From: Dave Jiang <dave.jiang@intel.com>
To: Dan Williams <dan.j.williams@intel.com>, <linux-cxl@vger.kernel.org>
Cc: Davidlohr Bueso <dave@stgolabs.net>
Subject: Re: [PATCH v3 07/10] cxl/memdev: Fix sanitize vs decoder setup locking
Date: Fri, 13 Oct 2023 10:20:16 -0700 [thread overview]
Message-ID: <5c65ec8f-0cf5-4b6c-b647-2b4e44512472@intel.com> (raw)
In-Reply-To: <169657719974.1491153.15276451196916291864.stgit@dwillia2-xfh.jf.intel.com>
On 10/6/23 00:26, Dan Williams wrote:
> The sanitize operation is destructive and the expectation is that the
> device is unmapped while in progress. The current implementation does a
> lockless check for decoders being active, but then does nothing to
> prevent decoders from racing to be committed. Introduce state tracking
> to resolve this race.
>
> This incidentally cleans up unpriveleged userspace from triggering mmio
s/unpriveleged/unprivileged/
> read cycles by spinning on reading the 'securiry/state' attribute. Which
> at a minimum is a waste since the kernel state machine can cache the
> completion result.
>
> Lastly cxl_mem_sanitize() was mistakenly marked EXPORT_SYMBOL() in the
> original implementation, but an export was never required.
>
> Fixes: 0c36b6ad436a ("cxl/mbox: Add sanitization handling machinery")
> Cc: Davidlohr Bueso <dave@stgolabs.net>
> Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Reviewed-by: Dave Jiang <dave.jiang@intel.com>
> ---
> drivers/cxl/core/core.h | 1 +
> drivers/cxl/core/hdm.c | 19 ++++++++++++++++
> drivers/cxl/core/mbox.c | 55 +++++++++++++++++++++++++++++++++------------
> drivers/cxl/core/memdev.c | 43 +++++++++++++----------------------
> drivers/cxl/core/port.c | 6 +++++
> drivers/cxl/core/region.c | 6 -----
> drivers/cxl/cxlmem.h | 4 ++-
> drivers/cxl/pci.c | 5 ++++
> 8 files changed, 90 insertions(+), 49 deletions(-)
>
> diff --git a/drivers/cxl/core/core.h b/drivers/cxl/core/core.h
> index 45e7e044cf4a..8e5f3d84311e 100644
> --- a/drivers/cxl/core/core.h
> +++ b/drivers/cxl/core/core.h
> @@ -75,6 +75,7 @@ resource_size_t __rcrb_to_component(struct device *dev,
> enum cxl_rcrb which);
>
> extern struct rw_semaphore cxl_dpa_rwsem;
> +extern struct rw_semaphore cxl_region_rwsem;
>
> int cxl_memdev_init(void);
> void cxl_memdev_exit(void);
> diff --git a/drivers/cxl/core/hdm.c b/drivers/cxl/core/hdm.c
> index 4449b34a80cc..506c9e14cdf9 100644
> --- a/drivers/cxl/core/hdm.c
> +++ b/drivers/cxl/core/hdm.c
> @@ -650,6 +650,25 @@ static int cxl_decoder_commit(struct cxl_decoder *cxld)
> return -EBUSY;
> }
>
> + /*
> + * For endpoint decoders hosted on CXL memory devices that
> + * support the sanitize operation, make sure sanitize is not in-flight.
> + */
> + if (is_endpoint_decoder(&cxld->dev)) {
> + struct cxl_endpoint_decoder *cxled =
> + to_cxl_endpoint_decoder(&cxld->dev);
> + struct cxl_memdev *cxlmd = cxled_to_memdev(cxled);
> + struct cxl_memdev_state *mds =
> + to_cxl_memdev_state(cxlmd->cxlds);
> +
> + if (mds && mds->security.sanitize_active) {
> + dev_dbg(&cxlmd->dev,
> + "attempted to commit %s during sanitize\n",
> + dev_name(&cxld->dev));
> + return -EBUSY;
> + }
> + }
> +
> down_read(&cxl_dpa_rwsem);
> /* common decoder settings */
> ctrl = readl(hdm + CXL_HDM_DECODER0_CTRL_OFFSET(cxld->id));
> diff --git a/drivers/cxl/core/mbox.c b/drivers/cxl/core/mbox.c
> index 4df4f614f490..67aec57cc12f 100644
> --- a/drivers/cxl/core/mbox.c
> +++ b/drivers/cxl/core/mbox.c
> @@ -1125,20 +1125,7 @@ int cxl_dev_state_identify(struct cxl_memdev_state *mds)
> }
> EXPORT_SYMBOL_NS_GPL(cxl_dev_state_identify, CXL);
>
> -/**
> - * cxl_mem_sanitize() - Send a sanitization command to the device.
