[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20161003173028.GF6801@obsidianresearch.com>
Date: Mon, 3 Oct 2016 11:30:28 -0600
From: Jason Gunthorpe <jgunthorpe@...idianresearch.com>
To: "Winkler, Tomas" <tomas.winkler@...el.com>
Cc: Jarkko Sakkinen <jarkko.sakkinen@...ux.intel.com>,
"tpmdd-devel@...ts.sourceforge.net"
<tpmdd-devel@...ts.sourceforge.net>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] tpm: don't destroy chip device prematurely
On Mon, Oct 03, 2016 at 05:16:18PM +0000, Winkler, Tomas wrote:
> > > Please be more specific regarding flows you think will be wrong with
> > > this patch, you must agree that the current code is broken even w/o
> > > runtime pm.
> >
> > No, I don't agree. Accessing dev->name is OK after the device_del.
>
> But you cannot assume that just dev->name is accessed and and
> runtime_pm breaks this assumption..
It was built around that assumption.
Our chip methods have been built to not require the device to be
registered. We call many of them before we even do device
registration, for instance.
The pm patches can't break that. What is the actual problem anyhow?
> > What devicde_del does is fence off all sorts of ways to access the device, eg
> > sysfs files, bus registrations, etc, etc. That absolutely must be done before
> > calling tpm_suspend.
>
> But tpm2_shutdown is acceded via tpm_chip , we cannot call
> device_del before, this is just wrong from the Linux device mode
> perspective, we have to use other means to close the access to the
> device.
device_del is the means to close access - that it what it does -
unregister the device from the system. The tpm_chip must be
operational independent of a *registered* device. chip methods can
only assume that the device is *initialized*
This is a basic pattern followed by other subsystems.
This is why it is OK to look at dev->name, but not okay to muck with
other stuff under a chip method.
Jason
Powered by blists - more mailing lists