]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
firmware: qcom: scm: request the waitqueue irq *after* initializing SCM
authorBartosz Golaszewski <bartosz.golaszewski@linaro.org>
Mon, 30 Jun 2025 12:12:05 +0000 (14:12 +0200)
committerBjorn Andersson <andersson@kernel.org>
Thu, 17 Jul 2025 03:50:55 +0000 (22:50 -0500)
There's a subtle race in the SCM driver: we assign the __scm pointer
before requesting the waitqueue interrupt. Assigning __scm marks the SCM
API as ready to accept calls. It's possible that a user makes a call
right after we set __scm and the firmware raises an interrupt before the
driver's ready to service it. Move the __scm assignment after we request
the interrupt.

This has the added benefit of allowing us to drop the goto label.

Reviewed-by: Konrad Dybcio <konrad.dybcio@oss.qualcomm.com>
Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org>
Link: https://lore.kernel.org/r/20250630-qcom-scm-race-v2-4-fa3851c98611@linaro.org
Signed-off-by: Bjorn Andersson <andersson@kernel.org>
drivers/firmware/qcom/qcom_scm.c

index b6e0420bb2b72247e4d772b66314d81f336f5d9d..26cd0458aacd67dcd36f065675e969cea97eb465 100644 (file)
@@ -2276,29 +2276,27 @@ static int qcom_scm_probe(struct platform_device *pdev)
                return dev_err_probe(scm->dev, PTR_ERR(scm->mempool),
                                     "Failed to create the SCM memory pool\n");
 
+       irq = platform_get_irq_optional(pdev, 0);
+       if (irq < 0) {
+               if (irq != -ENXIO)
+                       return irq;
+       } else {
+               ret = devm_request_threaded_irq(scm->dev, irq, NULL, qcom_scm_irq_handler,
+                                               IRQF_ONESHOT, "qcom-scm", scm);
+               if (ret < 0)
+                       return dev_err_probe(scm->dev, ret,
+                                            "Failed to request qcom-scm irq\n");
+       }
+
        /*
         * Paired with smp_load_acquire() in qcom_scm_is_available().
         *
         * This marks the SCM API as ready to accept user calls and can only
-        * be called after the TrustZone memory pool is initialized.
+        * be called after the TrustZone memory pool is initialized and the
+        * waitqueue interrupt requested.
         */
        smp_store_release(&__scm, scm);
 
-       irq = platform_get_irq_optional(pdev, 0);
-       if (irq < 0) {
-               if (irq != -ENXIO) {
-                       ret = irq;
-                       goto err;
-               }
-       } else {
-               ret = devm_request_threaded_irq(__scm->dev, irq, NULL, qcom_scm_irq_handler,
-                                               IRQF_ONESHOT, "qcom-scm", __scm);
-               if (ret < 0) {
-                       dev_err_probe(scm->dev, ret, "Failed to request qcom-scm irq\n");
-                       goto err;
-               }
-       }
-
        __get_convention();
 
        /*
@@ -2328,12 +2326,6 @@ static int qcom_scm_probe(struct platform_device *pdev)
        WARN(ret < 0, "failed to initialize qseecom: %d\n", ret);
 
        return 0;
-
-err:
-       /* Paired with smp_load_acquire() in qcom_scm_is_available(). */
-       smp_store_release(&__scm, NULL);
-
-       return ret;
 }
 
 static void qcom_scm_shutdown(struct platform_device *pdev)