Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp424849ybh; Wed, 18 Mar 2020 02:30:03 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvVCuEArhGndWx8Hi8XutjOvkJL6SKvDCzlM4rzgeAJOTMEKpHeaVdCzL20jq0AdFsmf76F X-Received: by 2002:aca:cc08:: with SMTP id c8mr2383504oig.42.1584523803645; Wed, 18 Mar 2020 02:30:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584523803; cv=none; d=google.com; s=arc-20160816; b=yAKFtoBXhhnYHaCGAj3pbqGlUpc1CU+00L6lRV6cqzA/egIqg1e/UR5nthaG5Hdfhm 4EFNDS9jmQUmp/AMPCUpM70wuK8VZr8uCk5wxZ/LQ9fsv1TwqGKVIbny4mvRGX1j6v0F hilTF6+i1rr3mHpaxirzP2ykixLdRRfK4lWBpZ1bR2xYroxaGgt8ZVsRsA5GqF52gp6z 7IObgxvTW0N6gRfowOuntGw7MD6TRleF7k4GZ3KF8LoHKbAjdMWm2gfV1rRbGmm5tw8k m0vAoSMfLF/t3+pH/tpdK9SRivtQGSgDwM7ftFejY2NddMcBDYl4QJzUZPg0YYz1SeUl 6B5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=AcA38RUWjD4dfUYZXxzc2GTaxcgFK1bvdJs75Z0azlM=; b=REgWDMQU9bUv1g61V/JK2GQKhOlBKhUQmpvHBjZZPaMdoxWhfxOa4Ub4nzqFrGmFAN 40yCxQ+LDoa1xnVXYXP5iZXvMxR14bOGHNVwXEpQSRPsbI+FRQzX9rlr8ek3zNTqTG16 rIYysoDt1BM242vn4oWBAYu1vCcmqjkV8zeLEiz0NqjLjh1ZNvENQc0xx1n9T5t+t61n jKqtMGZh9luIzVmqKwZFAlb1JrZLgA4nH4F0pL4vu9kG9efAnOm9ktoKfuZIa6KzD2wn RiN2kvvqJv6grZqgRBJQOrnKCr8Io8ve0lpFwBtjUV0I1s0U5DaYk5B52pWSUUsOFd21 hUng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=wlbWwq3r; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c4si3198371otp.218.2020.03.18.02.29.50; Wed, 18 Mar 2020 02:30:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=wlbWwq3r; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727552AbgCRJ3G (ORCPT + 99 others); Wed, 18 Mar 2020 05:29:06 -0400 Received: from mail-wm1-f68.google.com ([209.85.128.68]:55055 "EHLO mail-wm1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726994AbgCRJ3F (ORCPT ); Wed, 18 Mar 2020 05:29:05 -0400 Received: by mail-wm1-f68.google.com with SMTP id n8so2365960wmc.4 for ; Wed, 18 Mar 2020 02:29:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=AcA38RUWjD4dfUYZXxzc2GTaxcgFK1bvdJs75Z0azlM=; b=wlbWwq3rlPYqAMhDbUZqFT7sOv5rRyf8tmem1yYBY9+tBwmRExsVotp/CWNH2nxdfC a75a2hgdG0W6gxizWpuNzSjObmeJtdwgm5Xxjb4wo30OrolEclAioiWSHv2d/pF2Mv62 A3zbQoncn9bGo7PnLo8UGDFsm6bbS/rENORdxUHHbVA6qiKZ7GXPzLKDSC6OBKThnK17 HpXITHzhPPdyAZ8Hn2Lh99BjwCmJy2CdjQ0chxLbphFI0aqZ/SRtwtj11VhE4CQuVyok GtwvoC43aDgVMOohAMiNYcCXBw2VyDrNuMWKSamf5hkPTD7HeAN5VnGrKPGOh9DFi4yw W8kQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=AcA38RUWjD4dfUYZXxzc2GTaxcgFK1bvdJs75Z0azlM=; b=QVUh8UYXzfu6/iCrh3HlDgiZkqi+9Dxh+i/oFGOrLsxHgtIGhc6AwOXKfkPfrGKlnY ClvbbHpWS3TLze3oEMLAh3EBkYOBJ8GlR+dDTWu5JOaSrkAX5amqmy5WIqBFjCRD0cR4 /9cNkVnkX/nk78i7/BWzcKWFWAn3vn6YwC1qQ2q1Ic48h0SFh74mmX+P0ecd/Nbyo1uh R/G7MGGRmJ+R/BkjFWaAsAnjEMa600R6sZfnOHRepkng9v5ayimK3QQmTkYDVetEy46j 5GK50N3Qv/iW9i//P2wCkV+lLz+ZQi3J1j9X01XtnMnT6fH6Kmk4F11pmz12H3iKYTUM ArUA== X-Gm-Message-State: ANhLgQ1V9dia77oBe1lO8cHYN14u03rkCCu+OqAQ6OCHQ+3RzgMQejuG WmUOOm9tKQaWYJeN237BYjYBrA== X-Received: by 2002:a1c:3d6:: with SMTP id 205mr4474263wmd.155.1584523742174; Wed, 18 Mar 2020 02:29:02 -0700 (PDT) Received: from [192.168.86.34] (cpc89974-aztw32-2-0-cust43.18-1.cable.virginm.net. [86.30.250.44]) by smtp.googlemail.com with ESMTPSA id b4sm3061215wmj.12.2020.03.18.02.29.00 