diff mbox series

[4/5] remoteproc: Introduce deny_sysfs_ops flag

Message ID 20180915003725.17549-5-s-anna@ti.com
State New
Headers show
Series remoteproc sysfs fixes/improvements | expand

Commit Message

Suman Anna Sept. 15, 2018, 12:37 a.m. UTC
The remoteproc framework provides sysfs interfaces for changing
the firmware name and for starting/stopping a remote processor
through the sysfs files 'state' and 'firmware'. These interfaces
are currently allowed irrespective of how the remoteprocs were
booted (like remoteproc self auto-boot, remoteproc client-driven
boot etc). These interfaces can adversely affect a remoteproc
and its clients especially when a remoteproc is being controlled
by a remoteproc client driver(s). Also, not all remoteproc
drivers may want to support the sysfs interfaces by default.

Add support to deny the sysfs state/firmware change by introducing
a state flag 'deny_sysfs_ops' that the individual remoteproc drivers
can set based on their usage needs. The default behavior is to
allow the sysfs operations as before.

Signed-off-by: Suman Anna <s-anna@ti.com>

---
 drivers/remoteproc/remoteproc_sysfs.c | 8 ++++++++
 include/linux/remoteproc.h            | 2 ++
 2 files changed, 10 insertions(+)

-- 
2.18.0

Comments

Arnaud POULIQUEN Oct. 2, 2018, 9:47 a.m. UTC | #1
Hi Suman,

On 09/15/2018 02:37 AM, Suman Anna wrote:
> The remoteproc framework provides sysfs interfaces for changing

> the firmware name and for starting/stopping a remote processor

> through the sysfs files 'state' and 'firmware'. These interfaces

> are currently allowed irrespective of how the remoteprocs were

> booted (like remoteproc self auto-boot, remoteproc client-driven

> boot etc). These interfaces can adversely affect a remoteproc

> and its clients especially when a remoteproc is being controlled

> by a remoteproc client driver(s). Also, not all remoteproc

> drivers may want to support the sysfs interfaces by default.

> 

> Add support to deny the sysfs state/firmware change by introducing

> a state flag 'deny_sysfs_ops' that the individual remoteproc drivers

> can set based on their usage needs. The default behavior is to

> allow the sysfs operations as before.

> 

> Signed-off-by: Suman Anna <s-anna@ti.com>

> ---

>  drivers/remoteproc/remoteproc_sysfs.c | 8 ++++++++

>  include/linux/remoteproc.h            | 2 ++

>  2 files changed, 10 insertions(+)

> 

> diff --git a/drivers/remoteproc/remoteproc_sysfs.c b/drivers/remoteproc/remoteproc_sysfs.c

> index ce93f4d710f3..b2d8c11b89d0 100644

> --- a/drivers/remoteproc/remoteproc_sysfs.c

> +++ b/drivers/remoteproc/remoteproc_sysfs.c

> @@ -36,6 +36,10 @@ static ssize_t firmware_store(struct device *dev,

>  	char *p;

>  	int err, len = count;

>  

> +	/* restrict sysfs operations if not allowed by remoteproc drivers */

> +	if (rproc->deny_sysfs_ops)

> +		return -EPERM;

> +

>  	err = mutex_lock_interruptible(&rproc->lock);

>  	if (err) {

>  		dev_err(dev, "can't lock rproc %s: %d\n", rproc->name, err);

> @@ -102,6 +106,10 @@ static ssize_t state_store(struct device *dev,

>  	struct rproc *rproc = to_rproc(dev);

>  	int ret = 0;

>  

> +	/* restrict sysfs operations if not allowed by remoteproc drivers */

> +	if (rproc->deny_sysfs_ops)

> +		return -EPERM;

> +

>  	if (sysfs_streq(buf, "start")) {

>  		if (rproc->state == RPROC_RUNNING)

>  			return -EBUSY;

> diff --git a/include/linux/remoteproc.h b/include/linux/remoteproc.h

> index 75f9ca05b865..d21252b4f758 100644

> --- a/include/linux/remoteproc.h

> +++ b/include/linux/remoteproc.h

> @@ -440,6 +440,7 @@ struct rproc_dump_segment {

>   * @table_sz: size of @cached_table

>   * @has_iommu: flag to indicate if remote processor is behind an MMU

>   * @auto_boot: flag to indicate if remote processor should be auto-started

> + * @deny_sysfs_ops: flag to not permit sysfs operations on state and firmware

>   * @dump_segments: list of segments in the firmware

>   */

>  struct rproc {

> @@ -472,6 +473,7 @@ struct rproc {

>  	size_t table_sz;

>  	bool has_iommu;

>  	bool auto_boot;

> +	bool deny_sysfs_ops;

>  	struct list_head dump_segments;

>  };


I'm concerned about granularity. Are we denying all write access to the
state and the firmware name?
Would it be interesting to have a bit-field to separately allow/deny
write access:
- to change the firmware name
- to start the firmware
- to stop the firmware
?

For instance, if firmware is stored in the file system, the auto_boot
mode is not functional (if remote proc in built-in). We could have to
allow user application to start the firmware, but deny to change the
firmware name or stop it.

Regards
Arnaud

>  

>
Suman Anna Oct. 2, 2018, 3:14 p.m. UTC | #2
Hi Arnaud,

Thanks for the review and testing of the series.

On 10/02/2018 04:47 AM, Arnaud Pouliquen wrote:
> Hi Suman,

> 

> On 09/15/2018 02:37 AM, Suman Anna wrote:

>> The remoteproc framework provides sysfs interfaces for changing

>> the firmware name and for starting/stopping a remote processor

>> through the sysfs files 'state' and 'firmware'. These interfaces

>> are currently allowed irrespective of how the remoteprocs were

>> booted (like remoteproc self auto-boot, remoteproc client-driven

>> boot etc). These interfaces can adversely affect a remoteproc

>> and its clients especially when a remoteproc is being controlled

>> by a remoteproc client driver(s). Also, not all remoteproc

>> drivers may want to support the sysfs interfaces by default.

>>

>> Add support to deny the sysfs state/firmware change by introducing

>> a state flag 'deny_sysfs_ops' that the individual remoteproc drivers

>> can set based on their usage needs. The default behavior is to

>> allow the sysfs operations as before.

>>

>> Signed-off-by: Suman Anna <s-anna@ti.com>

>> ---

>>  drivers/remoteproc/remoteproc_sysfs.c | 8 ++++++++

>>  include/linux/remoteproc.h            | 2 ++

>>  2 files changed, 10 insertions(+)

>>

>> diff --git a/drivers/remoteproc/remoteproc_sysfs.c b/drivers/remoteproc/remoteproc_sysfs.c

>> index ce93f4d710f3..b2d8c11b89d0 100644

>> --- a/drivers/remoteproc/remoteproc_sysfs.c

>> +++ b/drivers/remoteproc/remoteproc_sysfs.c

>> @@ -36,6 +36,10 @@ static ssize_t firmware_store(struct device *dev,

>>  	char *p;

>>  	int err, len = count;

>>  

>> +	/* restrict sysfs operations if not allowed by remoteproc drivers */

>> +	if (rproc->deny_sysfs_ops)

>> +		return -EPERM;

>> +

>>  	err = mutex_lock_interruptible(&rproc->lock);

>>  	if (err) {

>>  		dev_err(dev, "can't lock rproc %s: %d\n", rproc->name, err);

>> @@ -102,6 +106,10 @@ static ssize_t state_store(struct device *dev,

>>  	struct rproc *rproc = to_rproc(dev);

>>  	int ret = 0;

>>  

>> +	/* restrict sysfs operations if not allowed by remoteproc drivers */

>> +	if (rproc->deny_sysfs_ops)

>> +		return -EPERM;

>> +

>>  	if (sysfs_streq(buf, "start")) {

>>  		if (rproc->state == RPROC_RUNNING)

>>  			return -EBUSY;