> - * @mds: The device data for the operation
> - * @cmd: The specific sanitization command opcode
> - *
> - * Return: 0 if the command was executed successfully, regardless of
> - * whether or not the actual security operation is done in the background,
> - * such as for the Sanitize case.
> - * Error return values can be the result of the mailbox command, -EINVAL
> - * when security requirements are not met or invalid contexts.
> - *
> - * See CXL 3.0 @8.2.9.8.5.1 Sanitize and @8.2.9.8.5.2 Secure Erase.
> - */
> -int cxl_mem_sanitize(struct cxl_memdev_state *mds, u16 cmd)
> +static int __cxl_mem_sanitize(struct cxl_memdev_state *mds, u16 cmd)
> {
> int rc;
> u32 sec_out = 0;
> @@ -1183,7 +1170,45 @@ int cxl_mem_sanitize(struct cxl_memdev_state *mds, u16 cmd)
>
> return 0;
> }
> -EXPORT_SYMBOL_NS_GPL(cxl_mem_sanitize, CXL);
> +
> +
> +/**
> + * cxl_mem_sanitize() - Send a sanitization command to the device.
> + * @mds: The device for the operation
> + * @cmd: The specific sanitization command opcode
> + *
> + * Return: 0 if the command was executed successfully, regardless of
> + * whether or not the actual security operation is done in the background,
> + * such as for the Sanitize case.
> + * Error return values can be the result of the mailbox command, -EINVAL
> + * when security requirements are not met or invalid contexts, or -EBUSY
> + * if the sanitize operation is already in flight.
> + *
> + * See CXL 3.0 @8.2.9.8.5.1 Sanitize and @8.2.9.8.5.2 Secure Erase.
> + */
> +int cxl_mem_sanitize(struct cxl_memdev *cxlmd, u16 cmd)
> +{
> + struct cxl_memdev_state *mds = to_cxl_memdev_state(cxlmd->cxlds);
> + struct cxl_port *endpoint;
> + int rc;
> +
> + /* synchronize with cxl_mem_probe() and decoder write operations */
> + device_lock(&cxlmd->dev);
> + endpoint = cxlmd->endpoint;
> + down_read(&cxl_region_rwsem);
> + /*
> + * Require an endpoint to be safe otherwise the driver can not
> + * be sure that the device is unmapped.
> + */
> + if (endpoint && endpoint->commit_end == -1)
> + rc = __cxl_mem_sanitize(mds, cmd);
> + else
> + rc = -EBUSY;
> + up_read(&cxl_region_rwsem);
> + device_unlock(&cxlmd->dev);
> +
> + return rc;
> +}
>
> static int add_dpa_res(struct device *dev, struct resource *parent,
> struct resource *res, resource_size_t start,
> diff --git a/drivers/cxl/core/memdev.c b/drivers/cxl/core/memdev.c
> index 4c2e24a1a89c..a02061028b71 100644
> --- a/drivers/cxl/core/memdev.c
> +++ b/drivers/cxl/core/memdev.c
> @@ -125,13 +125,16 @@ static ssize_t security_state_show(struct device *dev,
> struct cxl_memdev *cxlmd = to_cxl_memdev(dev);
> struct cxl_dev_state *cxlds = cxlmd->cxlds;
> struct cxl_memdev_state *mds = to_cxl_memdev_state(cxlds);
> - u64 reg = readq(cxlds->regs.mbox + CXLDEV_MBOX_BG_CMD_STATUS_OFFSET);
> - u32 pct = FIELD_GET(CXLDEV_MBOX_BG_CMD_COMMAND_PCT_MASK, reg);
> - u16 cmd = FIELD_GET(CXLDEV_MBOX_BG_CMD_COMMAND_OPCODE_MASK, reg);
> unsigned long state = mds->security.state;
> + int rc = 0;
>
> - if (cmd == CXL_MBOX_OP_SANITIZE && pct != 100)
> - return sysfs_emit(buf, "sanitize\n");
> + /* sync with latest submission state */
> + mutex_lock(&mds->mbox_mutex);
> + if (mds->security.sanitize_active)
> + rc = sysfs_emit(buf, "sanitize\n");
> + mutex_unlock(&mds->mbox_mutex);
> + if (rc)
> + return rc;
>
> if (!(state & CXL_PMEM_SEC_STATE_USER_PASS_SET))
> return sysfs_emit(buf, "disabled\n");
> @@ -152,24 +155,17 @@ static ssize_t security_sanitize_store(struct device *dev,
> const char *buf, size_t len)
> {
> struct cxl_memdev *cxlmd = to_cxl_memdev(dev);
> - struct cxl_memdev_state *mds = to_cxl_memdev_state(cxlmd->cxlds);
> - struct cxl_port *port = cxlmd->endpoint;
> bool sanitize;
> ssize_t rc;
>
> if (kstrtobool(buf, &sanitize) || !sanitize)
> return -EINVAL;
>
> - if (!port || !is_cxl_endpoint(port))
> - return -EINVAL;
> -
