lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <5d6d545d-b6bc-4b37-b324-a664e4685100@broadcom.com>
Date: Mon, 21 Oct 2024 10:11:44 -0700
From: Florian Fainelli <florian.fainelli@...adcom.com>
To: Cristian Marussi <cristian.marussi@....com>,
 linux-kernel@...r.kernel.org, linux-arm-kernel@...ts.infradead.org,
 arm-scmi@...r.kernel.org
Cc: sudeep.holla@....com, james.quinlan@...adcom.com,
 vincent.guittot@...aro.org, etienne.carriere@...com, peng.fan@....nxp.com,
 michal.simek@....com, quic_sibis@...cinc.com, quic_nkela@...cinc.com,
 dan.carpenter@...aro.org
Subject: Re: [PATCH v2 1/5] firmware: arm_scmi: Account for SHMEM memory
 overhead

On 10/21/24 10:07, Cristian Marussi wrote:
> Transports using shared memory have to consider the overhead due to the
> layout area when determining the area effectively available for messages.
> 
> Till now, such definitions were ambiguos across the SCMI stack and the
> overhead layout area was not considered at all.
> 
> Add proper checks in the shmem layer to validate the provided max_msg_size
> against the effectively available memory area, less the layout.
> 
> Signed-off-by: Cristian Marussi <cristian.marussi@....com>
> ---
> Note that as a consequence of this fix the default max_msg_size is reduced
> to 104 bytes for shmem-based transports, in order to fit into the most
> common implementations where the whole shmem area is sized at 128,
> including the 24 bytes of standard layout area.
> 
> This should have NO bad side effects, since the current maximum payload
> size of any messages across any protocol (including all the known vendor
> ones) is 76 bytes.

This looks good to me, just a small nit/suggestion:

[snip]

>   	size = resource_size(res);
> +	if (cinfo->max_msg_size + SCMI_SHMEM_LAYOUT_OVERHEAD > size) {
> +		dev_err(dev, "misconfigured SCMI shared memory\n");
> +		return IOMEM_ERR_PTR(-ENOSPC);
> +	}
> +
>   	addr = devm_ioremap(dev, res->start, size);
>   	if (!addr) {
>   		dev_err(dev, "failed to ioremap SCMI %s shared memory\n", desc);
> diff --git a/drivers/firmware/arm_scmi/transports/mailbox.c b/drivers/firmware/arm_scmi/transports/mailbox.c
> index e7efa3376aae..4e0396250ad0 100644
> --- a/drivers/firmware/arm_scmi/transports/mailbox.c
> +++ b/drivers/firmware/arm_scmi/transports/mailbox.c
> @@ -16,6 +16,8 @@
>   
>   #include "../common.h"
>   
> +#define SCMI_MAILBOX_MAX_MSG_SIZE	104

This IMHO, could be named SCMI_SHMEM_MAX_PAYLOAD_SIZE and used across 
all 3 transports that are loosely SHMEM-based?
-- 
Florian


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