• Jon Hunter's avatar
    soc/tegra: pmc: Protect public functions from potential race conditions · e8cf6616
    Jon Hunter authored
    The PMC base address pointer is initialised during early boot so that
    early platform code may used the PMC public functions. During the probe
    of the PMC driver the base address pointer is mapped again and the initial
    mapping is freed. This exposes a window where a device accessing the PMC
    registers via one of the public functions, could race with the updating
    of the pointer and lead to a invalid access. Furthermore, the only
    protection between multiple devices attempting to access the PMC registers
    is when setting the powergate state to on or off. None of the other public
    functions that access the PMC registers are protected.
    
    Use the existing mutex to protect paths that may race with regard to
    accessing the PMC registers.
    
    Note that functions tegra_io_rail_prepare()/poll() either return a
    negative value on failure or zero on success. Therefore, it is not
    necessary to check if the return value is less than zero and so only
    test that the return value is not zero to test for failure. This
    simplifies the error handling with the mutex locking in place.
    Signed-off-by: default avatarJon Hunter <jonathanh@nvidia.com>
    Reviewed-by: default avatarMathieu Poirier <mathieu.poirier@linaro.org>
    Signed-off-by: default avatarThierry Reding <treding@nvidia.com>
    e8cf6616
pmc.c 28 KB