Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1430361imm; Tue, 2 Oct 2018 08:06:25 -0700 (PDT) X-Google-Smtp-Source: ACcGV60tdul2gMfFqQZ+m/Pip95md+q8fMKx+YUoW76k+roa1PKej0CAZv1E2M0vsjj4zRx26wmY X-Received: by 2002:a62:6c4:: with SMTP id 187-v6mr5116068pfg.109.1538492785693; Tue, 02 Oct 2018 08:06:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538492785; cv=none; d=google.com; s=arc-20160816; b=lDe2SD+JY0lvnkanRKJpL7LLsHM12mZ21mOJPUoO0K6px3Qxuz62kvIPUNVHuWrvVa KgKHMXxfqUebsP7elmFESzXhZhjPUhvtiTRvywyDfaY56owPIxVhz/NaNetYjzivK2Sg OoiI/OXQy141HLRgUmqMJGdyjtmcA+FpVE+5v+TzktrMHn2r0OsY1wG/0n7QICFKT0oh 4Rk19eSVwoJ4liAYn6L4PrW7t0FUPUYZ90o+C/TPAefvQ4PbScdbIDOS3Hnv9QHn6ycm OdCAvbNlu3hWELagBHSS0uebYaw+XDoiZUEnylxN6qonp/yRAAlF/VeUl+w9mfnZ1LtU 1I7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=/S4P3S2Wi5sTSHL0dEhr56FzgAgKDp3pZIDIEAKczEw=; b=UhGPjX1LrlSeeme6vIkmERNGZv1b7L8em8gzmPk69rY0kxXhbLNcie2UbAvlLMSNDF FrWKDTlBEosdYCmPKsRiRx5rvUiyEfNWf1JDNqThP7KnyKgP4iOsd9MUZbomSB97frWn RLQc88YG/caHzgKoJ8UH/ZtNc2AB7s4NWqlTwH8YkZGp89hHmVJU6p/xhR58i8AXFlKz xmzjknA3hXuYE9UscSN84n040Aoo+OxOGlvJJn/wW7jvFFPLZ0IMN4g9u+KKiq4v6yPr vNYiSl0Y3W3oOW+Ic3TQY4RE4vi7+TdcZT/yDdgzXbPAPMgxtiDyK+pLtdxsyFDrY+lv 9UAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=iV1dFkDV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o15-v6si16076331pgf.253.2018.10.02.08.06.07; Tue, 02 Oct 2018 08:06:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=iV1dFkDV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729055AbeJBVtx (ORCPT + 99 others); Tue, 2 Oct 2018 17:49:53 -0400 Received: from fllv0016.ext.ti.com ([198.47.19.142]:44692 "EHLO fllv0016.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728755AbeJBVtx (ORCPT ); Tue, 2 Oct 2018 17:49:53 -0400 Received: from dflxv15.itg.ti.com ([128.247.5.124]) by fllv0016.ext.ti.com (8.15.2/8.15.2) with ESMTP id w92F5xWj127853; Tue, 2 Oct 2018 10:05:59 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1538492759; bh=/S4P3S2Wi5sTSHL0dEhr56FzgAgKDp3pZIDIEAKczEw=; h=Subject:To:CC:References:From:Date:In-Reply-To; b=iV1dFkDV6s9ZvkICazYwaNfenA+ElXn7OXPZQrZsjMxweBVR6CXPYcbBqd/IdJJBw puapaWj5PHJOZlMES2Mjd06NtOrChzyWtZ1RUFLj+kk3R27WtYqPeiXkl4c0Bg6fo5 7ZfhaWspqrQjT7PHm0RnDX/t+yQgbJ8UT+f2zxPo= Received: from DFLE106.ent.ti.com (dfle106.ent.ti.com [10.64.6.27]) by dflxv15.itg.ti.com (8.14.3/8.13.8) with ESMTP id w92F5xKT020640; Tue, 2 Oct 2018 10:05:59 -0500 Received: from DFLE112.ent.ti.com (10.64.6.33) by DFLE106.ent.ti.com (10.64.6.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Tue, 2 Oct 2018 10:05:59 -0500 Received: from dflp32.itg.ti.com (10.64.6.15) by DFLE112.ent.ti.com (10.64.6.33) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_RSA_WITH_AES_256_CBC_SHA) id 15.1.1466.3 via Frontend Transport; Tue, 2 Oct 2018 10:05:59 -0500 Received: from [128.247.58.153] (ileax41-snat.itg.ti.com [10.172.224.153]) by dflp32.itg.ti.com (8.14.3/8.13.8) with ESMTP id w92F5wUa024715; Tue, 2 Oct 2018 10:05:58 -0500 Subject: Re: [PATCH 2/5] remoteproc: Check for NULL firmwares in sysfs interface To: Arnaud Pouliquen , Bjorn Andersson CC: Ohad Ben-Cohen , Loic Pallardy , , References: <20180915003725.17549-1-s-anna@ti.com> <20180915003725.17549-3-s-anna@ti.com> From: Suman Anna Message-ID: <505f8177-9e27-d864-6355-2bc4171abf47@ti.com> Date: Tue, 2 Oct 2018 10:05:58 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Arnaud, On 10/02/2018 04:43 AM, Arnaud Pouliquen wrote: > Hi Suman, > > On 09/15/2018 02:37 AM, Suman Anna wrote: >> The remoteproc framework provides a sysfs file 'firmware' >> for modifying the firmware image name from userspace. Add >> an additional check to ensure NULL firmwares are errored >> out right away, rather than getting a delayed error while >> requesting a firmware during the start of a remoteproc >> later on. >> >> Signed-off-by: Suman Anna >> --- >> drivers/remoteproc/remoteproc_sysfs.c | 5 +++++ >> 1 file changed, 5 insertions(+) >> >> diff --git a/drivers/remoteproc/remoteproc_sysfs.c b/drivers/remoteproc/remoteproc_sysfs.c >> index 2142b3ea726e..ce93f4d710f3 100644 >> --- a/drivers/remoteproc/remoteproc_sysfs.c >> +++ b/drivers/remoteproc/remoteproc_sysfs.c >> @@ -49,6 +49,11 @@ static ssize_t firmware_store(struct device *dev, >> } >> >> len = strcspn(buf, "\n"); >> + if (!len) { >> + dev_err(dev, "can't provide a NULL firmware\n"); >> + err = -EINVAL; >> + goto out; >> + } > This patch fixes only the case of a null name but not a bad name. So I'm > not one hundred percent sure that it is relevant, as it treats only a > part of the problem. But it's fine with me if it is accepted. Yeah, it is a minor fix catching only NULL names. There is no way for the interface to know a bad name until the corresponding firmware is requested. regards Suman > > Tested-by: Arnaud Pouliquen > > Regards > Arnaud > >> >> p = kstrndup(buf, len, GFP_KERNEL); >> if (!p) { >>