Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp5913516iob; Tue, 10 May 2022 06:36:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzCnsLfbi6W6zhqG5jSXQYHW5MxqTrUGWG0lMYaDLoX1tGemO3Ubizwn1sImz//+SAvms6I X-Received: by 2002:a17:902:be01:b0:15e:fb07:ba85 with SMTP id r1-20020a170902be0100b0015efb07ba85mr15172316pls.85.1652189793152; Tue, 10 May 2022 06:36:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652189793; cv=none; d=google.com; s=arc-20160816; b=bqMWjYxKmaUMXxjllk8Zs8ffjSOPggV/ZCPtkahJuOBwVPQB5RRFqKXnKApvFFByVI 4bX+I8tUnT52bKq9jJwtK+9Z73MXoGUKbZ9Qs4fED2UUiZwr6k9PyY+Zebpep4Sp24ew 2Vg9RYPQoKabmKo10bXcjHTvL/Oaq3IZKKlWzBURum/UKGKNfgYNhSaU1dmoyKBxA7I8 6OhDjGIBT8FWxyJM8y0vy2dSAkZdLPHjLZCyr6uVzgwMEBYIJWz+K8A1mLEZcNJccpN2 OEHq6Z/wQFcRNbiQ8IQWC6s03X1Fy8MwwfhTEVoR9IVryXH4i+n3jO+7ACm7iMjC7hKn Oh9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=a1utbAJKmKcRWOnOj0NtGuTPQN1QeeqqOuqde6LAJSw=; b=S3jrAvIkebkt/dzXB7CAZs3MhS/QVCWbMXkwWW7Sb0yL8nGVGyop7+j4yvnrkyhXGe WKHOSv1b4/FnBRRU3I6dkmTtaMadI9RIkzWnyG1Dt+lrVYNyYd0s8741XcTxR3SHtORl NkwUwjITTtxBNokhXkqY2Zz3h5FjlUjYh+DiEHh8yIoncX7sLPh9+O8khtaP6XnYCEMl I6huUhU2rXE5fD/96dtHCmra+j5t49A4mOPmV0+HOSmnmUvrJvEMN2d/1SWjJSjzvELK um3eKd4N80OX5J0Za4BB7xWOK8P5yyB8IVsorYmrY5JM29K40BPKmh6ju/S5wLLlJZkf GySw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=o2f5tiyU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q12-20020a170902dacc00b0015b3dbc18a5si3911002plx.92.2022.05.10.06.36.17; Tue, 10 May 2022 06:36:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=o2f5tiyU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239286AbiEJJxn (ORCPT + 99 others); Tue, 10 May 2022 05:53:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53126 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239047AbiEJJxl (ORCPT ); Tue, 10 May 2022 05:53:41 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 05A512A18B9; Tue, 10 May 2022 02:49:44 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id A7600B81BDA; Tue, 10 May 2022 09:49:43 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B8878C385C6; Tue, 10 May 2022 09:49:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1652176182; bh=/gOPBTu3tvTGApNFzFvVy75YBVIr8MiZpBkvRlR3SAg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=o2f5tiyUi4srx27bB6MrXZ2j9/2vfTHsYi2d/1SpF8A7Bklyn4VHHkZAr3LjwskgY UvS/vZGyFrRig4kYhW6gMzWgPNCk5EiAHqXtgYDg+NCVP+5sVb03xssrYWlBE3oT8k USZJGUKmavA4bhxS56T4ippuDkLqhurpwT50/Bo0= Date: Tue, 10 May 2022 11:49:39 +0200 From: Greg Kroah-Hartman To: Petr Mladek Cc: Neil Armstrong , John Ogness , Kevin Hilman , Sergey Senozhatsky , Steven Rostedt , linux-kernel@vger.kernel.org, Jiri Slaby , Jerome Brunet , Martin Blumenstingl , linux-serial@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-amlogic@lists.infradead.org, Marek Szyprowski Subject: Re: [PATCH v1] serial: meson: acquire port->lock in startup() Message-ID: References: <20220508103547.626355-1-john.ogness@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 10, 2022 at 11:37:23AM +0200, Petr Mladek wrote: > On Mon 2022-05-09 09:36:40, Neil Armstrong wrote: > > On 08/05/2022 12:35, John Ogness wrote: > > > The uart_ops startup() callback is called without interrupts > > > disabled and without port->lock locked, relatively late during the > > > boot process (from the call path of console_on_rootfs()). If the > > > device is a console, it was already previously registered and could > > > be actively printing messages. > > > > > > Since the startup() callback