* [GIT PULL] char/misc driver patches for 3.16-rc1
@ 2014-06-03 5:44 Greg KH
2014-06-03 15:32 ` Linus Torvalds
0 siblings, 1 reply; 9+ messages in thread
From: Greg KH @ 2014-06-03 5:44 UTC (permalink / raw)
To: Linus Torvalds, Andrew Morton, Arnd Bergmann; +Cc: linux-kernel
The following changes since commit d1db0eea852497762cab43b905b879dfcd3b8987:
Linux 3.15-rc3 (2014-04-27 19:29:27 -0700)
are available in the git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/gregkh/char-misc.git/ tags/char-misc-3.16-rc1
for you to fetch changes up to a100d88df1e924e5c9678fabf054d1bae7ab74fb:
hv: use correct order when freeing monitor_pages (2014-05-28 13:45:15 -0700)
----------------------------------------------------------------
Char / misc driver patches for 3.16-rc1
Here is the big char / misc driver updates for 3.16-rc1.
Lots of different driver updates for a variety of different drivers and
minor driver subsystems.
All have been in linux-next with no reported issues.
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
----------------------------------------------------------------
Alexander Usyskin (6):
mei: txe: add runtime pm framework
mei: txe: use runtime PG pm domain for non wakeable devices
mei: extract fw status registers
mei: make return values consistent across the driver
mei: set connecting state just upon connection request is sent to the fw
mei: add per device configuration
Alexey Khoroshilov (1):
w1: do not unlock unheld list_mutex in __w1_remove_master_device()
Arnd Bergmann (1):
misc: atmel_pwm: only build for supported platforms
Bin Wang (1):
uio: fix vma io range check in mmap
Chanwoo Choi (11):
extcon: max14577: Change extcon name instead of static name according to device type
Merge tag 'ib-mfd-extcon-3.16' of git://git.kernel.org/.../lee/mfd into HEAD
extcon: Add extcon_dev_allocate/free() to control the memory of extcon device
extcon: Add devm_extcon_dev_allocate/free to manage the resource of extcon device
extcon: max8997: Use devm_extcon_dev_allocate for extcon_dev
extcon: max77693: Use devm_extcon_dev_allocate for extcon_dev
extcon: max14577: Use devm_extcon_dev_allocate for extcon_dev
extcon: arizona: Use devm_extcon_dev_allocate for extcon_dev
extcon: adc-jack: Use devm_extcon_dev_allocate for extcon_dev
extcon: gpio: Use devm_extcon_dev_allocate for extcon_dev
extcon: palmas: Use devm_extcon_dev_allocate for extcon_dev
Christian Engelmayer (1):
misc: genwqe: fix uninitialized return value in genwqe_free_sync_sgl()
Daeseok Youn (1):
drivers: uio_dmem_genirq: Fix memory leak in uio_dmem_genirq_probe()
Dan Carpenter (1):
applicom: dereferencing NULL on error path
David Fries (2):
connector: allow multiple messages to be sent in one packet
w1: optional bundling of netlink kernel replies
Geert Uytterhoeven (1):
drivers: Remove duplicate conditionally included subdirs
Greg Kroah-Hartman (1):
Merge tag 'extcon-next-for-3.16' of git://git.kernel.org/.../chanwoo/extcon into char-misc-next
Jean Delvare (2):
misc: Add hardware dependencies to Atmel drivers
misc: pch_phub: Fix Kconfig dependencies
Johannes Thumshirn (1):
mcb: Add support for shared PCI IRQs
Josh Cartwright (1):
spmi: of: fixup generic SPMI devicetree binding example
K. Y. Srinivasan (3):
Drivers: hv: Eliminate the channel spinlock in the callback path
Drivers: hv: vmbus: Implement per-CPU mapping of relid to channel
Drivers: hv: balloon: Ensure pressure reports are posted regularly
Kishon Vijay Abraham I (1):
extcon: palmas: explicitly set edev name as node name
Krzysztof Kozlowski (14):
mfd: max14577: Add muic prefix to regmap config
mfd: max14577: Add detection of device type
extcon: max14577: Add max14577 prefix to muic_irqs
extcon: max14577: Choose muic_irqs according to device type
mfd: max14577: Add MAX14577 prefix to IRQ defines
mfd: max77836: Add MAX77836 support to max14577 driver
extcon: max14577: Add support for MAX77836
regulator: max14577: Add support for MAX77836 regulators
extcon: max77693: Fix two NULL pointer exceptions on missing pdata
extcon: max8997: Fix NULL pointer exception on missing pdata
extcon: max77693: Use power efficient workqueue for delayed cable detection
extcon: max8997: Use power efficient workqueue for delayed cable detection
extcon: max14577: Fix probe failure on successful work queue
extcon: max14577: Properly handle regmap_irq_get_virq error
Masanari Iida (1):
misc: genwqe: Fix format string mismatch in card_debugfs.c
Radim Krčmář (1):
hv: use correct order when freeing monitor_pages
Rob Herring (2):
dt/bindings: add binding for ARM Versatile character LCD
misc: arm-charlcd: add DT probe support
Robert P. J. Day (2):
MAINTAINERS: Add miscdevice.h to file list for char/misc drivers.
