lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Wed, 26 Feb 2014 10:05:00 +0000
From:	Marc Zyngier <marc.zyngier@....com>
To:	Feng Kan <fkan@....com>
CC:	"linux-arm-kernel@...ts.infradead.org" 
	<linux-arm-kernel@...ts.infradead.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"tglx@...utronix.de" <tglx@...utronix.de>,
	"patches@....com" <patches@....com>, Vinayak Kale <vkale@....com>
Subject: Re: [PATCH] irqchip:gic: change access of gicc_ctrl register to read
 modify write.

[Fixing tglx's email address so he too can enjoy the fun...]

On 25/02/14 20:19, Feng Kan wrote:
> On Wed, Feb 19, 2014 at 2:33 AM, Marc Zyngier <marc.zyngier@....com> wrote:
>> Hi Feng,
>>
>> On 18/02/14 22:12, Feng Kan wrote:
>>> This change is made to preserve the GIC v2 releated bits in the
>>> GIC_CPU_CTRL register (also known as the GICC_CTLR register in spec).
>>> The original code only set the enable/disable group bit in this register.
>>> This code will preserve all other bits configured by the bootload except
>>
>> This "all other bits" in itself is a major problem, see below.
>>
>>> the enable/disable bit. The main reason for this change is to allow the
>>> bypass bits specified in the v2 spec to remain untouched by the current
>>> GIC code. In the X-Gene platform, the bypass functionality is not used
>>> and bypass must be disabled at all time.
>>>
>>> Signed-off-by: Vinayak Kale <vkale@....com>
>>> Acked-by: Anup Patel <apatel@....com>
>>> Signed-off-by: Feng Kan <fkan@....com>
>>> ---
>>>  drivers/irqchip/irq-gic.c | 18 +++++++++++++++---
>>>  1 file changed, 15 insertions(+), 3 deletions(-)
>>>
>>> diff --git a/drivers/irqchip/irq-gic.c b/drivers/irqchip/irq-gic.c
>>> index 341c601..9adc3e1 100644
>>> --- a/drivers/irqchip/irq-gic.c
>>> +++ b/drivers/irqchip/irq-gic.c
>>> @@ -418,6 +418,7 @@ static void gic_cpu_init(struct gic_chip_data *gic)
>>>       void __iomem *dist_base = gic_data_dist_base(gic);
>>>       void __iomem *base = gic_data_cpu_base(gic);
>>>       unsigned int cpu_mask, cpu = smp_processor_id();
>>> +     unsigned int ctrl_mask;
>>>       int i;
>>>
>>>       /*
>>> @@ -449,13 +450,20 @@ static void gic_cpu_init(struct gic_chip_data *gic)
>>>               writel_relaxed(0xa0a0a0a0, dist_base + GIC_DIST_PRI + i * 4 / 4);
>>>
>>>       writel_relaxed(0xf0, base + GIC_CPU_PRIMASK);
>>> -     writel_relaxed(1, base + GIC_CPU_CTRL);
>>> +
>>> +     ctrl_mask = readl(base + GIC_CPU_CTRL);
>>> +     ctrl_mask |= 0x1;
>>> +     writel_relaxed(ctrl_mask, base + GIC_CPU_CTRL);
>>
>> So what if the firmware used a different EOImode? We would end up in a
>> situation where we don't deactivate the interrupts anymore. Not good.
> Is there an case where the EOI mode usage would change on the fly?
> Bootloader's job would be to setup the bits so the kernel would work properly.

If you trust bootloaders to get anything right, you shouldn't ever touch
the Linux IRQ code.

Since the ancient times, bootloaders have been known to be part of a
conspiracy aiming to destroy Mankind and rule the Earth. Bootloaders are
the Orcs of software. It's been scientifically proven that they are
responsible for climate change. Seen the floods in England? Bootloaders.
Exploding volcanoes? Bootloaders. The flat tire on your bike?
Bootloaders. Enough said.

> Do you have a case in mind that would violate this setup?

What if your bootloader is actually a small RT kernel that uses
interrupt nesting (hence EOImode==1 to be able to split deactivation
from priority drop)? ECOS/RedBoot anyone?

Do you think for a second that this thing will kindly reset EIOmode to
zero just because it loads a Linux kernel? See the above.

Remember this code is used on a lot of fairly insane platforms. You
*must* be extremely conservative in any change you make.

Thanks,

	M.
-- 
Jazz is not dead. It just smells funny...
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