> - /* ensure no regions are mapped to this memdev */
> - if (port->commit_end != -1)
> - return -EBUSY;
> -
> - rc = cxl_mem_sanitize(mds, CXL_MBOX_OP_SANITIZE);
> + rc = cxl_mem_sanitize(cxlmd, CXL_MBOX_OP_SANITIZE);
> + if (rc)
> + return rc;
>
> - return rc ? rc : len;
> + return len;
> }
> static struct device_attribute dev_attr_security_sanitize =
> __ATTR(sanitize, 0200, NULL, security_sanitize_store);
> @@ -179,24 +175,17 @@ static ssize_t security_erase_store(struct device *dev,
> const char *buf, size_t len)
> {
> struct cxl_memdev *cxlmd = to_cxl_memdev(dev);
> - struct cxl_memdev_state *mds = to_cxl_memdev_state(cxlmd->cxlds);
> - struct cxl_port *port = cxlmd->endpoint;
> ssize_t rc;
> bool erase;
>
> if (kstrtobool(buf, &erase) || !erase)
> return -EINVAL;
>
> - if (!port || !is_cxl_endpoint(port))
> - return -EINVAL;
> -
> - /* ensure no regions are mapped to this memdev */
> - if (port->commit_end != -1)
> - return -EBUSY;
> -
> - rc = cxl_mem_sanitize(mds, CXL_MBOX_OP_SECURE_ERASE);
> + rc = cxl_mem_sanitize(cxlmd, CXL_MBOX_OP_SECURE_ERASE);
> + if (rc)
> + return rc;
>
> - return rc ? rc : len;
> + return len;
> }
> static struct device_attribute dev_attr_security_erase =
> __ATTR(erase, 0200, NULL, security_erase_store);
> diff --git a/drivers/cxl/core/port.c b/drivers/cxl/core/port.c
> index 7ca01a834e18..5ba606c6e03f 100644
> --- a/drivers/cxl/core/port.c
> +++ b/drivers/cxl/core/port.c
> @@ -28,6 +28,12 @@
> * instantiated by the core.
> */
>
> +/*
> + * All changes to the interleave configuration occur with this lock held
> + * for write.
> + */
> +DECLARE_RWSEM(cxl_region_rwsem);
> +
> static DEFINE_IDA(cxl_port_ida);
> static DEFINE_XARRAY(cxl_root_buses);
>
> diff --git a/drivers/cxl/core/region.c b/drivers/cxl/core/region.c
> index 6d63b8798c29..d74bf1b664b6 100644
> --- a/drivers/cxl/core/region.c
> +++ b/drivers/cxl/core/region.c
> @@ -28,12 +28,6 @@
> * 3. Decoder targets
> */
>
> -/*
> - * All changes to the interleave configuration occur with this lock held
> - * for write.
> - */
> -static DECLARE_RWSEM(cxl_region_rwsem);
> -
> static struct cxl_region *to_cxl_region(struct device *dev);
>
> static ssize_t uuid_show(struct device *dev, struct device_attribute *attr,
> diff --git a/drivers/cxl/cxlmem.h b/drivers/cxl/cxlmem.h
> index fbdee1d63717..6933bc20e76b 100644
> --- a/drivers/cxl/cxlmem.h
> +++ b/drivers/cxl/cxlmem.h
> @@ -364,6 +364,7 @@ struct cxl_fw_state {
> * @state: state of last security operation
> * @enabled_cmds: All security commands enabled in the CEL
> * @poll_tmo_secs: polling timeout
> + * @sanitize_active: sanitize completion pending
> * @poll_dwork: polling work item
> * @sanitize_node: sanitation sysfs file to notify
> */
> @@ -371,6 +372,7 @@ struct cxl_security_state {
> unsigned long state;
> DECLARE_BITMAP(enabled_cmds, CXL_SEC_ENABLED_MAX);
> int poll_tmo_secs;
> + bool sanitize_active;
> struct delayed_work poll_dwork;
> struct kernfs_node *sanitize_node;
> };
> @@ -884,7 +886,7 @@ static inline void cxl_mem_active_dec(void)
> }
> #endif
>
> -int cxl_mem_sanitize(struct cxl_memdev_state *mds, u16 cmd);
> +int cxl_mem_sanitize(struct cxl_memdev *cxlmd, u16 cmd);
>
> struct cxl_hdm {
> struct cxl_component_regs regs;
> diff --git a/drivers/cxl/pci.c b/drivers/cxl/pci.c
> index 9955871e9ec1..06fafe59c054 100644
> --- a/drivers/cxl/pci.c
> +++ b/drivers/cxl/pci.c
> @@ -154,6 +154,7 @@ static void cxl_mbox_sanitize_work(struct work_struct *work)
> mds->security.poll_tmo_secs = 0;
> if (mds->security.sanitize_node)
> sysfs_notify_dirent(mds->security.sanitize_node);
> + mds->security.sanitize_active = false;
>
> dev_dbg(cxlds->dev, "Sanitization operation ended\n");
> } else {
> @@ -292,9 +293,13 @@ static int __cxl_pci_mbox_send_cmd(struct cxl_memdev_state *mds,
> * and allow userspace to poll(2) for completion.
