Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751198AbdFAUli (ORCPT ); Thu, 1 Jun 2017 16:41:38 -0400 Received: from mail-pf0-f182.google.com ([209.85.192.182]:36535 "EHLO mail-pf0-f182.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751125AbdFAUlg (ORCPT ); Thu, 1 Jun 2017 16:41:36 -0400 Date: Thu, 1 Jun 2017 13:42:24 -0700 From: Bjorn Andersson To: Avaneesh Kumar Dwivedi Cc: sboyd@codeaurora.org, agross@codeaurora.org, linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-remoteproc@vger.kernel.org Subject: Re: [PATCH v5 3/4] remoteproc: qcom: Make secure world call for mem ownership switch Message-ID: <20170601204224.GB12920@tuxbook> References: <1496344641-6291-1-git-send-email-akdwived@codeaurora.org> <1496344641-6291-4-git-send-email-akdwived@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1496344641-6291-4-git-send-email-akdwived@codeaurora.org> User-Agent: Mutt/1.8.2 (2017-04-18) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2375 Lines: 73 On Thu 01 Jun 12:17 PDT 2017, Avaneesh Kumar Dwivedi wrote: > MSS proc on msm8996 can not access fw loaded region without stage > second translation of memory pages where mpss image are loaded. > This patch in order to enable mss boot on msm8996 invoke scm call > to switch or share ownership between apps and modem. > Overall this looks good now, I have two minor notes that I want you to fix up though. > diff --git a/drivers/remoteproc/qcom_q6v5_pil.c b/drivers/remoteproc/qcom_q6v5_pil.c > @@ -288,6 +290,40 @@ static struct resource_table *q6v5_find_rsc_table(struct rproc *rproc, > return &table; > } > > +static int q6v5_xfer_mem_ownership(struct q6v5 *qproc, > + int image, phys_addr_t addr, Rather than relying on a static int to keep track of current permissions pass a "int *current_perms", that you update on success. Add int mba_perm and int mpss_perm to the struct q6v5 and initialize them in probe and just keep the metadata_perm on the stack in q6v5_mpss_init_image. > + size_t size) > +{ > + static int current_owner[3][1] = {{BIT(QCOM_SCM_VMID_HLOS)}, > + {BIT(QCOM_SCM_VMID_HLOS)}, > + {BIT(QCOM_SCM_VMID_HLOS)} }; > + struct qcom_scm_vmperm next[] = {{0} }; You don't need to initialize this, and if you just keep it "struct qcom_scm_vmperm next" you can pass it as &next in the qcom_scm_assign_mem() call. > + int ret; > + > + if (!qproc->need_mem_protection) > + return 0; > + > + if (current_owner[image][0] == BIT(QCOM_SCM_VMID_HLOS)) { And rather than making this flip back and forth with every call, I think it's more robust if you pass the new expected owner as a parameter to the function. Simplest way I can think of it to add a "bool remote_owner" as a parameter; it makes the changes minimal and works with the naming of the function. > + next->vmid = QCOM_SCM_VMID_MSS_MSA; > + next->perm = QCOM_SCM_PERM_RW; > + } else { > + next->vmid = QCOM_SCM_VMID_HLOS; > + next->perm = QCOM_SCM_PERM_RWX; > + } > + > + ret = qcom_scm_assign_mem(addr, ALIGN(size, SZ_4K), > + current_owner[image][0], next, 1); > + if (ret < 0) { > + pr_err("Failed to assign %s memory access in range %p to %p ret = %d\n", > + (image == 0 ? "MDT" : image == 1 ? "MBA" : "MPSS"), > + (void *)addr, (void *)(addr + size), ret); > + return ret; > + } > + > + current_owner[image][0] = ret; > + return 0; > +} > + Regards, Bjorn