri, 8 Nov 2019 19:02:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573239723; bh=ajrQFUpHfoZrFxmZ57IP0Y32djqaiWekFynq+8+EYS8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AAspifYtxlsZgfCgMUlWFvo6UdBg/AdC2ScSk2vbxxuOYbGwLXeiO3BW+mlNZa8HS taEeDHlOw5aGXEbTtKo2lCtyQqy/8uKmrqLkM0bEooYv+4iINVBqt00Sn+L+FycMeN lYbcCThZlcO+2bXj3Eb+S4BG6FtFKG3BdQLnrqrA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Fabrice Gasnier , Pierre-Yves MORDRET , Wolfram Sang , Sasha Levin Subject: [PATCH 4.19 32/79] i2c: stm32f7: fix a race in slave mode with arbitration loss irq Date: Fri, 8 Nov 2019 19:50:12 +0100 Message-Id: <20191108174803.425199865@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191108174745.495640141@linuxfoundation.org> References: <20191108174745.495640141@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Fabrice Gasnier [ Upstream commit 6d6b0d0d5afc8c4c84b08261260ba11dfa5206f2 ] When in slave mode, an arbitration loss (ARLO) may be detected before the slave had a chance to detect the stop condition (STOPF in ISR). This is seen when two master + slave adapters switch their roles. It provokes the i2c bus to be stuck, busy as SCL line is stretched. - the I2C_SLAVE_STOP event is never generated due to STOPF flag is set but don't generate an irq (race with ARLO irq, STOPIE is masked). STOPF flag remains set until next master xfer (e.g. when STOPIE irq get unmasked). In this case, completion is generated too early: immediately upon new transfer request (then it doesn't send all data). - Some data get stuck in TXDR register. As a consequence, the controller stretches the SCL line: the bus gets busy until a future master transfer triggers the bus busy / recovery mechanism (this can take time... and may never happen at all) So choice is to let the STOPF being detected by the slave isr handler, to properly handle this stop condition. E.g. don't mask IRQs in error handler, when the slave is running. Fixes: 60d609f30de2 ("i2c: i2c-stm32f7: Add slave support") Signed-off-by: Fabrice Gasnier Reviewed-by: Pierre-Yves MORDRET Signed-off-by: Wolfram Sang Signed-off-by: Sasha Levin --- drivers/i2c/busses/i2c-stm32f7.c | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-) diff --git a/drivers/i2c/busses/i2c-stm32f7.c b/drivers/i2c/busses/i2c-stm32f7.c index 48521bc8a4d23..362b23505f214 100644 --- a/drivers/i2c/busses/i2c-stm32f7.c +++ b/drivers/i2c/busses/i2c-stm32f7.c @@ -1488,7 +1488,7 @@ static irqreturn_t stm32f7_i2c_isr_error(int irq, void *data) void __iomem *base = i2c_dev->base; struct device *dev = i2c_dev->dev; struct stm32_i2c_dma *dma = i2c_dev->dma; - u32 mask, status; + u32 status; status = readl_relaxed(i2c_dev->base + STM32F7_I2C_ISR); @@ -1513,12 +1513,15 @@ static irqreturn_t stm32f7_i2c_isr_error(int irq, void *data) f7_msg->result = -EINVAL; } - /* Disable interrupts */ - if (stm32f7_i2c_is_slave_registered(i2c_dev)) - mask = STM32F7_I2C_XFER_IRQ_MASK; - else - mask = STM32F7_I2C_ALL_IRQ_MASK; - stm32f7_i2c_disable_irq(i2c_dev, mask); + if (!i2c_dev->slave_running) { + u32 mask; + /* Disable interrupts */ + if (stm32f7_i2c_is_slave_registered(i2c_dev)) + mask = STM32F7_I2C_XFER_IRQ_MASK; + else + mask = STM32F7_I2C_ALL_IRQ_MASK; + stm32f7_i2c_disable_irq(i2c_dev, mask); + } /* Disable dma */ if (i2c_dev->use_dma) { -- 2.20.1