[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <060d729a-259c-4cfd-b785-17986e3e735f@gmail.com>
Date: Fri, 12 Jan 2024 19:23:17 +0800
From: Gui-Dong Han <2045gemini@...il.com>
To: Ilpo Järvinen <ilpo.jarvinen@...ux.intel.com>,
John Ogness <john.ogness@...utronix.de>
Cc: Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Jiri Slaby <jirislaby@...nel.org>, Tony Lindgren <tony@...mide.com>,
l.sanfilippo@...bus.com, tglx@...utronix.de,
Andy Shevchenko <andriy.shevchenko@...ux.intel.com>,
LKML <linux-kernel@...r.kernel.org>,
linux-serial <linux-serial@...r.kernel.org>, baijiaju1990@...look.com,
stable@...r.kernel.org
Subject: Re: [PATCH] serial: core: Fix atomicity violation in uart_tiocmget
Hi,
You are correct about the 'Fixes' tag. It should indeed be c5f4644e6c8b
("[PATCH] Serial: Adjust serial locking"). I will update this in the
patch v2.
Regarding the issue found in Linux 5.17, I mistakenly used git blame
which led to the incorrect identification of commit 559c7ff4e324. The
issue indeed exists in Linux 5.17 and I acknowledge the error in tracing
the commit.
In uart_tiocmget(), the result variable is stable. However, there's a
risk of inconsistency due to the updates in uart_update_mctrl().
Consider a scenario where uart_tiocmget() reads uport->mctrl into result
before entering the critical section. If uart_update_mctrl() updates
port->mctrl and calls set_mctrl concurrently, the subsequent execution
of result |= uport->ops->get_mctrl(uport); in uart_tiocmget() might
yield an inaccurate result. This happens because result contains the old
value of port->mctrl, which no longer matches the updated state
retrieved by get_mctrl.
Thanks,
Han
Powered by blists - more mailing lists