Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752687AbdHVUbh (ORCPT ); Tue, 22 Aug 2017 16:31:37 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:33286 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752280AbdHVUbe (ORCPT ); Tue, 22 Aug 2017 16:31:34 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 673B7602B3 Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=sboyd@codeaurora.org Date: Tue, 22 Aug 2017 13:31:32 -0700 From: Stephen Boyd To: Shawn Guo Cc: Kiran Gunda , gregkh@linuxfoundation.org, Rob Herring , Mark Rutland , Abhijeet Dharmapurikar , David Collins , devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-arm-msm-owner@vger.kernel.org Subject: Re: [PATCH V2] spmi: pmic-arb: Enforce the ownership check optionally Message-ID: <20170822203132.GC21656@codeaurora.org> References: <1503070110-15018-1-git-send-email-kgunda@codeaurora.org> <20170822085541.GB3685@dragon> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170822085541.GB3685@dragon> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2906 Lines: 59 On 08/22, Shawn Guo wrote: > On Mon, Aug 21, 2017 at 04:18:58PM -0700, Stephen Boyd wrote: > > On 08/18/2017 08:28 AM, Kiran Gunda wrote: > > > The peripheral ownership check is not necessary on single master > > > platforms. Hence, enforce the peripheral ownership check optionally. > > > > > > Signed-off-by: Kiran Gunda > > > Tested-by: Shawn Guo > > > --- > > > > This sounds like a band-aid. Isn't the gpio driver going to keep probing > > all the pins that are not supposed to be accessed due to security > > constraints? What exactly is failing in the gpio case? > > There is a platform_irq_count() call in pinctrl-spmi-gpio probe > function. Due to the owner check in spmi-pmic-arb IRQ domain > qpnpint_irq_domain_dt_translate() function, the call will return irq > number as zero and cause pmic_gpio_probe() fail with -EINVAL error. > > [ 1.608516] [] qpnpint_irq_domain_dt_translate+0x168/0x194 > [ 1.613557] [] irq_create_fwspec_mapping+0x17c/0x2d8 > [ 1.620672] [] irq_create_of_mapping+0x64/0x74 > [ 1.627008] [] of_irq_get+0x54/0x64 > [ 1.633169] [] platform_get_irq+0x20/0x150 > [ 1.638117] [] platform_irq_count+0x28/0x44 > [ 1.643850] [] pmic_gpio_probe+0x50/0x544 > Hmm. Ok. I guess platform_irq_count() has to go and create irq mappings if they haven't been created yet and that then causes us to check if we can even get the interrupt for this particular irq? There are some interrupt lines that are not routed to the application processor in the system, so the irq_ee (irq execution environment) is different. This check is there to avoid creating flow handlers for irqs that can't be triggered. I can see how trying to request that irq doesn't make sense, because it won't ever happen. But preventing that from being translated is confusing. Perhaps we can move the check for irq_ee to the irq_request_resources() callback in the irqchip? That way, we can fail installing the flow handler for the interrupt we can't ever receive, but otherwise translate the interrupt number so we can keep counting them. Also, I see that on v4.13-rc series the read/write checks are causing the led driver to fail in a different way: spmi spmi-0: error: impermissible write to peripheral sid:0 addr:0xc040 qcom-spmi-gpio 200f000.spmi:pm8916@0:gpios@c000: write 0x40 failed leds-gpio soc:leds: Error applying setting, reverse things back spmi spmi-0: error: impermissible write to peripheral sid:0 addr:0xc041 qcom-spmi-gpio 200f000.spmi:pm8916@0:gpios@c000: write 0x41 failed leds-gpio: probe of soc:leds failed with error -1 Are you seeing similar behavior? -- Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, a Linux Foundation Collaborative Project