From mboxrd@z Thu Jan 1 00:00:00 1970 From: Olof Johansson Subject: Re: [PATCH v11 03/11] firmware: xilinx: Add zynqmp IOCTL API for device control Date: Sun, 23 Sep 2018 14:10:59 +0100 Message-ID: References: <1533318808-10781-1-git-send-email-jollys@xilinx.com> <1533318808-10781-4-git-send-email-jollys@xilinx.com> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Return-path: In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org To: Jolly Shah Cc: Sudeep Holla , "ard.biesheuvel@linaro.org" , Ingo Molnar , Greg Kroah-Hartman , "matt@codeblueprint.co.uk" , "hkallweit1@gmail.com" , Kees Cook , Dmitry Torokhov , Michael Turquette , Stephen Boyd , Michal Simek , Rob Herring , Mark Rutland , linux-clk , Rajan Vaja , Linux ARM Mailing List , Linux Kernel Mailing List , DTML List-Id: devicetree@vger.kernel.org Hi, Apologies for the slow responses here, I meant to follow up on this sooner. On Tue, Sep 11, 2018 at 8:20 PM, Jolly Shah wrote: > Hi Sudeep and Olof, > > Clock driver from same patch set uses ioctl API along with other clock ee= mi APIs. As clock patches' final review is pending by Stephen, Michal only = created pull request for rest of the patches and that doesn't require ioctl= api. I will remove it and submit new patch set. > > For future patches which requires ioctl api, would like to understand you= r suggestion so I can make required changes. For zynqmp, EEMI interface all= ows clock, reset, power etc management through firmware but apart from thos= e there are some operations which needs secure access through firmware. Exa= mples are accessing some storage registers for inter agent communication, c= onfiguring another agent(RPU) mode, setting PLL parameters, boot device con= figuration etc. Those operations are covered as ioctls as they are very pla= tform specific. Do you suggest to handle them with individual EEMI APIs ins= tead of ioctl API? I'm personally less worried about whether the calls are through an ioctl API or an EEMI one, but if it is through ioctl, I'd prefer if it wasn't wide-open pass-through. I.e. that the ioctls you actually use are documented, and only those who are whitelisted are passed through (and not in general exported to userspace). Does that make sense? -Olof