lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <44821b345e5c46c1532511c1d1a66fe4@codeaurora.org>
Date:   Thu, 04 Feb 2021 12:23:57 -0800
From:   Bhaumik Bhatt <bbhatt@...eaurora.org>
To:     Manivannan Sadhasivam <manivannan.sadhasivam@...aro.org>
Cc:     linux-arm-msm@...r.kernel.org, hemantk@...eaurora.org,
        jhugo@...eaurora.org, linux-kernel@...r.kernel.org,
        loic.poulain@...aro.org
Subject: Re: [PATCH v5 6/9] bus: mhi: core: Check channel execution
 environment before issuing reset

Hi Mani,

On 2021-01-21 07:12 AM, Manivannan Sadhasivam wrote:
> On Fri, Jan 08, 2021 at 12:54:54PM -0800, Bhaumik Bhatt wrote:
>> A client can attempt to unprepare certain channels for transfer even
>> after the execution environment they are supposed to run in has 
>> changed.
> 
> Just out of curiosity, under what circumstances it can happen? We don't
> have any in kernel user for the mhi_unprepare_from_transfer() API :/
> 
We do and it's the qrtr-mhi driver where we can potentially see this 
happen.
Mainly, since they want to undo whatever they have done in probe(), this 
can
come from the remove() after MHI power down is initiated.

I have updated this patch in upcoming v6 series with a debug message as 
we only
want to proceed with clean-up directly.

>> In the event that happens, the device need not be notified of the 
>> reset
>> and the host can proceed with clean up for the channel context and
>> memory allocated for it on the host as the device will no longer be 
>> able
>> to respond to such a request.
>> 
>> Signed-off-by: Bhaumik Bhatt <bbhatt@...eaurora.org>
>> Reviewed-by: Hemant Kumar <hemantk@...eaurora.org>
>> ---
>>  drivers/bus/mhi/core/main.c | 13 +++++++++++++
>>  1 file changed, 13 insertions(+)
>> 
>> diff --git a/drivers/bus/mhi/core/main.c b/drivers/bus/mhi/core/main.c
>> index a84e6aa..ec720fe 100644
>> --- a/drivers/bus/mhi/core/main.c
>> +++ b/drivers/bus/mhi/core/main.c
>> @@ -1351,11 +1351,24 @@ static void __mhi_unprepare_channel(struct 
>> mhi_controller *mhi_cntrl,
>>  	/* no more processing events for this channel */
>>  	mutex_lock(&mhi_chan->mutex);
>> 
>> +	if (!(BIT(mhi_cntrl->ee) & mhi_chan->ee_mask)) {
>> +		dev_err(dev,
>> +			"Current EE: %s Required EE Mask: 0x%x for chan: %s\n",
>> +			TO_MHI_EXEC_STR(mhi_cntrl->ee), mhi_chan->ee_mask,
>> +			mhi_chan->name);
> 
> Again, use channel's struct dev here.
> 
Done.
> Thanks,
> Mani

Thanks,
Bhaumik
---
The Qualcomm Innovation Center, Inc. is a member of the Code Aurora 
Forum,
a Linux Foundation Collaborative Project

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