[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4c27849d-cd34-77ed-7d45-6f366f9fa86a@quicinc.com>
Date: Thu, 8 Jun 2023 16:14:20 +0530
From: Ekansh Gupta <quic_ekangupt@...cinc.com>
To: Krzysztof Kozlowski <krzysztof.kozlowski@...aro.org>,
<srinivas.kandagatla@...aro.org>, <linux-arm-msm@...r.kernel.org>
CC: <ekangupt@....qualcomm.com>, <gregkh@...uxfoundation.org>,
<linux-kernel@...r.kernel.org>,
<fastrpc.upstream@....qualcomm.com>, <agross@...nel.org>,
<andersson@...nel.org>, <konrad.dybcio@...aro.org>,
<robh+dt@...nel.org>, <krzysztof.kozlowski+dt@...aro.org>,
<conor+dt@...nel.org>, <devicetree@...r.kernel.org>
Subject: Re: [RESEND PATCH v1 2/2] misc: fastrpc: detect privileged processes
based on group ID
On 6/8/2023 12:17 AM, Krzysztof Kozlowski wrote:
> On 07/06/2023 18:30, Ekansh Gupta wrote:
>> Get the information on privileged group IDs during rpmsg probing based
>> on DT property. Check if the process requesting an offload to remote
>> subsystem is privileged by comparing it's group ID with privileged
>> group ID. Initialization process attributes are updated for a
>> privileged process which is sent to remote process for resource
>> management.
>>
>
>
>
>> +
>> static const struct file_operations fastrpc_fops = {
>> .open = fastrpc_device_open,
>> .release = fastrpc_device_release,
>> @@ -2277,6 +2396,10 @@ static int fastrpc_rpmsg_probe(struct rpmsg_device *rpdev)
>> if (!data)
>> return -ENOMEM;
>>
>> + err = fastrpc_init_privileged_gids(rdev, "qcom,fastrpc-gids", &data->gidlist);
>> + if (err)
>> + dev_err(rdev, "Privileged gids init failed.\n");
>> +
>
> What about error paths? No need for cleanup?
>
All the necessary clean-up is added as part of
fastrpc_init_privileged_gids error path. There is no requirement to have
any additional handling in error path other that error log. Also there
is no intention to fail the probe in case gid information is not
properly read.
Thanks,
Ekansh
> Best regards,
> Krzysztof
>
Powered by blists - more mailing lists