miscdevice.h: Simple syntax fix to make pointers consistent.
Sangjung Woo (8):
extcon: Add resource-managed extcon register function
extcon: adc-jack: Use devm_extcon_dev_register()
extcon: gpio: Use devm_extcon_dev_register()
extcon: max14577: Use devm_extcon_dev_register()
extcon: max77693: Use devm_extcon_dev_register()
extcon: max8997: Use devm_extcon_dev_register()
extcon: palmas: Use devm_extcon_dev_register()
extcon: arizona: Use devm_extcon_dev_register()
Sebastien Bourdelin (1):
misc: (ds1682) replace obsolete simple_strtoull() with kstrtoull()
Tobias Klauser (1):
hv: Remove unnecessary comparison of unsigned against 0
Tomas Winkler (16):
mei: implement power gating isolation hbm layer
mei: me: introduce power gating registers
mei: me: add power gating isolation register write wrappers
mei: condition PGI support on HW and HBM version
mei: expose hardware power gating state to mei layer
mei: me: add pg exit and entry flow commands
mei: add function to check write queues
mei: me: add runtime pm framework
mei: use runtime pm in write and read flow
mei: me: use runtime PG pm domain for non wakeable devices
mei: me: bump hbm version to 1.1 to support power gating
mei: fix memory leak of mei_clients array
mei: me: fix hw ready reset flow
mei: me: drop harmful wait optimization
mei: me: read H_CSR after asserting reset
mei: me: move probe quirk to cfg structure
Documentation/connector/connector.txt | 15 +-
.../devicetree/bindings/misc/arm-charlcd.txt | 18 +
Documentation/devicetree/bindings/spmi/spmi.txt | 2 +-
Documentation/w1/w1.generic | 2 +-
Documentation/w1/w1.netlink | 13 +-
MAINTAINERS | 1 +
drivers/Makefile | 2 -
drivers/char/applicom.c | 1 -
drivers/connector/connector.c | 17 +-
drivers/extcon/Kconfig | 4 +-
drivers/extcon/extcon-adc-jack.c | 49 +-
drivers/extcon/extcon-arizona.c | 40 +-
drivers/extcon/extcon-class.c | 151 +++++
drivers/extcon/extcon-gpio.c | 37 +-
drivers/extcon/extcon-max14577.c | 199 +++++--
drivers/extcon/extcon-max77693.c | 23 +-
drivers/extcon/extcon-max8997.c | 16 +-
drivers/extcon/extcon-palmas.c | 41 +-
drivers/hv/channel.c | 19 +-
drivers/hv/channel_mgmt.c | 52 +-
drivers/hv/connection.c | 39 +-
drivers/hv/hv.c | 2 +
drivers/hv/hv_balloon.c | 29 +-
drivers/hv/hyperv_vmbus.h | 5 +
drivers/mcb/mcb-core.c | 20 +-
drivers/mcb/mcb-pci.c | 17 +-
drivers/mfd/Kconfig | 6 +-
drivers/mfd/max14577.c | 315 ++++++++--
drivers/misc/Kconfig | 5 +-
drivers/misc/arm-charlcd.c | 7 +
drivers/misc/ds1682.c | 5 +-
drivers/misc/genwqe/card_debugfs.c | 4 +-
drivers/misc/genwqe/card_utils.c | 2 +-
drivers/misc/mei/amthif.c | 2 -
drivers/misc/mei/bus.c | 4 +-
drivers/misc/mei/client.c | 90 ++-
drivers/misc/mei/hbm.c | 97 ++-
drivers/misc/mei/hbm.h | 2 +
drivers/misc/mei/hw-me-regs.h | 9 +
drivers/misc/mei/hw-me.c | 322 +++++++++-
drivers/misc/mei/hw-me.h | 15 +-
drivers/misc/mei/hw-txe-regs.h | 2 +-
drivers/misc/mei/hw-txe.c | 111 +++-
drivers/misc/mei/hw-txe.h | 21 +-
drivers/misc/mei/hw.h | 25 +-
drivers/misc/mei/init.c | 60 +-
drivers/misc/mei/main.c | 1 -
drivers/misc/mei/mei_dev.h | 101 +++-
drivers/misc/mei/pci-me.c | 256 +++++---
drivers/misc/mei/pci-txe.c | 155 ++++-
drivers/misc/mei/wd.c | 2 -
drivers/regulator/Kconfig | 7 +-
drivers/regulator/max14577.c | 277 +++++++--
drivers/uio/uio.c | 2 +-
drivers/uio/uio_dmem_genirq.c | 4 +-
drivers/w1/w1.c | 2 +
drivers/w1/w1.h | 8 -
drivers/w1/w1_int.c | 4 +
drivers/w1/w1_netlink.c | 649 +++++++++++++--------
drivers/w1/w1_netlink.h | 36 ++
include/linux/connector.h | 1 +
include/linux/extcon.h | 37 ++
include/linux/hyperv.h | 7 +
include/linux/mcb.h | 6 +-
include/linux/mfd/max14577-private.h | 222 +++++--
include/linux/mfd/max14577.h | 19 +-
include/linux/mfd/palmas.h | 2 +-
include/linux/miscdevice.h | 2 +-
68 files changed, 2931 insertions(+), 787 deletions(-)
create mode 100644 Documentation/devicetree/bindings/misc/arm-charlcd.txt
