[PATCH 3/3] pinctrl: qcom: Don't allow protected pins to be requested
Stephen Boyd
sboyd at codeaurora.org
Thu Jan 25 13:51:35 PST 2018
On 01/22, Timur Tabi wrote:
> On 1/9/18 7:58 PM, Stephen Boyd wrote:
> >+ ret = device_property_read_u16_array(pctrl->dev, "gpios", tmp,
> >+ len);
> >+ if (ret < 0) {
> >+ dev_err(pctrl->dev, "could not read list of GPIOs\n");
> >+ kfree(tmp);
> >+ return ret;
> >+ }
>
> Just FYI, I'm still going to have to parse "gpios" in my
> pinctrl-qdf2xxx.c driver, even though you're also parsing it here.
> That's because I need to make sure that the msm_pingroup array only
> contains "approve" addresses in its ctl_reg fields.
>
> + for (i = 0; i < avail_gpios; i++) {
> + unsigned int gpio = gpios[i];
> +
> + groups[gpio].npins = 1;
> + snprintf(names[i], NAME_SIZE, "gpio%u", gpio);
> + pins[gpio].name = names[i];
> + groups[gpio].name = names[i];
> +
> + groups[gpio].ctl_reg = 0x10000 * gpio;
> ^^^^
>
> I do this because I need to make sure that "unapproved" physical
> addresses are never store anywhere in groups[]. That way, it's
> impossible for the driver to cause an XPU violation -- the worst
> that can happen is a null pointer dereference.
>
Sorry I don't get it. Is that some sort of hardening requirement?
If the framework doesn't cause those pins to be touched I fail to
see how it could hurt to have the other addresses listed. I'm
sure with some effort protected addresses could be crafted in
other ways to cause an XPU violation to the same place.
--
Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum,
a Linux Foundation Collaborative Project
More information about the linux-arm-kernel
mailing list