lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BD79186B4FD85F4B8E60E381CAEE190901D41E4C@mi8nycmail19.Mi8.com>
Date:	Thu, 17 Sep 2009 20:29:54 -0400
From:	"H Hartley Sweeten" <hartleys@...ionengravers.com>
To:	"Mike Frysinger" <vapier@...too.org>,
	<spi-devel-general@...ts.sourceforge.net>,
	"David Brownell" <dbrownell@...rs.sourceforge.net>
Cc:	"Yi Li" <yi.li@...log.com>,
	"Andrew Morton" <akpm@...ux-foundation.org>,
	<linux-kernel@...r.kernel.org>
Subject: RE: [spi-devel-general] [PATCH 2/2] mmc_spi: lock the SPI bus whenaccessing the card

On Thursday, September 17, 2009 3:03 PM, Mike Frysinger wrote:
> From: Yi Li <yi.li@...log.com>
> 
> The MMC/SPI spec does not play well with typical SPI design -- it often
> needs to send out a command in one message, read a response, then do some
> other arbitrary step.  Since we can't let another SPI client use the bus
> during this time, use the new SPI lock/unlock functions to provide the
> required exclusivity.
> 
> Signed-off-by: Yi Li <yi.li@...log.com>
> Signed-off-by: Mike Frysinger <vapier@...too.org>
> ---
>  drivers/mmc/host/mmc_spi.c |   29 ++---------------------------
>  1 files changed, 2 insertions(+), 27 deletions(-)
> 
> diff --git a/drivers/mmc/host/mmc_spi.c b/drivers/mmc/host/mmc_spi.c
> index a461017..a96e058 100644
> --- a/drivers/mmc/host/mmc_spi.c
> +++ b/drivers/mmc/host/mmc_spi.c
> @@ -1084,6 +1084,7 @@ static void mmc_spi_request(struct mmc_host *mmc, struct mmc_request *mrq)
>  #endif
>  
>  	/* issue command; then optionally data and stop */
> +	spi_lock_bus(host->spi);
>  	status = mmc_spi_command_send(host, mrq, mrq->cmd, mrq->data != NULL);
>  	if (status == 0 && mrq->data) {
>  		mmc_spi_data_do(host, mrq->cmd, mrq->data, mrq->data->blksz);
> @@ -1092,7 +1093,7 @@ static void mmc_spi_request(struct mmc_host *mmc, struct mmc_request *mrq)
>  		else
>  			mmc_cs_off(host);
>  	}
> -
> +	spi_unlock_bus(host->spi);
>  	mmc_request_done(host->mmc, mrq);
>  }
>  
> @@ -1337,32 +1338,6 @@ static int mmc_spi_probe(struct spi_device *spi)
>  		return status;
>  	}
>  
> -	/* We can use the bus safely iff nobody else will interfere with us.
> -	 * Most commands consist of one SPI message to issue a command, then
> -	 * several more to collect its response, then possibly more for data
> -	 * transfer.  Clocking access to other devices during that period will
> -	 * corrupt the command execution.
> -	 *
> -	 * Until we have software primitives which guarantee non-interference,
> -	 * we'll aim for a hardware-level guarantee.
> -	 *
> -	 * REVISIT we can't guarantee another device won't be added later...
> -	 */
> -	if (spi->master->num_chipselect > 1) {
> -		struct count_children cc;
> -
> -		cc.n = 0;
> -		cc.bus = spi->dev.bus;
> -		status = device_for_each_child(spi->dev.parent, &cc,
> -				maybe_count_child);
> -		if (status < 0) {
> -			dev_err(&spi->dev, "can't share SPI bus\n");
> -			return status;
> -		}
> -
> -		dev_warn(&spi->dev, "ASSUMING SPI bus stays unshared!\n");
> -	}
> -
>  	/* We need a supply of ones to transmit.  This is the only time
>  	 * the CPU touches these, so cache coherency isn't a concern.
>  	 *

Removing the above block of code causes:

drivers/mmc/host/mmc_spi.c:1299: warning: 'maybe_count_child' defined but not used

That function should also be removed along with the "struct count_children"
definition.

Regards,
Hartley
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