^ permalink raw reply [flat|nested] 9+ messages in thread* Re: [GIT PULL] char/misc driver patches for 3.16-rc1 2014-06-03 5:44 [GIT PULL] char/misc driver patches for 3.16-rc1 Greg KH @ 2014-06-03 15:32 ` Linus Torvalds 2014-06-03 17:02 ` Greg KH 0 siblings, 1 reply; 9+ messages in thread From: Linus Torvalds @ 2014-06-03 15:32 UTC (permalink / raw) To: Greg KH; +Cc: Andrew Morton, Arnd Bergmann, Linux Kernel Mailing List On Mon, Jun 2, 2014 at 10:44 PM, Greg KH <gregkh@linuxfoundation.org> wrote: > > Bin Wang (1): > uio: fix vma io range check in mmap Greg, this is BS. If the UIO memory size is smaller than a page, we cannot mmap it safely, because the mmap will map random memory *after* the memory area too. This is not like a regular file mapping where the kernel can just zero-pad up to the end of the page. We had this bug before (and even worse - it would mmap unaligned IO structures too, so now the actual mapped address didn't actually correspond to the returned user mapping address at all), and we fixed them. See 7314e613d5ff Fix a few incorrectly checked [io_]remap_pfn_range() calls b65502879556 uio: we cannot mmap unaligned page contents so now you've re-introduced part of the problem, and marked it for stable too. The commit log shows nothing useful. It basically just says "let's reintroduce this bug" without even giving an excuse why that would be a good idea. And it really _isn't_ a good idea. At least you didn't remove the alignment check, but the thing is, if a resource is less than a page in size, it's quite possibly also unaligned, so the fix doesn't even *fix* anything, except by pure luck. The fact is, memory-mapping device areas smaller than one page is simply a bad bad idea. Don't do this shit. Linus ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [GIT PULL] char/misc driver patches for 3.16-rc1 2014-06-03 15:32 ` Linus Torvalds @ 2014-06-03 17:02 ` Greg KH 2014-06-03 17:14 ` Linus Torvalds 0 siblings, 1 reply; 9+ messages in thread From: Greg KH @ 2014-06-03 17:02 UTC (permalink / raw) To: Linus Torvalds, Bin Wang, Nobuhiro Iwamatsu Cc: Andrew Morton, Arnd Bergmann, Linux Kernel Mailing List On Tue, Jun 03, 2014 at 08:32:50AM -0700, Linus Torvalds wrote: > On Mon, Jun 2, 2014 at 10:44 PM, Greg KH <gregkh@linuxfoundation.org> wrote: > > > > Bin Wang (1): > > uio: fix vma io range check in mmap > > Greg, this is BS. > > If the UIO memory size is smaller than a page, we cannot mmap it > safely, because the mmap will map random memory *after* the memory > area too. This is not like a regular file mapping where the kernel can > just zero-pad up to the end of the page. > > We had this bug before (and even worse - it would mmap unaligned IO > structures too, so now the actual mapped address didn't actually > correspond to the returned user mapping address at all), and we fixed > them. See > > 7314e613d5ff Fix a few incorrectly checked [io_]remap_pfn_range() calls > b65502879556 uio: we cannot mmap unaligned page contents > > so now you've re-introduced part of the problem, and marked it for stable too. Crap, sorry about that, I'll remember to not take it for stable. > The commit log shows nothing useful. It basically just says "let's > reintroduce this bug" without even giving an excuse why that would be > a good idea. > > And it really _isn't_ a good idea. At least you didn't remove the > alignment check, but the thing is, if a resource is less than a page > in size, it's quite possibly also unaligned, so the fix doesn't even > *fix* anything, except by pure luck. The fact is, memory-mapping > device areas smaller than one page is simply a bad bad idea. > > Don't do this shit. Hm, I got two different bug reports, and this same patch from two different people insisting that we broke their drivers with the above patches, and asked for this patch to be applied. Bin provided a big long description of why this change was acceptable, somewhere in the lkml archives, and I got confused thinking it was ok as long as the size was aligned properly, my fault, I didn't think about the trailing data in the buffer :( Bin and Nobuhiro, you need to look at your userspace program that is dealing with the uio interface