> */
> if (mbox_cmd->opcode == CXL_MBOX_OP_SANITIZE) {
> + if (mds->security.sanitize_active)
> + return -EBUSY;
> +
> /* give first timeout a second */
> timeout = 1;
> mds->security.poll_tmo_secs = timeout;
> + mds->security.sanitize_active = true;
> schedule_delayed_work(&mds->security.poll_dwork,
> timeout * HZ);
> dev_dbg(dev, "Sanitization operation started\n");
>
>
next prev parent reply other threads:[~2023-10-13 17:20 UTC|newest]
Thread overview: 40+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-10-06 7:25 [PATCH v3 00/10] cxl/mem: Fix shutdown order Dan Williams
2023-10-06 7:26 ` [PATCH v3 01/10] cxl/pci: Remove unnecessary device reference management in sanitize work Dan Williams
2023-10-06 7:26 ` [PATCH v3 02/10] cxl/pci: Cleanup 'sanitize' to always poll Dan Williams
2023-10-09 17:19 ` Davidlohr Bueso
2023-10-09 18:39 ` Dan Williams
2023-10-09 20:48 ` Davidlohr Bueso
2023-10-06 7:26 ` [PATCH v3 03/10] cxl/pci: Remove hardirq handler for cxl_request_irq() Dan Williams
2023-10-06 22:06 ` Davidlohr Bueso
2023-10-09 3:29 ` Ira Weiny
2023-10-09 16:36 ` Jonathan Cameron
2023-10-13 16:59 ` Dave Jiang
2023-10-06 7:26 ` [PATCH v3 04/10] cxl/pci: Remove inconsistent usage of dev_err_probe() Dan Williams
2023-10-06 22:10 ` Davidlohr Bueso
2023-10-09 3:42 ` Ira Weiny
2023-10-09 16:38 ` Jonathan Cameron
2023-10-13 17:09 ` Dave Jiang
2023-10-06 7:26 ` [PATCH v3 05/10] cxl/pci: Clarify devm host for memdev relative setup Dan Williams
2023-10-09 3:50 ` Ira Weiny
2023-10-09 16:41 ` Jonathan Cameron
2023-10-13 17:12 ` Dave Jiang
2023-10-06 7:26 ` [PATCH v3 06/10] cxl/pci: Fix sanitize notifier setup Dan Williams
2023-10-09 16:42 ` Jonathan Cameron
2023-10-09 18:08 ` Davidlohr Bueso
2023-10-06 7:26 ` [PATCH v3 07/10] cxl/memdev: Fix sanitize vs decoder setup locking Dan Williams
2023-10-06 10:10 ` kernel test robot
2023-10-09 4:17 ` Ira Weiny
2023-10-09 18:18 ` Dan Williams
2023-10-09 22:32 ` Dan Williams
2023-10-09 16:46 ` Jonathan Cameron
2023-10-09 18:36 ` Dan Williams
2023-10-11 20:44 ` Jonathan Cameron
2023-10-10 20:21 ` Davidlohr Bueso
2023-10-13 17:20 ` Dave Jiang [this message]
2023-10-06 7:26 ` [PATCH v3 08/10] cxl/mem: Fix shutdown order Dan Williams
2023-10-06 7:26 ` [PATCH v3 09/10] tools/testing/cxl: Make cxl_memdev_state available to other command emulation Dan Williams
2023-10-09 3:24 ` Ira Weiny
2023-10-13 17:21 ` Dave Jiang
2023-10-06 7:26 ` [PATCH v3 10/10] tools/testing/cxl: Add 'sanitize notifier' support Dan Williams
2023-10-09 4:25 ` Ira Weiny
2023-10-13 17:25 ` Dave Jiang
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5c65ec8f-0cf5-4b6c-b647-2b4e44512472@intel.com \
--to=dave.jiang@intel.com \
--cc=dan.j.williams@intel.com \
--cc=dave@stgolabs.net \
--cc=linux-cxl@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox