Received: by 2002:a05:7412:8521:b0:e2:908c:2ebd with SMTP id t33csp282461rdf; Thu, 2 Nov 2023 23:42:10 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHNaicqs9avwUY05fSpBnmrWgcITlnnFmk9bSlyxOhvVz9DyfpHM2XE7plaW8pAIBa4sgpZ X-Received: by 2002:a17:907:1b02:b0:9ae:82b4:e309 with SMTP id mp2-20020a1709071b0200b009ae82b4e309mr6578156ejc.0.1698993730074; Thu, 02 Nov 2023 23:42:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698993730; cv=none; d=google.com; s=arc-20160816; b=RMMpgDg0n4ljky8iv5LkLuaWETU9dSSm5G+G6edzL5d6U7Owuxqem8/Ur0aufQb6UY MrlLJUDM6qNy8ygQ5RtqVJB9JUyjcyf5nuSsaEt8dn2pxg8Se6ZyootIuvdtQ0SFnBsT JZb9VS35kwLRNeU9y14WwmrmnT9SDIOX8rTde2aaW9rBkF4g6l2fljX24OYb4D0YkMUi ql0m9awEPi+JFlh+jkFCiSqNjM0GeWwM1AtDzwGaNX5W/9ghHJRPbM3YEXUMQTA+WqlE 3YNEfsdlpMK0s1ZI476wMp+9d/TgUibcy9e/fjAiJ0o7v+rYJdPJEyLTz8N/cKiokYxc SNdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=t/dfQMOYOLtfc4Cu7WL7YJ/Jr8XKJ/+jMVpNbQa4u+0=; fh=c8kSjwxPXvCpgnqSomMaVsGHizQ3M0+F4UAxV5DGTWw=; b=X7ymk/vHBVlvTDB6SLTfa06qJ8Tjj60uoxlGZfx88tNp8kQZLLjU+2X+dqfSFmhiUo XZfm3j+BJ0e44HK+hTAKNQynKd0xTnBNVKblbSHGL+N1P/RCBpDFYzxPEODlLvIpdpjE K+Zb7sdybp4tGaeBSjdVfZCSBXLir+Bitvmu9xGY1SFT0L6DJ30Z7Pucupzj9dMU1BAK Xq5XI7u18RmXl0aud5k5zuIALrC4CMIZnupf0vidzM0QEkmdNqJnlTx8fgATEhygBZNd dkPr+DNzqmvBEFLRqonYIX3C9y287b230JErgSKVyl6m95mCA3+9Sj3sBIwelOWSOQF4 4NRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=REnQ3Wlk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id y28-20020a170906519c00b009c592b85ad4si579683ejk.572.2023.11.02.23.42.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Nov 2023 23:42:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=REnQ3Wlk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 45EB38135CC8; Thu, 2 Nov 2023 23:42:04 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231905AbjKCGlv (ORCPT + 99 others); Fri, 3 Nov 2023 02:41:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44682 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230502AbjKCGlt (ORCPT ); Fri, 3 Nov 2023 02:41:49 -0400 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.24]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 91FA01AD for ; Thu, 2 Nov 2023 23:41:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1698993703; x=1730529703; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=GNbYZ7OmaM1yZArVuv5RFFMsOCpLosCpzVseJlUykus=; b=REnQ3Wlkuxq5+HYbHHtIM9JIQGuS/x5T2vxtqPBxsmNB0VD3qq8bt3Ib WAzV1LjNI5PoS/TKPaCVz0/VbH0V74u1ahdCSML/CYPHUGfrVZB235KNt wjt/DUAdnhLph2oj1KFU2X65qf23qJYRT3dUdvr53BWdXM//9YqxBXPH0 vjBytXFttIwjctZj7kHYxgRiuAEgXI4vkUDkOi0uvMGS7ELmUbWVwE8r3 kngHxf2lV0UTd4rMg3f1JJot0W5arM0gHy7eLv53FWkM7Kt8NSBR2jq3d EpIyo1jpkoiNLtt6thZO1DOwkgSrq5cbdd7XIHQgAwK7GO8f15rpiISd0 Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10882"; a="391757978" X-IronPort-AV: E=Sophos;i="6.03,273,1694761200"; d="scan'208";a="391757978" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 02 Nov 2023 23:41:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10882"; a="905251661" X-IronPort-AV: E=Sophos;i="6.03,273,1694761200"; d="scan'208";a="905251661" Received: from black.fi.intel.com ([10.237.72.28]) by fmsmga001.fm.intel.com with ESMTP; 02 Nov 2023 23:41:41 -0700 Received: by black.fi.intel.com (Postfix, from userid 1001) id 4E5972A6; Fri, 3 Nov 2023 08:41:40 +0200 (EET) Date: Fri, 3 Nov 2023 08:41:40 +0200 From: Mika Westerberg To: Andy Shevchenko Cc: Chen Ni , lee@kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] mfd: intel-lpss: Fix IRQ check Message-ID: <20231103064140.GP17433@black.fi.intel.com> References: <20231101062643.507983-1-nichen@iscas.ac.cn> <20231101070310.GF17433@black.fi.intel.com> <20231101104717.GH17433@black.fi.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-1.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Thu, 02 Nov 2023 23:42:04 -0700 (PDT) On Thu, Nov 02, 2023 at 02:38:31PM +0200, Andy Shevchenko wrote: > > > > > - if (!info || !info->mem || info->irq <= 0) > > > > > + if (!info || !info->mem) > > > > > > > > This check (info->irq <= 0) covers both "invalid" interrupt numbers > > > > (that's the negative errno and 0 as no interrupt) so I don't see how > > > > this change makes it any better and the changelog does not clarify it > > > > either. > > > > > > It makes sense. The IRQ here may not be 0. We should actually fix > > > the PCI code to guarantee that (platform_get_irq() guarantees that > > > in platform driver). > > > > Yeah but I mean the check above handles any "invalid" interrupt number > > just fine regardless. I don't see any point changing that. > > The point is to have proper error code to be returned. Currently it's shadowed > in this check. Looking at this more, this patch actually introduces a bug. We pass pci_dev->irq from intel-lpss-pci.c and that comes directly from PCI core that assigns it in pci_read_irq(). This value is unsigned int for starters so it is not designed to contain an error code, secondly it can be 0 meaning "no IRQ" either if is SRIOV device or the interrupt line is not assigned. I actually think SRIOV is a possibility for future LPSS devices so we should be dealing with this properly.