Received: by 2002:a05:6a10:2785:0:0:0:0 with SMTP id ia5csp3411581pxb; Tue, 12 Jan 2021 14:06:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJyUfNGQuToOoNPIaug+t5QNkA6ZG+81wUCflopyCZWifNoc6Tp9RjP6tv03zWn0vPi+731g X-Received: by 2002:a05:6402:5193:: with SMTP id q19mr1022757edd.264.1610489180651; Tue, 12 Jan 2021 14:06:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610489180; cv=none; d=google.com; s=arc-20160816; b=MVPlfA8fidr4zQh9nnJJfsiWgE29l79hcZRPBfyQG2GnfUjPUBnJbOngoH/qEm+xKX wrCu67Wlaoz6NF/xdjEeRvPpWOW9XUpdoK9/AebX8pBIiUVTvUEQewIKlDv+HkC0lNOI vyRm7NMAFnsGeJC2+UPT/dEMUHYiCj7y2sLUqAm7ooHce3h08KMlZANPp1AFGGfCWEUy vSaK/f6pU9A6V4Pd123RmYFmXuvgTUDvGMls89JWUioBQCG+FcjGOgsIuJhH4YkictnP Rx+9u12U3LgF9YfdVGX7WkDqZTj53SPNRSV2MXx5sA3OeHEDMQ75gQ0IJXAcC4WjWTRS nlrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=Ajj9tX2IbXq9CnVJZlsVfXEalkkVT2qiO2s41QE/XIQ=; b=kBa2uUVWphjgqpIcx4i/n8kkFH0iHo/tHzR5WYjbZP/2dfI7bzW3OQ3j2aP9WRy9rf hdAdFoDW1gfpFf2MDMTTwpBuYxeD1Vbj7zbbco4hi2RsIR5kGaMD+boBWSH8DsTe6kl8 ZY+sApaDadJdnL/+hQTCgc5z7xhM3/fIhn672RFKV2OW3GdyyEJvBeAqH+McMuODkHQ3 oiNrmz/fiAaKOAOqq/whvBtj9dAu5hRClzOSkpT5zKTkbbs8K23GR0O6Rx4G173WbXA6 5uS1yJ/w6Aq+ZaDgle6Tca6bxOMmXqzVpBjzcX1lgFr8UJT9Do+I49KOPeH5PtQMh/Ek Vdug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r11si25396edt.118.2021.01.12.14.05.56; Tue, 12 Jan 2021 14:06:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404307AbhALAYp (ORCPT + 99 others); Mon, 11 Jan 2021 19:24:45 -0500 Received: from mga17.intel.com ([192.55.52.151]:11217 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390823AbhAKWxO (ORCPT ); Mon, 11 Jan 2021 17:53:14 -0500 IronPort-SDR: QQd7VrHP79wBsjMC4iLPmK6PKq/00uP+dr7RMyoP9/3krLnl/so28w067ZxZPUrADjOXXtde/4 Zj6RFejUXYVw== X-IronPort-AV: E=McAfee;i="6000,8403,9861"; a="157726551" X-IronPort-AV: E=Sophos;i="5.79,339,1602572400"; d="scan'208";a="157726551" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jan 2021 14:51:42 -0800 IronPort-SDR: 9vT7xNVlp66s3vmTTHdPG0OuUd7Rp2ye6lDOGC1tN90knAjPBYCiE2JllOTYjWw9EddnHmgeKP +1IhX0SVjdNw== X-IronPort-AV: E=Sophos;i="5.79,339,1602572400"; d="scan'208";a="352778043" Received: from yyang31-mobl.amr.corp.intel.com (HELO bwidawsk-mobl5.local) ([10.252.142.71]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jan 2021 14:51:41 -0800 From: Ben Widawsky To: linux-cxl@vger.kernel.org Cc: Ben Widawsky , linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, "linux-acpi@vger.kernel.org, Ira Weiny" , Dan Williams , Vishal Verma , "Kelley, Sean V" , Rafael Wysocki , Bjorn Helgaas , Jonathan Cameron , Jon Masters , Chris Browy , Randy Dunlap , Christoph Hellwig , daniel.lll@alibaba-inc.com Subject: [RFC PATCH v3 12/16] cxl/mem: Add a "RAW" send command Date: Mon, 11 Jan 2021 14:51:17 -0800 Message-Id: <20210111225121.820014-14-ben.widawsky@intel.com> X-Mailer: git-send-email 2.30.0 In-Reply-To: <20210111225121.820014-1-ben.widawsky@intel.com> References: <20210111225121.820014-1-ben.widawsky@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The CXL memory device send interface will have a number of supported commands. The raw command is not such a command. Raw commands allow userspace to send a specified opcode to the underlying hardware and bypass all driver checks on the command. This is useful for a couple of usecases, mainly: 1. Undocumented vendor specific hardware commands 2. Prototyping new hardware commands not yet supported by the driver While this all sounds very powerful it comes with a couple of caveats: 1. Bug reports using raw commands will not get the same level of attention as bug reports using supported commands (via taint). 2. Supported commands will be rejected by the RAW command. Signed-off-by: Ben Widawsky --- drivers/cxl/mem.c | 27 +++++++++++++++++++++++++++ include/uapi/linux/cxl_mem.h | 12 +++++++++++- 2 files changed, 38 insertions(+), 1 deletion(-) diff --git a/drivers/cxl/mem.c b/drivers/cxl/mem.c index f979788b4d9f..a824cfd4342a 100644 --- a/drivers/cxl/mem.c +++ b/drivers/cxl/mem.c @@ -43,6 +43,7 @@ enum opcode { CXL_MBOX_OP_INVALID = 0x0000, +#define CXL_MBOX_OP_RAW CXL_MBOX_OP_INVALID CXL_MBOX_OP_IDENTIFY = 0x4000, CXL_MBOX_OP_MAX = 0x10000 }; @@ -139,6 +140,7 @@ struct cxl_mem_command { static struct cxl_mem_command mem_commands[] = { CXL_CMD(INVALID, KERNEL, 0, 0, HIDDEN), CXL_CMD(IDENTIFY, NONE, 0, 0x43, MANDATORY), + CXL_CMD(RAW, NONE, ~0, ~0, MANDATORY), }; #define cxl_for_each_cmd(cmd) \ @@ -520,6 +522,9 @@ static int handle_mailbox_cmd_from_user(struct cxl_memdev *cxlmd, command_names[cmd->info.id].name, mbox_cmd.opcode, cmd->info.size_in); + if (cmd->info.id == CXL_MEM_COMMAND_ID_RAW) + add_taint(TAINT_RAW_PASSTHROUGH, LOCKDEP_STILL_OK); + rc = cxl_mem_mbox_send_cmd(cxlmd->cxlm, &mbox_cmd); cxl_mem_mbox_put(cxlmd->cxlm); if (rc) @@ -581,6 +586,28 @@ static int cxl_validate_cmd_from_user(struct cxl_mem *cxlm, if (send_cmd->size_in > cxlm->mbox.payload_size) return -EINVAL; + /* Checks are bypassed for raw commands but along comes the taint! */ + if (send_cmd->id == CXL_MEM_COMMAND_ID_RAW) { + const struct cxl_mem_command temp = { + { + .id = CXL_MEM_COMMAND_ID_RAW, + .flags = CXL_MEM_COMMAND_FLAG_NONE, + .size_in = send_cmd->size_in, + .size_out = send_cmd->size_out, + }, + .flags = 0, + .opcode = send_cmd->raw.opcode + }; + + if (send_cmd->raw.rsvd) + return -EINVAL; + + if (cxl_mem_find_command(send_cmd->raw.opcode)) + return -EPERM; + + return PTR_ERR_OR_ZERO(memcpy(out_cmd, &temp, sizeof(temp))); + } + if (send_cmd->flags & CXL_MEM_COMMAND_FLAG_MASK) return -EINVAL; diff --git a/include/uapi/linux/cxl_mem.h b/include/uapi/linux/cxl_mem.h index cb4e2bee5228..50acd6cc14d4 100644 --- a/include/uapi/linux/cxl_mem.h +++ b/include/uapi/linux/cxl_mem.h @@ -32,6 +32,7 @@ extern "C" { #define CMDS \ C(INVALID, "Invalid Command"), \ C(IDENTIFY, "Identify Command"), \ + C(RAW, "Raw device command"), \ C(MAX, "Last command") #undef C #define C(a, b) CXL_MEM_COMMAND_ID_##a @@ -117,6 +118,9 @@ struct cxl_mem_query_commands { * @id: The command to send to the memory device. This must be one of the * commands returned by the query command. * @flags: Flags for the command (input). + * @raw: Special fields for raw commands + * @raw.opcode: Opcode passed to hardware when using the RAW command. + * @raw.rsvd: Must be zero. * @rsvd: Must be zero. * @retval: Return value from the memory device (output). * @size_in: Size of the payload to provide to the device (input). @@ -135,7 +139,13 @@ struct cxl_mem_query_commands { struct cxl_send_command { __u32 id; __u32 flags; - __u32 rsvd; + union { + struct { + __u16 opcode; + __u16 rsvd; + } raw; + __u32 rsvd; + }; __u32 retval; struct { -- 2.30.0