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 18 Mar 2020 02:29:00 -0700 (PDT) Subject: Re: [PATCH v4 1/1] nvmem: Add support for write-only instances To: Nicholas Johnson Cc: "linux-kernel@vger.kernel.org" , Mika Westerberg References: <74d0c4a6-a056-ad45-529e-97b117d4e60b@linaro.org> From: Srinivas Kandagatla Message-ID: Date: Wed, 18 Mar 2020 09:28:59 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 18/03/2020 09:17, Nicholas Johnson wrote: > On Tue, Mar 17, 2020 at 02:35:44PM +0000, Srinivas Kandagatla wrote: >> >> >> On 17/03/2020 01:01, Nicholas Johnson wrote: >>> There is at least one real-world use-case for write-only nvmem >>> instances. Refer to 03cd45d2e219 ("thunderbolt: Prevent crash if >>> non-active NVMem file is read"). >>> >>> Add support for write-only nvmem instances by adding attrs for 0200. >>> >>> Change nvmem_register() to abort if NULL group is returned from >>> nvmem_sysfs_get_groups(). >>> >>> Return NULL from nvmem_sysfs_get_groups() in invalid cases. >>> >>> Signed-off-by: Nicholas Johnson >>> --- >>> drivers/nvmem/core.c | 9 ++++-- >>> drivers/nvmem/nvmem-sysfs.c | 56 +++++++++++++++++++++++++++++++------ >>> 2 files changed, 54 insertions(+), 11 deletions(-) >>> >>> diff --git a/drivers/nvmem/core.c b/drivers/nvmem/core.c >>> index ef326f243..95ea9a3b2 100644 >>> --- a/drivers/nvmem/core.c >>> +++ b/drivers/nvmem/core.c >>> @@ -373,6 +373,12 @@ struct nvmem_device *nvmem_register(const struct nvmem_config *config) >>> nvmem->type = config->type; >>> nvmem->reg_read = config->reg_read; >>> nvmem->reg_write = config->reg_write; >>> + nvmem->dev.groups = nvmem_sysfs_get_groups(nvmem, config); >>> + if (!nvmem->dev.groups) { >>> + kfree(nvmem); >>> + return ERR_PTR(-EINVAL); >> >> When I meant leaking here, not just memory but other resources like idr and >> gpio. >> >> You should do something like this: >> >> if (!nvmem->dev.groups) { >> ida_simple_remove(&nvmem_ida, nvmem->id); >> gpiod_put(nvmem->wp_gpio); >> kfree(nvmem); >> return ERR_PTR(-EINVAL); >> } > Thanks. I am guessing these are called indirectly when there are other > failures (goto err_*). We have ida_simple_remove() in nvmem_release() > but I cannot find gpiod_put anywhere in drivers/nvmem. Because you are returning here before device intialize, you would need to do the cleanup. Latest changes are available in linux-next or https://git.kernel.org/pub/scm/linux/kernel/git/srini/nvmem.git/tree/drivers/nvmem/core.c?h=for-next Please rebase your patches on top of this branch, so its easy for me to apply without conflicts. --srini > >> >>> + } >>> + >>> if (!config->no_of_node) >>> nvmem->dev.of_node = config->dev->of_node; >>> @@ -387,8 +393,6 @@ struct nvmem_device *nvmem_register(const struct nvmem_config *config) >>> nvmem->read_only = device_property_present(config->dev, "read-only") || >>> config->read_only || !nvmem->reg_write; >>> - nvmem->dev.groups = nvmem_sysfs_get_groups(nvmem, config); >>> - >>> device_initialize(&nvmem->dev); >>> dev_dbg(&nvmem->dev, "Registering nvmem device %s\n", config->name); >>> @@ -430,7 +434,6 @@ struct nvmem_device *nvmem_register(const struct nvmem_config *config) >>> device_del(&nvmem->dev); >>> err_put_device: >>> put_device(&nvmem->dev); >>> - >> unnecessary cleanup here! > Sorry, I let this mistake slip, despite checking my work. > >> >> Other than that every thing looks good to me! >> >> >> --srini > > Cheers, > Nicholas >> >>> return ERR_PTR(rval); >>> } >>> EXPORT_SYMBOL_GPL(nvmem_register); >>> diff --git a/drivers/nvmem/nvmem-sysfs.c b/drivers/nvmem/nvmem-sysfs.c >>> index 9e0c429cd..4ceac8680 100644 >>> --- a/drivers/nvmem/nvmem-sysfs.c >>> +++ b/drivers/nvmem/nvmem-sysfs.c >>> @@ -196,16 +196,49 @@ static const struct attribute_group *nvmem_ro_root_dev_groups[] = { >>> NULL, >>> }; >>> +/* write only permission, root only */ >>> +static struct bin_attribute bin_attr_wo_root_nvmem = { >>> + .attr = { >>> + .name = "nvmem", >>> + .mode = 0200, >>> + }, >>> + .write = bin_attr_nvmem_write, >>> +}; >>> + >>> +static struct bin_attribute *nvmem_bin_wo_root_attributes[] = { >>> + &bin_attr_wo_root_nvmem, >>> + NULL, >>> +}; >>> + >>> +static const struct attribute_group nvmem_bin_wo_root_group = { >>> + .bin_attrs = nvmem_bin_wo_root_attributes, >>> + .attrs = nvmem_attrs, >>> +}; >>> + >>> +static const struct attribute_group *nvmem_wo_root_dev_groups[] = { >>> + &nvmem_bin_wo_root_group, >>> + NULL, >>> +}; >>> + >>> const struct attribute_group **nvmem_sysfs_get_groups( >>> struct nvmem_device *nvmem, >>> const struct nvmem_config *config) >>> { >>> - if (config->root_only) >>> - return nvmem->read_only ? >>> - nvmem_ro_root_dev_groups : >>> - nvmem_rw_root_dev_groups; >>> + /* Read-only */ >>> + if (nvmem->reg_read && (!nvmem->reg_write || nvmem->read_only)) >>> + return config->root_only ? >>> + nvmem_ro_root_dev_groups : nvmem_ro_dev_groups; >>> + >>> + /* Read-write */ >>> + if (nvmem->reg_read && nvmem->reg_write && !nvmem->read_only) >>> + return config->root_only ? >>> + nvmem_rw_root_dev_groups : nvmem_rw_dev_groups; >>> + >>> + /* Write-only, do not honour request for global writable entry */ >>> + if (!nvmem->reg_read && nvmem->reg_write && !nvmem->read_only) >>> + return config->root_only ? nvmem_wo_root_dev_groups : NULL; >>> - return nvmem->read_only ? nvmem_ro_dev_groups : nvmem_rw_dev_groups; >>> + return NULL; >>> } >>> /* >>> @@ -224,17 +257,24 @@ int nvmem_sysfs_setup_compat(struct nvmem_device *nvmem, >>> if (!config->base_dev) >>> return -EINVAL; >>> - if (nvmem->read_only) { >>> + if (nvmem->reg_read && (!nvmem->reg_write || nvmem->read_only)) { >>> if (config->root_only) >>> nvmem->eeprom = bin_attr_ro_root_nvmem; >>> else >>> nvmem->eeprom = bin_attr_ro_nvmem; >>> - } else { >>> + } else if (!nvmem->reg_read && nvmem->reg_write && !nvmem->read_only) { >>> + if (config->root_only) >>> + nvmem->eeprom = bin_attr_wo_root_nvmem; >>> + else >>> + return -EINVAL; >>> + } else if (nvmem->reg_read && nvmem->reg_write && !nvmem->read_only) { >>> if (config->root_only) >>> nvmem->eeprom = bin_attr_rw_root_nvmem; >>> else >>> nvmem->eeprom = bin_attr_rw_nvmem; >>> - } >>> + } else >>> + return -EINVAL; >>> + >>> nvmem->eeprom.attr.name = "eeprom"; >>> nvmem->eeprom.size = nvmem->size; >>> #ifdef CONFIG_DEBUG_LOCK_ALLOC >>>