lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20090610004447.78b84cd5.akpm@linux-foundation.org>
Date:	Wed, 10 Jun 2009 00:44:47 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Baruch Siach <baruch@...s.co.il>
Cc:	linux-kernel@...r.kernel.org, dbrownell@...rs.sourceforge.net,
	linux-arm-kernel@...ts.arm.linux.org.uk, linux@....linux.org.uk
Subject: Re: [PATCH v4] gpio: driver for PrimeCell PL061 GPIO controller

On Wed, 10 Jun 2009 10:22:31 +0300 Baruch Siach <baruch@...s.co.il> wrote:

> Hi Andrew,
> 
> > >  static unsigned int pl061_irq_startup(unsigned irq)
> > >  {
> > > -	int ret;
> > > -
> > > -	ret = gpio_request(irq_to_gpio(irq), "IRQ");
> > > -	if (ret < 0) {
> > > -		pr_warning("%s: warning: gpio_request(%d) returned %d\n",
> > > -				__func__, irq_to_gpio(irq), ret);
> > > -		return 0;
> > > -	}
> > > +	if (gpio_request(irq_to_gpio(irq), "IRQ") == 0)
> > > +		pr_warning("%s: warning: GPIO%d has not been requested\n",
> > > +				__func__, irq_to_gpio(irq));
> > 
> > This is wrong, isn't it?  gpio_request() returns 0 on success.
> 
> Russell said that gpio configuration is the responsibility of the platform 
> code. Here I just warn when the gpio has not been requested, and thus 
> gpio_request() succeeds. I'll add a comment.

OK.

If the gpio_request() accidentally succeeded, should we gpio_free() the
result here?

Should the gpio core provide a primitive to check that a gpio has been
properly requested rathe rthan open-coding it here?

> > >  static void pl061_irq_handler(unsigned irq, struct irq_desc *desc)
> > >  {
> > > +	struct list_head *chip_list = get_irq_chip_data(irq);
> > > +	struct list_head *ptr;
> > > +	struct pl061_gpio *chip;
> > > +
> > >  	desc->chip->ack(irq);
> > > -	while (1) {
> > > +	list_for_each(ptr, chip_list) {
> > 
> > What locking protects the newly-added list?
> 
> Do we need locking even though we list_add() only at probe time?

Nope.  I guess.  It depends on the driver.  hotplug/hot-remove needs to
beconsidered often.

> (Compiling as 
> a module is not supported, so this only happens at boot time).

The probe handler is probably serialised against everything else even if
the driver _is_ a module.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