Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp630813pxb; Wed, 16 Feb 2022 00:22:17 -0800 (PST) X-Google-Smtp-Source: ABdhPJzEj6JEP77EQTjTv9X9XbqluS/V4cjAp8N5gIcvY1ivI1q2475G4/fVn6OnynW/srz0RHfc X-Received: by 2002:a17:90a:ca09:b0:1b8:bec1:9a3 with SMTP id x9-20020a17090aca0900b001b8bec109a3mr433624pjt.241.1644999737482; Wed, 16 Feb 2022 00:22:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644999737; cv=none; d=google.com; s=arc-20160816; b=wWk71JNZKj4VzxrkXODBuWN4NLOKCGVNtXDDvGmbOfihM5j24Ms0SW61KpjWIyRF0+ V1iaVYiJDAOB7Boq1FiyzxVhhLG/eGUjjP0x5bz6DUIPcKKkcw6S2YyZEUW68ueIBQI9 KfX1pG88DdHHeWhUYZ1rtOo41UQyBZT4N34fcbF+T6NhDsYhousk81AMQQp9YfboWkLv 4ywyKqlYEGLQEsK8jG5enpD1jGVJ9Iut9224fAzzOWjaXJW2Oev8DnxNlbw8MfR+06dn Ed6BqG1POhW3efh6Aj/LUWpB/fLW+RP3t1kM3se+eYbIx3jzgIvxHgiJjWaf5ZhhIU1h E0dQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=3UQwduVUZ+q8wif62BV/grOjAvJhZ7t6eekjdb8k+us=; b=LFIBGI+f0F+TF0x/ZtAjUnWB7Lx6Bz+nlASzbArD1SUB8gOLOe6d7n/oopvEQ2btFj dihu9Shsi1/DyauDU5oC7FIvQ8T0tzMnXJljPdDePb48t+JsUoRs2t53Z9gd6Ze6kery mWY/yEKPI21iLL0zQbDQ+H8Ws5irpKC/vegUMMeR44E1jeu/nw9CO0qY8Kcn/eiZcCZB c+svu1RHcdK4smra7jf/OU+GVtY7e33MDBRdvTk0vrL8QwHwP9iZR1E4wfwVTw2VHP7s AhlEbB58KjJE3LTmd/sZGBJqnB2ubrc2ZmbgEY2atPW1WlIDSD0M994IAkkmN04XDW+R hp5A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b="dtmziO/5"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id r70si5115632pgr.157.2022.02.16.00.22.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 16 Feb 2022 00:22:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b="dtmziO/5"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 895E22321E9; Wed, 16 Feb 2022 00:05:40 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231363AbiBPIFh (ORCPT + 99 others); Wed, 16 Feb 2022 03:05:37 -0500 Received: from gmail-smtp-in.l.google.com ([23.128.96.19]:52030 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231279AbiBPIFd (ORCPT ); Wed, 16 Feb 2022 03:05:33 -0500 Received: from lelv0142.ext.ti.com (lelv0142.ext.ti.com [198.47.23.249]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 24178225D37; Wed, 16 Feb 2022 00:05:20 -0800 (PST) Received: from fllv0035.itg.ti.com ([10.64.41.0]) by lelv0142.ext.ti.com (8.15.2/8.15.2) with ESMTP id 21G85CJB089471; Wed, 16 Feb 2022 02:05:12 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1644998712; bh=3UQwduVUZ+q8wif62BV/grOjAvJhZ7t6eekjdb8k+us=; h=Date:Subject:To:CC:References:From:In-Reply-To; b=dtmziO/5CXQ6QOxqCyUs6sD0TFQNQpbhjo/LSvPWpzGLinggT8s98SI/eZuOyNZyv eVD1vamxdgNHt5jlxOvjJ6YPKv69bdqsyhfxvCXWOB9Lp2Qnjo8+Owt1LIvAjYvL29 xy7DErcybvNB1BFZbR7+Wv2XSm6NyROSkVUHAxOM= Received: from DLEE109.ent.ti.com (dlee109.ent.ti.com [157.170.170.41]) by fllv0035.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 21G85Cgo055891 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 16 Feb 2022 02:05:12 -0600 Received: from DLEE101.ent.ti.com (157.170.170.31) by DLEE109.ent.ti.com (157.170.170.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.14; Wed, 16 Feb 2022 02:05:12 -0600 Received: from lelv0327.itg.ti.com (10.180.67.183) by DLEE101.ent.ti.com (157.170.170.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.14 via Frontend Transport; Wed, 16 Feb 2022 02:05:12 -0600 Received: from [10.250.148.139] (ileax41-snat.itg.ti.com [10.172.224.153]) by lelv0327.itg.ti.com (8.15.2/8.15.2) with ESMTP id 21G8571R087433; Wed, 16 Feb 2022 02:05:08 -0600 Message-ID: Date: Wed, 16 Feb 2022 13:35:07 +0530 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Subject: Re: [EXTERNAL] Re: [PATCH v4 1/2] remoteproc: Introduce deny_sysfs_ops flag Content-Language: en-US To: Mathieu Poirier CC: , , , , , , References: <20220209090342.13220-1-p-mohan@ti.com> <20220209090342.13220-2-p-mohan@ti.com> <20220210184802.GB3603040@p14s> From: Puranjay Mohan In-Reply-To: <20220210184802.GB3603040@p14s> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,RDNS_NONE,SPF_HELO_NONE, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Mathieu, On 11/02/22 00:18, Mathieu Poirier wrote: > Hi