and fix up the numbers you are passing it to live with the existing changes. Linus, I'll send you a revert patch for this now, or do you want to just do it directly? thanks, greg k-h ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [GIT PULL] char/misc driver patches for 3.16-rc1 2014-06-03 17:02 ` Greg KH @ 2014-06-03 17:14 ` Linus Torvalds 2014-06-03 18:25 ` Greg KH 0 siblings, 1 reply; 9+ messages in thread From: Linus Torvalds @ 2014-06-03 17:14 UTC (permalink / raw) To: Greg KH Cc: Bin Wang, Nobuhiro Iwamatsu, Andrew Morton, Arnd Bergmann, Linux Kernel Mailing List On Tue, Jun 3, 2014 at 10:02 AM, Greg KH <gregkh@linuxfoundation.org> wrote: > > Hm, I got two different bug reports, and this same patch from two > different people insisting that we broke their drivers with the above > patches, and asked for this patch to be applied. So I do think that we might be able to apply this patch, but I think it needs a *lot* more thought than was obviously spent on it so far. For example, right now it's actively insecure. Do we care? Maybe we don't. The user-space uio side presumably is root-owned, and hopefully trusted. And what about the unaligned mmio case? Are people somehow guaranteeing that the regions is page-aligned, even if it isn't page-sized? What is the actual hardware in question? Basically, it's an obvious security issue, and we shouldn't just say "whatever". But maybe - with lots of commentary about why the security implications aren't actually bad in _practice_, and why things are always page-aligned even if they aren't page-sized, we can say "ok, it's wrong, but we can still do it because xyz". So I'm mostly unhappy because I didn't see that kind of analysis, not because the patch might not eventually be ok. A "this breaks my driver" is nowhere near the kind of thought this needs, I think. Linus ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [GIT PULL] char/misc driver patches for 3.16-rc1 2014-06-03 17:14 ` Linus Torvalds @ 2014-06-03 18:25 ` Greg KH 2014-06-07 10:41 ` Pavel Machek ` (2 more replies) 0 siblings, 3 replies; 9+ messages in thread From: Greg KH @ 2014-06-03 18:25 UTC (permalink / raw) To: Linus Torvalds Cc: Bin Wang, Nobuhiro Iwamatsu, Andrew Morton, Arnd Bergmann, Linux Kernel Mailing List, Norbert Ciosek On Tue, Jun 03, 2014 at 10:14:41AM -0700, Linus Torvalds wrote: > On Tue, Jun 3, 2014 at 10:02 AM, Greg KH <gregkh@linuxfoundation.org> wrote: > > > > Hm, I got two different bug reports, and this same patch from two > > different people insisting that we broke their drivers with the above > > patches, and asked for this patch to be applied. > > So I do think that we might be able to apply this patch, but I think > it needs a *lot* more thought than was obviously spent on it so far. > > For example, right now it's actively insecure. Do we care? Maybe we > don't. The user-space uio side presumably is root-owned, and hopefully > trusted. It better be trusted, as userspace has access to the "raw" hardware here, and is getting notified about every irq that happens to the device. > And what about the unaligned mmio case? Are people somehow > guaranteeing that the regions is page-aligned, even if it isn't > page-sized? > > What is the actual hardware in question? Here are two email threads that I had about this, first from Bin that is the patch I applied: https://lkml.org/lkml/2014/3/25/11 And this one with Nobuhiro that goes into details a bit more: https://lkml.org/lkml/2014/3/11/707 Showing how a small memory window of the device is now broken without this change. And this one that didn't get an answer from anyone from Norbert: https://lkml.org/lkml/2014/4/18/47 showing how the changes you referred to broke his hardware access as well for the same reasons. Bin, Nobuhiro, Norbert, anything else you want to bring up about this as your hardware is affected? Norbert, it is commit ddb09754e6c7239e302c7b675df9bbd415f8de5d now in Linus's tree. > Basically, it's an obvious security issue, and we shouldn't just say > "whatever". But