>> diff --git a/include/linux/remoteproc.h b/include/linux/remoteproc.h

>> index 75f9ca05b865..d21252b4f758 100644

>> --- a/include/linux/remoteproc.h

>> +++ b/include/linux/remoteproc.h

>> @@ -440,6 +440,7 @@ struct rproc_dump_segment {

>>   * @table_sz: size of @cached_table

>>   * @has_iommu: flag to indicate if remote processor is behind an MMU

>>   * @auto_boot: flag to indicate if remote processor should be auto-started

>> + * @deny_sysfs_ops: flag to not permit sysfs operations on state and firmware

>>   * @dump_segments: list of segments in the firmware

>>   */

>>  struct rproc {

>> @@ -472,6 +473,7 @@ struct rproc {

>>  	size_t table_sz;

>>  	bool has_iommu;

>>  	bool auto_boot;

>> +	bool deny_sysfs_ops;

>>  	struct list_head dump_segments;

>>  };

> 

> I'm concerned about granularity. Are we denying all write access to the

> state and the firmware name?


Not by default. This is relevant only when a remoteproc platform driver
has configured these fields.

> Would it be interesting to have a bit-field to separately allow/deny

> write access:

> - to change the firmware name

> - to start the firmware

> - to stop the firmware

> ?


Do you have use-cases for the individual options?

> 

> For instance, if firmware is stored in the file system, the auto_boot

> mode is not functional (if remote proc in built-in).


This has to do with late FS init, the auto-boot would work if you have
your images in early FS like initramfs or initramdisk with built-in
driver (this is not a remoteproc specific problem and is the case with
all drivers using request_firmware()).

 We could have to
> allow user application to start the firmware, but deny to change the

> firmware name or stop it.


I am not sure if we want to differentiate as the above example almost
kinda depends on how you put together the system. It can be easily
expanded for what you are asking if there is a real need/use-case.

regards
Suman
diff mbox series

Patch

diff --git a/drivers/remoteproc/remoteproc_sysfs.c b/drivers/remoteproc/remoteproc_sysfs.c
index ce93f4d710f3..b2d8c11b89d0 100644
--- a/drivers/remoteproc/remoteproc_sysfs.c
+++ b/drivers/remoteproc/remoteproc_sysfs.c
@@ -36,6 +36,10 @@  static ssize_t firmware_store(struct device *dev,
 	char *p;
 	int err, len = count;
 
+	/* restrict sysfs operations if not allowed by remoteproc drivers */
+	if (rproc->deny_sysfs_ops)
+		return -EPERM;
+
 	err = mutex_lock_interruptible(&rproc->lock);
 	if (err) {
 		dev_err(dev, "can't lock rproc %s: %d\n", rproc->name, err);
@@ -102,6 +106,10 @@  static ssize_t state_store(struct device *dev,
 	struct rproc *rproc = to_rproc(dev);
 	int ret = 0;
 
+	/* restrict sysfs operations if not allowed by remoteproc drivers */
+	if (rproc->deny_sysfs_ops)
+		return -EPERM;
+
 	if (sysfs_streq(buf, "start")) {
 		if (rproc->state == RPROC_RUNNING)
 			return -EBUSY;
diff --git a/include/linux/remoteproc.h b/include/linux/remoteproc.h
index 75f9ca05b865..d21252b4f758 100644
--- a/include/linux/remoteproc.h
+++ b/include/linux/remoteproc.h
@@ -440,6 +440,7 @@  struct rproc_dump_segment {
  * @table_sz: size of @cached_table
  * @has_iommu: flag to indicate if remote processor is behind an MMU
  * @auto_boot: flag to indicate if remote processor should be auto-started
+ * @deny_sysfs_ops: flag to not permit sysfs operations on state and firmware
  * @dump_segments: list of segments in the firmware
  */
 struct rproc {
@@ -472,6 +473,7 @@  struct rproc {
 	size_t table_sz;
 	bool has_iommu;
 	bool auto_boot;
+	bool deny_sysfs_ops;
 	struct list_head dump_segments;
 };