Puranjay, > > On Wed, Feb 09, 2022 at 02:33:41PM +0530, Puranjay Mohan wrote: >> The remoteproc framework provides sysfs interfaces for changing >> the firmware name and for starting/stopping a remote processor >> through the sysfs files 'state' and 'firmware'. The 'recovery' >> sysfs file can also be used similarly to control the error recovery >> state machine of a remoteproc. These interfaces are currently >> allowed irrespective of how the remoteprocs were booted (like >> remoteproc self auto-boot, remoteproc client-driven boot etc). >> These interfaces can adversely affect a remoteproc and its clients >> especially when a remoteproc is being controlled by a remoteproc >> client driver(s). Also, not all remoteproc drivers may want to >> support the sysfs interfaces by default. >> >> Add support to deny the sysfs state/firmware/recovery change by >> introducing a state flag 'deny_sysfs_ops' that the individual >> remoteproc drivers can set based on their usage needs. The default >> behavior is to allow the sysfs operations as before. >> >> Implement attribute_group->is_visible() to hide the sysfs >> state/firmware/recovery entries when deny_sysfs_ops flag is set. >> >> Signed-off-by: Puranjay Mohan >> --- >> Changes in v3->v4: >> Use mode = 0444 in rproc_is_visible() to make the sysfs entries >> read-only when the deny_sysfs_ops flag is set. >> --- >> drivers/remoteproc/remoteproc_sysfs.c | 18 +++++++++++++++++- >> include/linux/remoteproc.h | 2 ++ >> 2 files changed, 19 insertions(+), 1 deletion(-) >> >> diff --git a/drivers/remoteproc/remoteproc_sysfs.c b/drivers/remoteproc/remoteproc_sysfs.c >> index ea8b89f97d7b..da2d0eecfa44 100644 >> --- a/drivers/remoteproc/remoteproc_sysfs.c >> +++ b/drivers/remoteproc/remoteproc_sysfs.c >> @@ -230,6 +230,21 @@ static ssize_t name_show(struct device *dev, struct device_attribute *attr, >> } >> static DEVICE_ATTR_RO(name); >> >> +static umode_t rproc_is_visible(struct kobject *kobj, struct attribute *attr, >> + int n) >> +{ >> + struct device *dev = kobj_to_dev(kobj); >> + struct rproc *rproc = to_rproc(dev); >> + umode_t mode = attr->mode; >> + >> + if (rproc->deny_sysfs_ops && (attr == &dev_attr_recovery.attr || >> + attr == &dev_attr_firmware.attr || >> + attr == &dev_attr_state.attr)) > > I was wondering if we should also add coredump to this group to make it an all > or nothing option (name is already read only). I have sent a v5 where I have added coredump to this. > >> + mode = 0444; > > Much better. > >> + >> + return mode; >> +} >> + >> static struct attribute *rproc_attrs[] = { >> &dev_attr_coredump.attr, >> &dev_attr_recovery.attr, >> @@ -240,7 +255,8 @@ static struct attribute *rproc_attrs[] = { >> }; >> >> static const struct attribute_group rproc_devgroup = { >> - .attrs = rproc_attrs >> + .attrs = rproc_attrs, >> + .is_visible = rproc_is_visible, >> }; >> >> static const struct attribute_group *rproc_devgroups[] = { >> diff --git a/include/linux/remoteproc.h b/include/linux/remoteproc.h >> index e0600e1e5c17..3849c66ce38f 100644 >> --- a/include/linux/remoteproc.h >> +++ b/include/linux/remoteproc.h >> @@ -523,6 +523,7 @@ struct rproc_dump_segment { >> * @table_sz: size of @cached_table >> * @has_iommu: flag to indicate if remote processor is behind an MMU >> * @auto_boot: flag to indicate if remote processor should be auto-started >> + * @deny_sysfs_ops: flag to not permit sysfs operations on state, firmware and recovery >> * @dump_segments: list of segments in the firmware >> * @nb_vdev: number of vdev currently handled by rproc >> * @elf_class: firmware ELF class >> @@ -562,6 +563,7 @@ struct rproc { >> size_t table_sz; >> bool has_iommu; >> bool auto_boot; >> + bool deny_sysfs_ops; > > Wouldn't "sysfs_read_only" make more sense? I agree, I have renamed it to sysfs_read_only in v5 patch > > > With or without the above and for this set: > > Reviewed-by: Mathieu Poirier Thanks. Puranjay Mohan > >> struct list_head dump_segments; >> int nb_vdev; >> u8 elf_class; >> -- >> 2.17.1 >>