maybe - with lots of commentary about why the security > implications aren't actually bad in _practice_, and why things are > always page-aligned even if they aren't page-sized, we can say "ok, > it's wrong, but we can still do it because xyz". I think that if the size of the io range is smaller than a page, we still want to give access to the hardware. I guess we can require that userspace ask for the whole page size, but even if we do that, it's still accessing data "off the end" of the device and that is unknown what's going to happen as we are mmaping physical memory here, not virtual. thanks, greg k-h ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [GIT PULL] char/misc driver patches for 3.16-rc1 2014-06-03 18:25 ` Greg KH @ 2014-06-07 10:41 ` Pavel Machek 2014-06-07 10:42 ` Pavel Machek 2014-06-17 23:06 ` Greg KH 2 siblings, 0 replies; 9+ messages in thread From: Pavel Machek @ 2014-06-07 10:41 UTC (permalink / raw) To: Greg KH Cc: Linus Torvalds, Bin Wang, Nobuhiro Iwamatsu, Andrew Morton, Arnd Bergmann, Linux Kernel Mailing List, Norbert Ciosek Hi! > > > Hm, I got two different bug reports, and this same patch from two > > > different people insisting that we broke their drivers with the above > > > patches, and asked for this patch to be applied. > > > > So I do think that we might be able to apply this patch, but I think > > it needs a *lot* more thought than was obviously spent on it so far. > > > > For example, right now it's actively insecure. Do we care? Maybe we > > don't. The user-space uio side presumably is root-owned, and hopefully > > trusted. > > It better be trusted, as userspace has access to the "raw" hardware > here, and is getting notified about every irq that happens to the > device. Well, it still depends on what the hardware can do. Some crazy people (secureboot) want to secure kernel from root user. If you have "raw" hardware of few keys connected on gpio with an interrupt (anything without DMA capability, really), you can not compromise rest of kernel normally. So, yes, I have seen a lot of hardware where non-root uio would make sense. Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [GIT PULL] char/misc driver patches for 3.16-rc1 2014-06-03 18:25 ` Greg KH 2014-06-07 10:41 ` Pavel Machek @ 2014-06-07 10:42 ` Pavel Machek 2014-06-07 22:02 ` One Thousand Gnomes 2014-06-17 23:06 ` Greg KH 2 siblings, 1 reply; 9+ messages in thread From: Pavel Machek @ 2014-06-07 10:42 UTC (permalink / raw) To: Greg KH Cc: Linus Torvalds, Bin Wang, Nobuhiro Iwamatsu, Andrew Morton, Arnd Bergmann, Linux Kernel Mailing List, Norbert Ciosek On Tue 2014-06-03 11:25:55, Greg KH wrote: > On Tue, Jun 03, 2014 at 10:14:41AM -0700, Linus Torvalds wrote: > > On Tue, Jun 3, 2014 at 10:02 AM, Greg KH <gregkh@linuxfoundation.org> wrote: > > > > > > Hm, I got two different bug reports, and this same patch from two > > > different people insisting that we broke their drivers with the above > > > patches, and asked for this patch to be applied. > > > > So I do think that we might be able to apply this patch, but I think > > it needs a *lot* more thought than was obviously spent on it so far. > > > > For example, right now it's actively insecure. Do we care? Maybe we > > don't. The user-space uio side presumably is root-owned, and hopefully > > trusted. > > It better be trusted, as userspace has access to the "raw" hardware > here, and is getting notified about every irq that happens to the > device. At the very least, we have (CAP_SYS_ADMIN?) should be required before allowing root to compromise kernel, no? -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [GIT PULL] char/misc driver patches for 3.16-rc1 2014-06-07 10:42 ` Pavel Machek @ 2014-06-07 22:02 ` One Thousand Gnomes 0 siblings, 0 replies; 9+ messages in thread From: One Thousand Gnomes @ 2014-06-07 22:02 UTC (permalink / raw) To: Pavel Machek Cc: Greg KH, Linus Torvalds, Bin Wang, Nobuhiro Iwamatsu, Andrew Morton, Arnd Bergmann, Linux Kernel Mailing List, Norbert Ciosek > At the very least, we have (CAP_SYS_ADMIN?) should be required before > allowing root to compromise kernel, no? CAP_SYS_RAWIO for anything that can compromise the kernel itself. ^ permalink raw reply [flat|nested] 9+ messages in thread
