lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 17 Apr 2017 07:05:09 -0700
From:   Guenter Roeck <linux@...ck-us.net>
To:     "Zheng, Lv" <lv.zheng@...el.com>,
        "Moore, Robert" <robert.moore@...el.com>
Cc:     "linux-acpi@...r.kernel.org" <linux-acpi@...r.kernel.org>,
        "devel@...ica.org" <devel@...ica.org>,
        "Wysocki, Rafael J" <rafael.j.wysocki@...el.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] ACPICA: Export mutex functions

On 04/17/2017 02:48 AM, Zheng, Lv wrote:
> Hi,
>
>> From: Devel [mailto:devel-bounces@...ica.org] On Behalf Of Zheng, Lv
>> Sent: Monday, April 17, 2017 5:40 PM
>> To: Guenter Roeck <linux@...ck-us.net>; Moore, Robert <robert.moore@...el.com>
>> Cc: linux-acpi@...r.kernel.org; devel@...ica.org; Wysocki, Rafael J <rafael.j.wysocki@...el.com>;
>> linux-kernel@...r.kernel.org
>> Subject: Re: [Devel] [PATCH] ACPICA: Export mutex functions
>>
>> Hi,
>>
>>> From: Guenter Roeck [mailto:linux@...ck-us.net]
>>> Subject: Re: [PATCH] ACPICA: Export mutex functions
>>>
>>> On Wed, Apr 12, 2017 at 03:29:55PM +0000, Moore, Robert wrote:
>>>> The ACPICA mutex functions are based on the host OS functions, so they don't really buy you
>> anything.
>>> You should just use the native Linux functions.
>>>>
>>>
>>> You mean they don't really acquire the requested ACPI mutex,
>>> and the underlying DSDT which declares and uses the mutex
>>> just ignores if the mutex was acquired by acpi_acquire_mutex() ?
>>>
>>> To clarify: You are saying that code such as
>>>
>>> 	acpi_status status;
>>>
>>> 	status = acpi_acquire_mutex(NULL, "\\_SB.PCI0.SBRG.SIO1.MUT0", 0x10);
>>> 	if (ACPI_FAILURE(status)) {
>>> 		pr_err("Failed to acquire ACPI mutex\n");
>>> 		return -EBUSY;
>>> 	}
>>
>> Why do you need to access \_SB.PCI0.SBRG.SIO1.MUT0?
>> OSPM should only invoke entry methods predefined by ACPI spec or whatever specs.
>> There shouldn't be any needs that a driver acquires an arbitrary AML mutex.
>> You do not seem to have justified the usage model, IMO.
>>
>> Thanks
>> Lv
>>
>>> 	...
>>>
>>> when used in conjunction with
>>>
>>> 	...
>>> 	Mutex (MUT0, 0x00)
>>> 	Method (ENFG, 1, NotSerialized)
>>> 	{
>>> 		Acquire (MUT0, 0x0FFF)
>>> 		...
>>> 	}
>>>
>>> doesn't really provide exclusive access to the resource(s) protected
>>> by MUT0, even if acpi_acquire_mutex() returns ACPI_SUCCESS ?
>
> IMO, the use case you are talking about is commonly seen in an operation region access code.
> Most likely, we'll prepare a driver own lock, and use it for both driver initiated accesses and AML initiated accesses.
>
> Finally, how can the driver writer know which mutex he should acquire?
> AML mutexes should be invisible to the OS (except the global lock).
>
In my experimental code I am using DMI to determine the platform and provide
the mutex name to the kernel driver needing it.

> So I'm really confused by your argument.
> Please explain in details - what the resource is.
>

Super-IO ports 0x2e, 0x2f. If you look through the Linux kernel, and search for
superio_enter(), you'll see where that address space is used (for the most part
in watchdog, hwmon, and gpio drivers).

You are correct, the resource is in operation region access code.

Are you saying that the mutex (and other mutexes) may not be accessed from the OS,
ie that the respective ACPI mutex functions are not really supposed to be available
for the OS ?

Thanks,
Guenter

> Thanks
> Lv
>
>
>>>
>>> Outch. Really ?
>>>
>>> Thanks,
>>> Guenter
>>>
>>>>
>>>>> -----Original Message-----
>>>>> From: Guenter Roeck [mailto:linux@...ck-us.net]
>>>>> Sent: Wednesday, April 12, 2017 8:13 AM
>>>>> To: Moore, Robert <robert.moore@...el.com>; Zheng, Lv
>>>>> <lv.zheng@...el.com>; Wysocki, Rafael J <rafael.j.wysocki@...el.com>;
>>>>> Len Brown <lenb@...nel.org>
>>>>> Cc: linux-acpi@...r.kernel.org; devel@...ica.org; linux-
>>>>> kernel@...r.kernel.org; Guenter Roeck <linux@...ck-us.net>
>>>>> Subject: [PATCH] ACPICA: Export mutex functions
>>>>>
>>>>> Mutex functions may be needed by drivers. Examples are accesses to
>>>>> Super-IO SIO registers (0x2e/0x2f or 0x4e/0x4f) or Super-IO
>>>>> environmental monitor registers, both which may also be accessed through
>>>>> DSDT.
>>>>>
>>>>> Signed-off-by: Guenter Roeck <linux@...ck-us.net>
>>>>> ---
>>>>>  drivers/acpi/acpica/utxfmutex.c | 2 ++
>>>>>  1 file changed, 2 insertions(+)
>>>>>
>>>>> diff --git a/drivers/acpi/acpica/utxfmutex.c
>>>>> b/drivers/acpi/acpica/utxfmutex.c index c016211c35ae..5d20581f4b2f
>>>>> 100644
>>>>> --- a/drivers/acpi/acpica/utxfmutex.c
>>>>> +++ b/drivers/acpi/acpica/utxfmutex.c
>>>>> @@ -150,6 +150,7 @@ acpi_acquire_mutex(acpi_handle handle, acpi_string
>>>>> pathname, u16 timeout)
>>>>>  	status = acpi_os_acquire_mutex(mutex_obj->mutex.os_mutex, timeout);
>>>>>  	return (status);
>>>>>  }
>>>>> +ACPI_EXPORT_SYMBOL(acpi_acquire_mutex)
>>>>>
>>>>>
>>>>> /***********************************************************************
>>>>> ********
>>>>>   *
>>>>> @@ -185,3 +186,4 @@ acpi_status acpi_release_mutex(acpi_handle handle,
>>>>> acpi_string pathname)
>>>>>  	acpi_os_release_mutex(mutex_obj->mutex.os_mutex);
>>>>>  	return (AE_OK);
>>>>>  }
>>>>> +ACPI_EXPORT_SYMBOL(acpi_release_mutex)
>>>>> --
>>>>> 2.7.4
>>>>
>> _______________________________________________
>> Devel mailing list
>> Devel@...ica.org
>> https://lists.acpica.org/mailman/listinfo/devel
>

Powered by blists - more mailing lists