Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp6358pxx; Mon, 26 Oct 2020 01:40:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy7z+7zHVDeTQ9vp+Tave2ZqpnaihLJArYpNjvxyN0IaQf8CU3EL0EoKrZy/XOFtHlMBLJR X-Received: by 2002:a17:907:20d9:: with SMTP id qq25mr14489398ejb.149.1603701629308; Mon, 26 Oct 2020 01:40:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603701629; cv=none; d=google.com; s=arc-20160816; b=Xm490wWgRvbxv4rP41JGc3bWRSxeCbtcSVp9j/wN74lnR1jHEcZDfFHz7L+I0L1vbL UvUgOjv5PUsyA0DfM8BP4DKVV+CecRFrLOHFldVt60jzaHSKOk3YR3p8lI6bDKlQmkkB wb8ZHf7wpzN7IX9Eltapm1Cc3YqSFrU/a/tFOOsGhqRhclVMDtPhziD0oKzF58pi5qei UiqbGzcCeppmr6h7vS2Bqonvu4RI05BXG96XwA9+WiKplxkbIZ7LjRk9P6JiNGr0niBf cqVPYYFhB/9mQ4LoenI0fBBBdhCZIi0Fqme1HgO/UMs7S1HuLOV7x+5njTJ1/dtJJ8PJ 1SfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:message-id:references:in-reply-to :subject:cc:to:from:date:content-transfer-encoding:mime-version :sender:dkim-signature; bh=4W30NrG0crD/eXRgkUetS2eftLP50C0CS9VL2EWCFO0=; b=eo9yBnLAMqbum/CmPdc5DOhQN3ePkjnf7b7UJ1J+ZNqkCMQB8DHd4Kqu7Q7we1C8Zk wRQt8EQDgssEF+cPsYSFYygPSzn0sEBzU8pRwG4rTbVCVptwPFX5ipQcEhoZAjZQgb0W Flk95L0zFFXbSV5vMtDUB5RWrrzwP8LICLYQUcHD5QGb3QEowQMkLWr6Tw/DWQmYP1OH CNkExESqPCMvoXlJE7K7hRNdlYTpSPnmv6XiQRs7KBEqFIC1KHXO+7w0GvE9X1zqojV+ jsb9xzEwHXovcYrH5rc52FkzaNkycQr5LhGgx+i4lJL1U62MQqFM3Z+A4YVi/q7i/oHb 9IMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=k5RbIx4W; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w21si6777804ejj.377.2020.10.26.01.40.06; Mon, 26 Oct 2020 01:40:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@mg.codeaurora.org header.s=smtp header.b=k5RbIx4W; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1736792AbgJZHCn (ORCPT + 99 others); Mon, 26 Oct 2020 03:02:43 -0400 Received: from z5.mailgun.us ([104.130.96.5]:62511 "EHLO z5.mailgun.us" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1736786AbgJZHCn (ORCPT ); Mon, 26 Oct 2020 03:02:43 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1603695762; h=Message-ID: References: In-Reply-To: Subject: Cc: To: From: Date: Content-Transfer-Encoding: Content-Type: MIME-Version: Sender; bh=4W30NrG0crD/eXRgkUetS2eftLP50C0CS9VL2EWCFO0=; b=k5RbIx4Wazvu/uYrWU2VB3XjwCrLQ2rVJ7Cm/itDZCiKHiqQAUlnTLI4uW7r3nFLNPabCvlN mjxNixqPZM9hgs7YpHCMnIEkMWMo3e4Q764U+SLsxAiHHrlyiF+z0vNxPIJlzQfzIx62JxIR Gqz5TX2WZ69iLjfDjBv/OUXxRO0= X-Mailgun-Sending-Ip: 104.130.96.5 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by smtp-out-n05.prod.us-east-1.postgun.com with SMTP id 5f96745babdbaddfebb337fd (version=TLS1.2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256); Mon, 26 Oct 2020 07:01:47 GMT Sender: cang=codeaurora.org@mg.codeaurora.org Received: by smtp.codeaurora.org (Postfix, from userid 1001) id B14C2C433FF; Mon, 26 Oct 2020 07:01:46 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=ALL_TRUSTED,BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.codeaurora.org (localhost.localdomain [127.0.0.1]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) (Authenticated sender: cang) by smtp.codeaurora.org (Postfix) with ESMTPSA id E6EDCC433F0; Mon, 26 Oct 2020 07:01:45 +0000 (UTC) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit Date: Mon, 26 Oct 2020 15:01:45 +0800 From: Can Guo To: Avri Altman Cc: asutoshd@codeaurora.org, nguyenb@codeaurora.org, hongwus@codeaurora.org, rnayak@codeaurora.org, linux-scsi@vger.kernel.org, kernel-team@android.com, saravanak@google.com, salyzyn@google.com, Alim Akhtar , "James E.J. Bottomley" , "Martin K. Petersen" , Stanley Chu , Bean Huo , Bart Van Assche , open list Subject: Re: [PATCH v2 1/1] scsi: ufs: Fix unexpected values get from ufshcd_read_desc_param() In-Reply-To: References: <1603346348-14149-1-git-send-email-cang@codeaurora.org> <5271e570f2e38770da3b23f13e739e41@codeaurora.org> Message-ID: <28555cab045fb631c91262c77b71d9fc@codeaurora.org> X-Sender: cang@codeaurora.org User-Agent: Roundcube Webmail/1.3.9 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020-10-26 13:22, Avri Altman wrote: >> On 2020-10-22 14:37, Avri Altman wrote: >> >> Since WB feature has been added, WB related sysfs entries can be >> >> accessed >> >> even when an UFS device does not support WB feature. In that case, the >> >> descriptors which are not supported by the UFS device may be wrongly >> >> reported when they are accessed from their corrsponding sysfs entries. >> >> Fix it by adding a sanity check of parameter offset against the actual >> >> decriptor length.s >> > This should be a bug fix IMO, and be dealt with similarly like >> > ufshcd_is_wb_attrs or ufshcd_is_wb_flag. >> > Thanks, >> > Avri >> >> Could you please elaborate on ufshcd_is_wb_attrs or ufshcd_is_wb_flag? >> Sorry that I don't quite get it. > Since this change is only protecting illegal access from sysfs entries, > I am suggesting to handle it there, just like ufshcd_is_wb_attrs or > ufshcd_is_wb_flag > Are doing it for flags and attributes. > > Thanks, > Avri This is a general problem - if later we have HPB entries added into sysfs, we will hit it again. We cannot keep adding checks like ufshcd_is_xxx_attrs or ufshcd_is_xxx_flag to block them, right? Thanks, Can Guo.