[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190131153419.GA18667@kroah.com>
Date: Thu, 31 Jan 2019 16:34:19 +0100
From: Greg KH <gregkh@...uxfoundation.org>
To: Srinivas Kandagatla <srinivas.kandagatla@...aro.org>
Cc: robh+dt@...nel.org, arnd@...db.de, mark.rutland@....com,
devicetree@...r.kernel.org, linux-kernel@...r.kernel.org,
bjorn.andersson@...aro.org, bkumar@....qualcomm.com,
linux-arm-msm@...r.kernel.org, thierry.escande@...aro.org
Subject: Re: [PATCH v4 3/5] misc: fastrpc: Add support for context Invoke
method
On Thu, Jan 24, 2019 at 03:24:10PM +0000, Srinivas Kandagatla wrote:
> This patch adds support to compute context invoke method
> on the remote processor (DSP).
> This involves setting up the functions input and output arguments,
> input and output handles and mapping the dmabuf fd for the
> argument/handle buffers.
>
This says _what_ this code does, but not why. What about all of that
explaination you had in the 0/5 patch, shouldn't that be here, or on
patch 2/5?
Some nits below:
> +static int fastrpc_invoke(struct fastrpc_user *fl, char __user *argp)
> +{
> + struct fastrpc_invoke_args *args = NULL;
> + struct fastrpc_invoke inv;
> + u32 nscalars;
> + int err;
> +
> + if (copy_from_user(&inv, argp, sizeof(inv)))
> + return -EFAULT;
> +
> + nscalars = REMOTE_SCALARS_LENGTH(inv.sc);
> + if (nscalars) {
> + args = kcalloc(nscalars, sizeof(*args), GFP_KERNEL);
Yeah, let's not bounds check the input variables and suck up all of the
kernel memory!
Remember:
ALL INPUT IS EVIL
> + if (!args)
> + return -ENOMEM;
> +
> + if (copy_from_user(args, (void __user *)(uintptr_t)inv.args,
> + nscalars * sizeof(*args))) {
That could be very big, again, check the input.
> + kfree(args);
> + return -EFAULT;
> + }
> + }
> +
> + err = fastrpc_internal_invoke(fl, false, inv.handle, inv.sc, args);
What's the odds you check the input values here... :(
> +static long fastrpc_device_ioctl(struct file *file, unsigned int cmd,
> + unsigned long arg)
> +{
> + struct fastrpc_user *fl = (struct fastrpc_user *)file->private_data;
> + char __user *argp = (char __user *)arg;
> + int err;
> +
> + switch (cmd) {
> + case FASTRPC_IOCTL_INVOKE:
> + err = fastrpc_invoke(fl, argp);
> + break;
> + default:
> + err = -ENOTTY;
> + dev_err(fl->sctx->dev, "bad ioctl: %d\n", cmd);
Don't spam the syslog if someone sends you an invalid ioctl. That's a
sure way to DoS the system.
> + break;
> + }
> +
> + if (err)
> + dev_dbg(fl->sctx->dev, "Error: IOCTL Failed with %d\n", err);
> +
> + return err;
> +}
> +
> static const struct file_operations fastrpc_fops = {
> .open = fastrpc_device_open,
> .release = fastrpc_device_release,
> + .unlocked_ioctl = fastrpc_device_ioctl,
> + .compat_ioctl = fastrpc_device_ioctl,
> };
>
> static int fastrpc_cb_probe(struct platform_device *pdev)
> @@ -260,9 +932,25 @@ static int fastrpc_rpmsg_probe(struct rpmsg_device *rpdev)
> return of_platform_populate(rdev->of_node, NULL, NULL, rdev);
> }
>
> +static void fastrpc_notify_users(struct fastrpc_user *user)
> +{
> + struct fastrpc_invoke_ctx *ctx, *n;
> +
> + spin_lock(&user->lock);
> + list_for_each_entry_safe(ctx, n, &user->pending, node)
> + complete(&ctx->work);
Why safe? You aren't deleting the list here.
> + spin_unlock(&user->lock);
> +}
> +
> static void fastrpc_rpmsg_remove(struct rpmsg_device *rpdev)
> {
> struct fastrpc_channel_ctx *cctx = dev_get_drvdata(&rpdev->dev);
> + struct fastrpc_user *user, *n;
> +
> + spin_lock(&cctx->lock);
> + list_for_each_entry_safe(user, n, &cctx->users, user)
> + fastrpc_notify_users(user);
Same here.
> + spin_unlock(&cctx->lock);
>
> misc_deregister(&cctx->miscdev);
> of_platform_depopulate(&rpdev->dev);
> @@ -272,6 +960,31 @@ static void fastrpc_rpmsg_remove(struct rpmsg_device *rpdev)
> static int fastrpc_rpmsg_callback(struct rpmsg_device *rpdev, void *data,
> int len, void *priv, u32 addr)
> {
> + struct fastrpc_channel_ctx *cctx = dev_get_drvdata(&rpdev->dev);
> + struct fastrpc_invoke_rsp *rsp = data;
> + struct fastrpc_invoke_ctx *ctx;
> + unsigned long flags;
> + unsigned long ctxid;
> +
> + if (len < sizeof(*rsp)) {
> + dev_err(&rpdev->dev, "invalid response or context\n");
> + return -EINVAL;
> + }
Again, don't allow userspace to spam the syslog.
> +
> + ctxid = ((rsp->ctx & FASTRPC_CTXID_MASK) >> 4);
> +
> + spin_lock_irqsave(&cctx->lock, flags);
> + ctx = idr_find(&cctx->ctx_idr, ctxid);
> + spin_unlock_irqrestore(&cctx->lock, flags);
> +
> + if (!ctx) {
> + dev_err(&rpdev->dev, "No context ID matches response\n");
> + return -ENOENT;
> + }
> +
> + ctx->retval = rsp->retval;
> + complete(&ctx->work);
> +
> return 0;
> }
>
> diff --git a/include/uapi/misc/fastrpc.h b/include/uapi/misc/fastrpc.h
> new file mode 100644
> index 000000000000..a69ef33dc37e
> --- /dev/null
> +++ b/include/uapi/misc/fastrpc.h
> @@ -0,0 +1,23 @@
> +/* SPDX-License-Identifier: GPL-2.0 */
> +
> +#ifndef __QCOM_FASTRPC_H__
> +#define __QCOM_FASTRPC_H__
> +
> +#include <linux/types.h>
> +
> +#define FASTRPC_IOCTL_INVOKE _IOWR('R', 3, struct fastrpc_invoke)
> +
> +struct fastrpc_invoke_args {
> + __u64 ptr;
> + __u64 length;
> + __s32 fd;
> + __u32 reserved;
Are you checking that reserved is all 0 now?
> +};
> +
> +struct fastrpc_invoke {
> + __u32 handle;
> + __u32 sc;
> + __u64 args;
> +};
Do you need packed here? What about endian issues?
thanks,
greg k-h
Powered by blists - more mailing lists