is reading/writing registers used by > > > the console write() callback (AML_UART_CONTROL), its access must > > > be synchronized using the port->lock. Currently it is not. > > > > > > The startup() callback is the only function that explicitly enables > > > interrupts. Without the synchronization, it is possible that > > > interrupts become accidentally permanently disabled. > > > > > > CPU0 CPU1 > > > meson_serial_console_write meson_uart_startup > > > -------------------------- ------------------ > > > spin_lock(port->lock) > > > val = readl(AML_UART_CONTROL) > > > uart_console_write() > > > writel(INT_EN, AML_UART_CONTROL) > > > writel(val, AML_UART_CONTROL) > > > spin_unlock(port->lock) > > > > > > Add port->lock synchronization to meson_uart_startup() to avoid > > > racing with meson_serial_console_write(). > > > > > > Also add detailed comments to meson_uart_reset() explaining why it > > > is *not* using port->lock synchronization. > > > > > > Link: https://lore.kernel.org/lkml/2a82eae7-a256-f70c-fd82-4e510750906e@samsung.com > > > Reported-by: Marek Szyprowski > > > Signed-off-by: John Ogness > > > Tested-by: Marek Szyprowski > > > --- > > > drivers/tty/serial/meson_uart.c | 13 +++++++++++++ > > > 1 file changed, 13 insertions(+) > > > > > > diff --git a/drivers/tty/serial/meson_uart.c b/drivers/tty/serial/meson_uart.c > > > index 2bf1c57e0981..39021dac09cc 100644 > > > --- a/drivers/tty/serial/meson_uart.c > > > +++ b/drivers/tty/serial/meson_uart.c > > > @@ -253,6 +253,14 @@ static const char *meson_uart_type(struct uart_port *port) > > > return (port->type == PORT_MESON) ? "meson_uart" : NULL; > > > } > > > +/* > > > + * This function is called only from probe() using a temporary io mapping > > > + * in order to perform a reset before setting up the device. Since the > > > + * temporarily mapped region was successfully requested, there can be no > > > + * console on this port at this time. Hence it is not necessary for this > > > + * function to acquire the port->lock. (Since there is no console on this > > > + * port at this time, the port->lock is not initialized yet.) > > > + */ > > > static void meson_uart_reset(struct uart_port *port) > > > { > > > u32 val; > > > @@ -267,9 +275,12 @@ static void meson_uart_reset(struct uart_port *port) > > > static int meson_uart_startup(struct uart_port *port) > > > { > > > + unsigned long flags; > > > u32 val; > > > int ret = 0; > > > + spin_lock_irqsave(&port->lock, flags); > > > + > > > val = readl(port->membase + AML_UART_CONTROL); > > > val |= AML_UART_CLEAR_ERR; > > > writel(val, port->membase + AML_UART_CONTROL); > > > @@ -285,6 +296,8 @@ static int meson_uart_startup(struct uart_port *port) > > > val = (AML_UART_RECV_IRQ(1) | AML_UART_XMIT_IRQ(port->fifosize / 2)); > > > writel(val, port->membase + AML_UART_MISC); > > > + spin_unlock_irqrestore(&port->lock, flags); > > > + > > > ret = request_irq(port->irq, meson_uart_interrupt, 0, > > > port->name, port); > > > > > > base-commit: 672c0c5173427e6b3e2a9bbb7be51ceeec78093a > > > > Thanks for fixing this, it may also fix an uart apparent lockup I encountered > > several time while developing on the platform, but the target was still alive > > so it matches. > > > > So I'll add: > > Fixes: ff7693d079e5 ("ARM: meson: serial: add MesonX SoC on-chip uart driver") > > > > and > > > > Acked-by: Neil Armstrong > > Neil, may I assume that you are going to queue this fix for 5.19, please? I can take it, thanks. greg k-h