From: Maximilian Luz <luzmaximilian@gmail.com>
To: Johan Hovold <johan@kernel.org>
Cc: Bjorn Andersson <andersson@kernel.org>,
Konrad Dybcio <konrad.dybcio@linaro.org>,
Bartosz Golaszewski <brgl@bgdev.pl>,
Johan Hovold <johan+linaro@kernel.org>,
Krzysztof Kozlowski <krzysztof.kozlowski@linaro.org>,
Guru Das Srinagesh <quic_gurus@quicinc.com>,
Ard Biesheuvel <ardb@kernel.org>,
linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH] firmware: qcom: uefisecapp: Fix memory related IO errors and crashes
Date: Sat, 6 Apr 2024 13:37:41 +0200 [thread overview]
Message-ID: <93d54733-bd83-478c-9e4c-727c3b09396c@gmail.com> (raw)
In-Reply-To: <Zgv6aJ4byNiujmo-@hovoldconsulting.com>
On 4/2/24 2:30 PM, Johan Hovold wrote:
> On Fri, Mar 29, 2024 at 09:18:25PM +0100, Maximilian Luz wrote:
>> It turns out that while the QSEECOM APP_SEND command has specific fields
>> for request and response buffers, uefisecapp expects them both to be in
>> a single memory region. Failure to adhere to this has (so far) resulted
>> in either no response being written to the response buffer (causing an
>> EIO to be emitted down the line), the SCM call to fail with EINVAL
>> (i.e., directly from TZ/firmware), or the device to be hard-reset.
>>
>> While this issue can be triggered deterministically, in the current form
>> it seems to happen rather sporadically (which is why it has gone
>> unnoticed during earlier testing). This is likely due to the two
>> kzalloc() calls (for request and response) being directly after each
>> other. Which means that those likely return consecutive regions most of
>> the time, especially when not much else is going on in the system.
>>
>> Fix this by allocating a single memory region for both request and
>> response buffers, properly aligning both structs inside it. This
>> unfortunately also means that the qcom_scm_qseecom_app_send() interface
>> needs to be restructured, as it should no longer map the DMA regions
>> separately. Therefore, move the responsibility of DMA allocation (or
>> mapping) to the caller.
>>
>> Fixes: 759e7a2b62eb ("firmware: Add support for Qualcomm UEFI Secure Application")
>> Signed-off-by: Maximilian Luz <luzmaximilian@gmail.com>
>
> Thanks for tracking this down. I can confirm that this fixes the
> hypervisor reset I can trigger by repeatedly reading an EFI variable on
> the X13s. Before it triggered within minutes, now I ran it for 3 hours
> without any issues:
>
> Tested-by: Johan Hovold <johan+linaro@kernel.org>
>
> Even if the patch is a bit large it's straight-forward and fixes a
> critical bug so I think this needs to go to stable as well:
>
> Cc: stable@vger.kernel.org # 6.7
>
> A couple of comments below.
>
>> @@ -277,10 +296,15 @@ static efi_status_t qsee_uefi_get_variable(struct qcuefi_client *qcuefi, const e
>> unsigned long buffer_size = *data_size;
>> efi_status_t efi_status = EFI_SUCCESS;
>> unsigned long name_length;
>> + dma_addr_t cmd_buf_phys;
>
> Throughout the patch, could you please refer to DMA addresses as DMA
> addresses rather than physical addresses, for example, by using a "_dma"
> rather than "_phys" suffix here?
Sure. I've applied this and the changes below (as well as similar ones
for qcom_qseecom.h) for v2.
Thanks!
Best regards,
Max
>
>> + size_t cmd_buf_size;
>> + void *cmd_buf_virt;
>
> I'd also prefer if you dropped the "_virt" suffix from the buffer
> pointers.
>
>> diff --git a/drivers/firmware/qcom/qcom_scm.c b/drivers/firmware/qcom/qcom_scm.c
>> index 49ddbcab06800..fc59688227f43 100644
>> --- a/drivers/firmware/qcom/qcom_scm.c
>> +++ b/drivers/firmware/qcom/qcom_scm.c
>> @@ -1579,46 +1579,26 @@ EXPORT_SYMBOL_GPL(qcom_scm_qseecom_app_get_id);
>> /**
>> * qcom_scm_qseecom_app_send() - Send to and receive data from a given QSEE app.
>> * @app_id: The ID of the target app.
>> - * @req: Request buffer sent to the app (must be DMA-mappable).
>> + * @req: Physical address of the request buffer sent to the app.
>
> DMA address
>
>> * @req_size: Size of the request buffer.
>> - * @rsp: Response buffer, written to by the app (must be DMA-mappable).
>> + * @rsp: Physical address of the response buffer, written to by the app.
>
> DMA address
>
>> * @rsp_size: Size of the response buffer.
>> *
>> * Sends a request to the QSEE app associated with the given ID and read back
>> - * its response. The caller must provide two DMA memory regions, one for the
>> - * request and one for the response, and fill out the @req region with the
>> + * its response. The caller must provide two physical memory regions, one for
>
> DMA memory
>
>> + * the request and one for the response, and fill out the @req region with the
>> * respective (app-specific) request data. The QSEE app reads this and returns
>> * its response in the @rsp region.
>> *
>> * Return: Zero on success, nonzero on failure.
>> */
>> -int qcom_scm_qseecom_app_send(u32 app_id, void *req, size_t req_size, void *rsp,
>> - size_t rsp_size)
>> +int qcom_scm_qseecom_app_send(u32 app_id, dma_addr_t req, size_t req_size,
>> + dma_addr_t rsp, size_t rsp_size)
>
> And similar throughout.
>
> With that fixed, feel free to add:
>
> Reviewed-by: Johan Hovold <johan+linaro@kernel.org>
>
> Johan
prev parent reply other threads:[~2024-04-06 11:37 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-03-29 20:18 [PATCH] firmware: qcom: uefisecapp: Fix memory related IO errors and crashes Maximilian Luz
2024-04-02 12:30 ` Johan Hovold
2024-04-06 11:37 ` Maximilian Luz [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=93d54733-bd83-478c-9e4c-727c3b09396c@gmail.com \
--to=luzmaximilian@gmail.com \
--cc=andersson@kernel.org \
--cc=ardb@kernel.org \
--cc=brgl@bgdev.pl \
--cc=johan+linaro@kernel.org \
--cc=johan@kernel.org \
--cc=konrad.dybcio@linaro.org \
--cc=krzysztof.kozlowski@linaro.org \
--cc=linux-arm-msm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=quic_gurus@quicinc.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox