kernel_optimize_test/drivers/spmi
Abhijeet Dharmapurikar 57102ad792 spmi: pmic_arb: block access of invalid read and writes
The system crashes due to bad access when reading from an non configured
peripheral and when writing to peripheral which is not owned by current
ee. This patch verifies ownership to avoid crashing on
write.
For reads, since the forward mapping table, data_channel->ppid, is
towards the end of the block, we use the core size to figure the
max number of ppids supported. The table starts at an offset of 0x800
within the block, so size - 0x800 will give us the area used by the
table. Since each table is 4 bytes long (core_size - 0x800) / 4 will
gives us the number of data_channel supported.
This new protection is functional on hw v2.

Signed-off-by: Abhijeet Dharmapurikar <adharmap@codeaurora.org>
Signed-off-by: Kiran Gunda <kgunda@codeaurora.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-06-03 19:05:47 +09:00
..
Kconfig spmi: Select IRQ_DOMAIN instead of depend on it 2015-08-05 12:27:09 -07:00
Makefile
spmi-pmic-arb.c spmi: pmic_arb: block access of invalid read and writes 2017-06-03 19:05:47 +09:00
spmi.c spmi: do not use bus internal data 2016-04-30 14:15:56 -07:00