lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <02f28b5f-d3d6-755f-066d-88b90aa35eef@arm.com>
Date:   Fri, 31 Jul 2020 12:36:55 +0100
From:   Suzuki K Poulose <suzuki.poulose@....com>
To:     mathieu.poirier@...aro.org
Cc:     linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
        mike.leach@...aro.org, coresight@...ts.linaro.org
Subject: Re: [RFC PATCH 03/14] coresight: tpiu: Use coresight device access
 abstraction

On 07/29/2020 10:01 PM, Mathieu Poirier wrote:
> On Wed, Jul 22, 2020 at 06:20:29PM +0100, Suzuki K Poulose wrote:
>> TPIU driver access the device before the coresight device
>> is registered. In other words, before the drvdata->csdev
>> is valid. Thus, we need to make sure that the csdev_access
>> is valid for both the invocations. Switch to using the
>> csdev_access directly instead of relying on availability
>> of drvdata->csdev.
> 
> I'm not sure all of the above is needed and based on the wording I could easily
> see this patch being selected for stable backport, which would be a mistak.
> 
> The gist of this patch is that we are moving to the access abstraction and the
> changelog should reflect that.

True, I will make it something like :

"Prepare the TPIU driver to make use of the CoreSight device access
abstraction layer. The driver touches the device even before the
coresight device is registered. Thus we could be accessing the
devices without a csdev. As we are about to use the abstraction
layer for accessing the device, pass in the access directly
to avoid having to deal with the un-initialised csdev.


>>   
>>   static int tpiu_disable(struct coresight_device *csdev)
>>   {
>> -	struct tpiu_drvdata *drvdata = dev_get_drvdata(csdev->dev.parent);
>> -
>>   	if (atomic_dec_return(csdev->refcnt))
>>   		return -EBUSY;
>>   
>> -	tpiu_disable_hw(drvdata);
>> +	tpiu_disable_hw(&csdev->access);
>>   
>>   	dev_dbg(&csdev->dev, "TPIU disabled\n");
>>   	return 0;
>> @@ -152,7 +148,7 @@ static int tpiu_probe(struct amba_device *adev, const struct amba_id *id)
>>   	desc.access.base = base;
> 
> Any reason for introducing the above in patch 02?  I would have done that as
> part of this patch...  Also part of this patch I would remove drvdata::base
> since it is no longer needed.

The patch 02 is not touching how the individual drivers access the
device, yet. It only sets the way by introducing the layer. As per
the proposed change, this is a preparation of the TPIU driver, so
that we can convert the generic helper functions ( coresight_timeout())
more easily and keep the patch 05 easier for review (just like the Patch
4, which prepares the ETM driver).

Cheers
Suzuki


> 
> I'm out of time for today - I will continue tomorrow.
> 
> Regards,
> Mathieu
> 
>>   
>>   	/* Disable tpiu to support older devices */
>> -	tpiu_disable_hw(drvdata);
>> +	tpiu_disable_hw(&desc.access);
>>   
>>   	pdata = coresight_get_platform_data(dev);
>>   	if (IS_ERR(pdata))
>> -- 
>> 2.24.1
>>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