Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp444436iog; Mon, 13 Jun 2022 06:07:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw7ZANqXnYUkkf4T3I5I9k2PQLnLmAnQZpMwxl8iMKmjoGP2AixzdxaCF8wfaovOGiFhWtV X-Received: by 2002:a17:907:3d8a:b0:710:c2e8:79f2 with SMTP id he10-20020a1709073d8a00b00710c2e879f2mr41441750ejc.577.1655125651798; Mon, 13 Jun 2022 06:07:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655125651; cv=none; d=google.com; s=arc-20160816; b=uvKP4Eei4ZHYfZ+AvEE3FfmkoGlhwk3SFjp2ok9GO1mvyb7Z3IygQEXDNn5rSchmAp L1xhJeMRBve0TtTnNIrMSWf0Mh7zKLgVPR8hyyrpJ8Huj3mRwMjtqe1/hEEL1qgA7EUC OS5Y63iL+N3cn03ly/ThGbFWg6Jjp9HDbD0lKR4XSeRz6wTozkssrWZzVw8LXWQAny/F 9aAPBAIo9XvbTOv4oMGfZGJS2BcRpN2JwrTgGLcMSCBHwn7Hv52zzwdkYXCKFWFoSb10 rHb0BFvkj0eGxjKQrJZ5bNooelGuDYWlAjpITTe5tWHvk9n0mhI+jdeNp9g+YRdWCXvG ltlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=oau126X66hPLvASVsZ21SVA1ATAhEYjknHGuB+7zLFg=; b=WoL9ugi3LLO4iE7G8Y4sKLwvrlzCKSG64DSQmz4mUBkLx02AV57KBH35U4IqmMjyZn NPkKW6MvoXh+C4f2dQ9LNj+LPpPvSwGCBuj7C8v4r165lbJr2BURDpLTZL/plJqT9VLS Mku+cihwwBcGdlrEkPT8SGi8i6WWesoEOC5A75JjWarz2qBLHEaWqm0vP2NH4z7OmLPz JAHIBxoVr54hiBY2VzkhxEfgEylz6VLg8q536EHGmDDs+gs5+Za9MVe9NCTN4pNlSgj9 4hX//XP328YVjRbzgA1+0fjmZzCX4/DZnpH9lCYhZwiNYRfEhQqL9U9Z0wlH89H/Nk5O areQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=X2ktQ586; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id kz3-20020a17090777c300b006f8ee02afbbsi6300700ejc.513.2022.06.13.06.07.05; Mon, 13 Jun 2022 06:07:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=X2ktQ586; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1355165AbiFMLhh (ORCPT + 99 others); Mon, 13 Jun 2022 07:37:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56244 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1354891AbiFMLaQ (ORCPT ); Mon, 13 Jun 2022 07:30:16 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AD4AD3FDB9; Mon, 13 Jun 2022 03:45:59 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 3CDFBB80D3A; Mon, 13 Jun 2022 10:45:58 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9D4BBC3411C; Mon, 13 Jun 2022 10:45:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1655117157; bh=708efDuyk1Yx3SlD1A/DeMWSuKhHjD/LGlxnQ2I926Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=X2ktQ586MH9Dnd42PS4D8yDmd8DBAkUeArrnM31bOMVGlDH4Wr1pI2nrjpW+SRAj2 +vn5ShWHotA/g354FqUjYsKVRF8wIngzHpXcd52cehD02z7VCqFpyT/AB7goqexEPW mL5hgRILy9xW6nP8bnhEEKwOi7SFTYaxM3n5FPmw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Marek Szyprowski , Petr Mladek , Jiri Slaby , Neil Armstrong , John Ogness , Sasha Levin Subject: [PATCH 5.4 306/411] serial: meson: acquire port->lock in startup() Date: Mon, 13 Jun 2022 12:09:39 +0200 Message-Id: <20220613094937.926453083@linuxfoundation.org> X-Mailer: git-send-email 2.36.1 In-Reply-To: <20220613094928.482772422@linuxfoundation.org> References: <20220613094928.482772422@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-8.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: John Ogness [ Upstream commit 589f892ac8ef244e47c5a00ffd8605daa1eaef8e ] The uart_ops startup() callback is called without interrupts disabled and without port->lock locked, relatively late during the boot process (from the call path of console_on_rootfs()). If the device is a console, it was already previously registered and could be actively printing messages. Since the startup() callback is reading/writing registers used by the console write() callback (AML_UART_CONTROL), its access must be synchronized using the port->lock. Currently it is not. The startup() callback is the only function that explicitly enables interrupts. Without the synchronization, it is possible that interrupts become accidentally permanently disabled. CPU0 CPU1 meson_serial_console_write meson_uart_startup -------------------------- ------------------ spin_lock(port->lock) val = readl(AML_UART_CONTROL) uart_console_write() writel(INT_EN, AML_UART_CONTROL) writel(val, AML_UART_CONTROL) spin_unlock(port->lock) Add port->lock synchronization to meson_uart_startup() to avoid racing with meson_serial_console_write(). Also add detailed comments to meson_uart_reset() explaining why it is *not* using port->lock synchronization. Link: https://lore.kernel.org/lkml/2a82eae7-a256-f70c-fd82-4e510750906e@samsung.com Fixes: ff7693d079e5 ("ARM: meson: serial: add MesonX SoC on-chip uart driver") Reported-by: Marek Szyprowski Tested-by: Marek Szyprowski Reviewed-by: Petr Mladek Reviewed-by: Jiri Slaby Acked-by: Neil Armstrong Signed-off-by: John Ogness Link: https://lore.kernel.org/r/20220508103547.626355-1-john.ogness@linutronix.de Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/tty/serial/meson_uart.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/drivers/tty/serial/meson_uart.c b/drivers/tty/serial/meson_uart.c index fbc5bc022a39..849ce8c1ef39 100644 --- a/drivers/tty/serial/meson_uart.c +++ b/drivers/tty/serial/meson_uart.c @@ -256,6 +256,14 @@ static const char *meson_uart_type(struct uart_port *port) return (port->type == PORT_MESON) ? "meson_uart" : NULL; } +/* + * This function is called only from probe() using a temporary io mapping + * in order to perform a reset before setting up the device. Since the + * temporarily mapped region was successfully requested, there can be no + * console on this port at this time. Hence it is not necessary for this + * function to acquire the port->lock. (Since there is no console on this + * port at this time, the port->lock is not initialized yet.) + */ static void meson_uart_reset(struct uart_port *port) { u32 val; @@ -270,9 +278,12 @@ static void meson_uart_reset(struct uart_port *port) static int meson_uart_startup(struct uart_port *port) { + unsigned long flags; u32 val; int ret = 0; + spin_lock_irqsave(&port->lock, flags); + val = readl(port->membase + AML_UART_CONTROL); val |= AML_UART_CLEAR_ERR; writel(val, port->membase + AML_UART_CONTROL); @@ -288,6 +299,8 @@ static int meson_uart_startup(struct uart_port *port) val = (AML_UART_RECV_IRQ(1) | AML_UART_XMIT_IRQ(port->fifosize / 2)); writel(val, port->membase + AML_UART_MISC); + spin_unlock_irqrestore(&port->lock, flags); + ret = request_irq(port->irq, meson_uart_interrupt, 0, port->name, port); -- 2.35.1