Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp697947ybz; Fri, 1 May 2020 07:01:35 -0700 (PDT) X-Google-Smtp-Source: APiQypKTxuv/XcTITkgq8756/JZQDc1j+z0b7P65sFAuvvN+7OeOUTyWT2MAblygc2kY3hCkIBjj X-Received: by 2002:aa7:c649:: with SMTP id z9mr3718910edr.288.1588341695629; Fri, 01 May 2020 07:01:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588341695; cv=none; d=google.com; s=arc-20160816; b=XG/urQpHdSpijDfgmxWnydf93sbBe1mY+LVE+TrPM1EA1srukYNTP2WPlb0Ve4VImo oi0xg84+DGdGM/pny/kTeRYYT7qE4No4tTZptWQH961MF4Bay3i7nAoIj1bQFFDmwp2K zw0yX+6YercbAStjeJi+z1juPb8FMAtOkG+EBNSuiuY25EjMqWoT6sfDlVCB7TuOQSk/ HPJdmxX9CEx/Wnqyjyzg+oC2UN4WGQI6gLj+6zarDW+UmDOui28rcXExnjeWZbjlEU1E VxmoFYlGBpFPSkquom36TKimpvn7J9ebaU6PvUQrDldHLcrSR/gKJ338P4NgawYDkzwH FeVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=YG6jlWPWUmAD7ZIdlzjBHuLTkcFMm3+iaE4ZUkmKoIA=; b=D/2ZAn8lan02ergIj7J4lzq485kuuDf8P5Q9NLflv/IpM6dvL2DPDwFk6QiPxDbIs9 lp5rFPe11+qrfCYV7MIVFpemz/C0kUenC1w7HhbJUhRdEC0rHazq+++XV1S3LzylQnxe xSs69ERvVyUg3GXTIc34LOkkiX2ZxA/B8znXYlcna4jsghOwDzb3fR5ZPHo3DaM7LyBT ahgr+faNiOPc4TF5rKKDURPLIuX/aUP2PsKxeCD/YrreT7Vlmow7sWMIR496x9OTK7Yp k09WqLO+LXRSpi1JIQkprzf28sWjKrGnvZnckNTtSagtw7sqiarzHZELirrpceaV4hjT xfAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sNyolAQ+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id pj27si1951917ejb.196.2020.05.01.07.01.11; Fri, 01 May 2020 07:01:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sNyolAQ+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730309AbgEAN6z (ORCPT + 99 others); Fri, 1 May 2020 09:58:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:53586 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729840AbgEAN3v (ORCPT ); Fri, 1 May 2020 09:29:51 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 276BF20757; Fri, 1 May 2020 13:29:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588339790; bh=4fz6TkF5RAvabsQkUNjcu1N+TC5NKWc9Q/pUApOKaKg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sNyolAQ+rKqwWiZUbvUfpQ6DxIoxaQP5L2asTcFr3Grpnri8xycn1U9gBnGbLOUAn /BCiV9xFryncEDvhvFO27ZK73cID4FmnkvlYFBLJYqbF+iYVe2/cyLMUem/3nuqDEi 32pLwV3uDZIsSQtr9tqOEWoqtSBWzpx/i7It8Gwg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yi Huaijie , Liu Jian , Tokunori Ikegami , Richard Weinberger , Guenter Roeck Subject: [PATCH 4.9 61/80] mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer Date: Fri, 1 May 2020 15:21:55 +0200 Message-Id: <20200501131531.660978566@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200501131513.810761598@linuxfoundation.org> References: <20200501131513.810761598@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Liu Jian commit d9b8a67b3b95a5c5aae6422b8113adc1c2485f2b upstream. In function do_write_buffer(), in the for loop, there is a case chip_ready() returns 1 while chip_good() returns 0, so it never break the loop. To fix this, chip_good() is enough and it should timeout if it stay bad for a while. Fixes: dfeae1073583("mtd: cfi_cmdset_0002: Change write buffer to check correct value") Signed-off-by: Yi Huaijie Signed-off-by: Liu Jian Reviewed-by: Tokunori Ikegami Signed-off-by: Richard Weinberger Cc: Guenter Roeck Signed-off-by: Greg Kroah-Hartman --- drivers/mtd/chips/cfi_cmdset_0002.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) --- a/drivers/mtd/chips/cfi_cmdset_0002.c +++ b/drivers/mtd/chips/cfi_cmdset_0002.c @@ -1879,7 +1879,11 @@ static int __xipram do_write_buffer(stru continue; } - if (time_after(jiffies, timeo) && !chip_ready(map, adr)) + /* + * We check "time_after" and "!chip_good" before checking "chip_good" to avoid + * the failure due to scheduling. + */ + if (time_after(jiffies, timeo) && !chip_good(map, adr, datum)) break; if (chip_good(map, adr, datum)) {