[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2025021227-married-stunned-759c@gregkh>
Date: Wed, 12 Feb 2025 08:44:44 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: "Pathak, Asutosh" <asutosh.pathak@...el.com>
Cc: Dmitry Baryshkov <dmitry.baryshkov@...aro.org>,
Heikki Krogerus <heikki.krogerus@...ux.intel.com>,
Ćukasz Bartosik <ukaszb@...omium.org>,
Abhishek Pandit-Subedi <abhishekpandit@...omium.org>,
Benson Leung <bleung@...omium.org>,
Pavan Holla <pholla@...omium.org>,
"Christian A. Ehrhardt" <lk@...e.de>,
Jameson Thies <jthies@...gle.com>,
"Katiyar, Pooja" <pooja.katiyar@...el.com>,
"Jayaraman, Venkat" <venkat.jayaraman@...el.com>,
"linux-usb@...r.kernel.org" <linux-usb@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH v1 1/2] usb: typec: ucsi: Command mailbox interface for
the userspace
On Tue, Feb 11, 2025 at 09:21:28PM +0000, Pathak, Asutosh wrote:
> On Tue, Feb 11, 2025 at 01:21:28PM -0700, Pathak Asutosh wrote:
> > On Fri, Feb 07, 2025 at 03:04:34PM +0200, Heikki Krogerus wrote:
> > > On Thu, Feb 06, 2025 at 03:51:48PM +0100, Greg Kroah-Hartman wrote:
> > > > On Thu, Feb 06, 2025 at 04:19:31PM +0200, Heikki Krogerus wrote:
> > > > > Some of the UCSI commands can be used to configure the
> > > > > entire Platform Policy Manager (PPM) instead of just
> > > > > individual connectors. To allow the user space communicate
> > > > > those commands with the PPM, adding a mailbox interface. The
> > > > > interface is a single attribute file that represents the
> > > > > main "OPM to PPM" UCSI data structure.
> > > > >
> > > > > The mailbox allows any UCSI command to be sent to the PPM so
> > > > > it should be also useful for validation, testing and
> > > > > debugging purposes.
> > > >
> > > > As it's for this type of thing, why not put it in debugfs instead?
>
> The intend of this sysfs is not limited to validation, testing and
> debugging purposes but rather providing interface for major user space
> application developments.
But that's not what you are saying above. sysfs is for attributes of a
device, NOT for full device control. Use a proper api for that that can
be correctly mediated if needed.
> At present we are working on an application/ user space service which
> will be calling UCSI read/write power level commands. But in future
> there would be more such applications which may require additional
> UCSI commands to use. We wanted to have a common and
> generic solution - and hence thought of going with sysfs interface.
We can't take new user/kernel apis without a real user, so please hold
off on this series until you have a real user. Otherwise it is
guaranteed that you will have to change that api based on actually using
it.
> Issue with debugfs is, it is default disabled in release kernels. User has
> to rebuild the kernel if the application is based on the debugfs interface.
> This will become a bottleneck for wider use of such appliances.
It is up to the distro to enable/disable debugfs, that's not our issue.
debugfs is NOT for normal system operation, so if you want to make this
a proper api for normal users, than no, don't use debugfs, make it a
real api. Which is probably NOT going to be sysfs.
> > > > > +static ssize_t ucsi_write(struct file *filp, struct kobject *kobj,
> > > > > + const struct bin_attribute *attr,
> > > > > + char *buf, loff_t off, size_t count)
> > > > > +{
> > > > > + struct ucsi_sysfs *sysfs = attr->private;
> > > > > + struct ucsi *ucsi = sysfs->ucsi;
> > > > > + int ret;
> > > > > +
> > > > > + u64 *control = (u64 *)&sysfs->mailbox[UCSI_CONTROL];
> > > > > + u32 *cci = (u32 *)&sysfs->mailbox[UCSI_CCI];
> > > > > + void *data = &sysfs->mailbox[UCSI_MESSAGE_IN];
> > > > > +
> > > > > + /* TODO: MESSAGE_OUT. */
> > > > > + if (off != UCSI_CONTROL || count != sizeof(*control))
> > > > > + return -EFAULT;
> > > > > +
> > > > > + mutex_lock(&sysfs->lock);
> > > > > +
> > > > > + memset(data, 0, UCSI_MAX_DATA_LENGTH(ucsi));
> > > > > +
> > > > > + /* PPM_RESET has to be handled separately. */
> > > > > + *control = get_unaligned_le64(buf);
> > > > > + if (UCSI_COMMAND(*control) == UCSI_PPM_RESET) {
> > > > > + ret = ucsi_reset_ppm(ucsi, cci);
> > > > > + goto out_unlock_sysfs;
> > > > > + }
> > > > > +
> > > > > + mutex_lock(&ucsi->ppm_lock);
> > > > > +
> > > > > + ret = ucsi->ops->sync_control(ucsi, *control, cci, NULL, 0);
> > > > > + if (ret)
> > > > > + goto out_unlock_ppm;
> > > > > +
> > > > > + if (UCSI_CCI_LENGTH(*cci) && ucsi->ops->read_message_in(ucsi, data,
> > UCSI_CCI_LENGTH(*cci)))
> > > > > + dev_err(ucsi->dev, "failed to read MESSAGE_IN\n");
> > > > > +
> > > > > + ret = ucsi->ops->sync_control(ucsi, UCSI_ACK_CC_CI |
> > UCSI_ACK_COMMAND_COMPLETE,
> > > > > + NULL, NULL, 0);
> > > > > +out_unlock_ppm:
> > > > > + mutex_unlock(&ucsi->ppm_lock);
> > > > > +out_unlock_sysfs:
> > > > > + mutex_unlock(&sysfs->lock);
> > > > > +
> > > > > + return ret ?: count;
> > > > > +}
> > > >
> > > > This worries me, any userspace tool can now do this? What other "bad"
> > > > things can it to the connection?
> > >
> > > Although, there is actually only a limited number of things that you
> > > can do to the connection using UCSI, that is definitely a concern.
> > >
> > > The PPM (which is the EC firmware in most cases) is expected to prevent
> > > any harmful or "unauthorized" UCSI commands from being executed, but
> > > I'm not sure there is any guarantees for that at the moment.
> > >
> Critical power setting related features and options are tightly controlled
> by PPM/LPM. In such cases, those UCSI command request by user space
> will be blocked by PPM/LPM and will eventually end of into DoS.
What is "PPM/LPM"? I don't see that here.
> Moreover, to further mitigate the risk of any malicious attack our
> understanding is this sysfs interface will be accessible only with root or
> super user privilege.
Is it? You really want normal users being forced to be root in order to
talk to this device?
Make this a real api please, don't try to just do "provide raw access to
the hardware and we will hope any userspace program can get it right",
that way lies madness :)
> Can we still think of going ahead with sysfs interface and double make
> sure to make this accessible only with root/su privilege to minimize
> any potential risk of bad uses?
Nope! Get it right please, once you add it, you can't remove it.
thanks,
greg k-h
Powered by blists - more mailing lists