* Re: [GIT PULL] char/misc driver patches for 3.16-rc1 2014-06-03 18:25 ` Greg KH 2014-06-07 10:41 ` Pavel Machek 2014-06-07 10:42 ` Pavel Machek @ 2014-06-17 23:06 ` Greg KH 2 siblings, 0 replies; 9+ messages in thread From: Greg KH @ 2014-06-17 23:06 UTC (permalink / raw) To: Linus Torvalds, Bin Wang, Nobuhiro Iwamatsu, Andrew Morton, Arnd Bergmann, Linux Kernel Mailing List, Norbert Ciosek On Tue, Jun 03, 2014 at 11:25:55AM -0700, Greg KH wrote: > On Tue, Jun 03, 2014 at 10:14:41AM -0700, Linus Torvalds wrote: > > On Tue, Jun 3, 2014 at 10:02 AM, Greg KH <gregkh@linuxfoundation.org> wrote: > > > > > > Hm, I got two different bug reports, and this same patch from two > > > different people insisting that we broke their drivers with the above > > > patches, and asked for this patch to be applied. > > > > So I do think that we might be able to apply this patch, but I think > > it needs a *lot* more thought than was obviously spent on it so far. > > > > For example, right now it's actively insecure. Do we care? Maybe we > > don't. The user-space uio side presumably is root-owned, and hopefully > > trusted. > > It better be trusted, as userspace has access to the "raw" hardware > here, and is getting notified about every irq that happens to the > device. > > > And what about the unaligned mmio case? Are people somehow > > guaranteeing that the regions is page-aligned, even if it isn't > > page-sized? > > > > What is the actual hardware in question? > > Here are two email threads that I had about this, first from Bin that > is the patch I applied: > https://lkml.org/lkml/2014/3/25/11 > > And this one with Nobuhiro that goes into details a bit more: > https://lkml.org/lkml/2014/3/11/707 > > Showing how a small memory window of the device is now broken without > this change. > > And this one that didn't get an answer from anyone from Norbert: > https://lkml.org/lkml/2014/4/18/47 > showing how the changes you referred to broke his hardware access as > well for the same reasons. > > Bin, Nobuhiro, Norbert, anything else you want to bring up about this as > your hardware is affected? > > Norbert, it is commit ddb09754e6c7239e302c7b675df9bbd415f8de5d now in > Linus's tree. > > > Basically, it's an obvious security issue, and we shouldn't just say > > "whatever". But maybe - with lots of commentary about why the security > > implications aren't actually bad in _practice_, and why things are > > always page-aligned even if they aren't page-sized, we can say "ok, > > it's wrong, but we can still do it because xyz". > > I think that if the size of the io range is smaller than a page, we > still want to give access to the hardware. I guess we can require that > userspace ask for the whole page size, but even if we do that, it's > still accessing data "off the end" of the device and that is unknown > what's going to happen as we are mmaping physical memory here, not > virtual. Ok, given that NO ONE has responded to this thread that had previously wanted this patch to be accepted (including the original author), I'm going to revert it now and push that change to Linus soon. If someone wants to justify this change is needed, feel free to send another patch sometime in the future with a whole bunch of explanation... thanks, greg k-h ^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2014-06-17 23:02 UTC | newest] Thread overview: 9+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2014-06-03 5:44 [GIT PULL] char/misc driver patches for 3.16-rc1 Greg KH 2014-06-03 15:32 ` Linus Torvalds 2014-06-03 17:02 ` Greg KH 2014-06-03 17:14 ` Linus Torvalds 2014-06-03 18:25 ` Greg KH 2014-06-07 10:41 ` Pavel Machek 2014-06-07 10:42 ` Pavel Machek 2014-06-07 22:02 ` One Thousand Gnomes 2014-06-17 23:06 ` Greg KH
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox