Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp6197168pxb; Tue, 16 Feb 2021 20:19:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJzngkhFVF1YAqnAe2tyjnC3Cwg2ZKQrmflAHTGh3uXt4AAIdGcTQDXlOwL/JOGCfAnWF8/v X-Received: by 2002:a17:906:2651:: with SMTP id i17mr10151593ejc.312.1613535559891; Tue, 16 Feb 2021 20:19:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613535559; cv=none; d=google.com; s=arc-20160816; b=aVGzV72lUjt+uPxuvVk+SP0BiGrHdw+iWuMD3LOVZAhjoAZvh8cAVbr0gXILSD48HK YWjOEuGCyV3qF1lqA9SV1oeda2JRf14wn2BXdqrwJh6CHXHq/UAMDB0HmaxNnGGupY1O 0dmSw2FvY4t2OMR5H4TtEca1uFlvAKNwfsv3fC/f4m0DEaiaeh8cdJBEqDdL6kRnfrNX aFYTY+DM1+qOGgbXuK5oCHrnjdHhDtM48Paw/p/X+0/4/bfD5pDxUgz1ZHMNzcMJ8xnF e5rgQxWXTqCLbcQvn2IjAXgvBS9HuTEUC1TcORKv+M/AXKYHrc7gdldLl6hHg7wBbOhY JSww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=Fnftqw0uXWH2XXZXdaY6PX62oZQMTGyZO2Hv+r3K5Oo=; b=Fa4Yqg7V5P/Cg3gJRuVxyEeSjVxgpqYtSDh2ysrx8J1iOnkA38Vf5KYzlEhdknfL0Y 4IlmHgcNwvdXrO4JAAkvZrYVjV3aGzysTeAMpPNS4nNctgdjAFS2QK6I5MZs2zeJBPF5 Uo9yRefhCLU0TG4pREcIZG2I2keEN8sON9MHA8X4EJhtqiIDr8CJxMCWmWsJmgDRcfxq Mpwgg2hXDTXSo4qv9EN1f1NiQAa1hmuVxtd96AdiS1gmloPaXDJ1/4nvSGbKe32hZ0qC JmbKveJfLYLU4m4JE5u4znEtHuCHZrQGvSXb5eFbeTPsjTmKyamOBzb2Ow+Vs5hCw5C2 4BJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s12si473867edw.252.2021.02.16.20.18.56; Tue, 16 Feb 2021 20:19:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231510AbhBQEO6 (ORCPT + 99 others); Tue, 16 Feb 2021 23:14:58 -0500 Received: from mga07.intel.com ([134.134.136.100]:21743 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231346AbhBQELr (ORCPT ); Tue, 16 Feb 2021 23:11:47 -0500 IronPort-SDR: GspS+H6jCKCprRbqT4PcDuYa9z98YqP6+cBY6mEKF7Pmw2Yq1/p7wmnnzzWWasIvoeXtBe/7AT a0B8B+Lsli0w== X-IronPort-AV: E=McAfee;i="6000,8403,9897"; a="247165948" X-IronPort-AV: E=Sophos;i="5.81,184,1610438400"; d="scan'208";a="247165948" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Feb 2021 20:10:18 -0800 IronPort-SDR: Mug5PkrodM8Rl1xWiYxq98sDIf0X3SSeMjlZa9yQ7TA5gumGj0U/nmFtBL6W2PpAlt1kXP8boS FlOqJ5QddABA== X-IronPort-AV: E=Sophos;i="5.81,184,1610438400"; d="scan'208";a="384948885" Received: from yxie-mobl.amr.corp.intel.com (HELO bwidawsk-mobl5.local) ([10.252.134.141]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Feb 2021 20:10:16 -0800 From: Ben Widawsky To: linux-cxl@vger.kernel.org Cc: Ben Widawsky , linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org, linux-pci@vger.kernel.org, Bjorn Helgaas , Chris Browy , Christoph Hellwig , Dan Williams , David Hildenbrand , David Rientjes , Ira Weiny , Jon Masters , Jonathan Cameron , Rafael Wysocki , Randy Dunlap , Vishal Verma , "John Groves (jgroves)" , "Kelley, Sean V" Subject: [RFC PATCH v5 9/9] cxl/mem: Add payload dumping for debug Date: Tue, 16 Feb 2021 20:09:58 -0800 Message-Id: <20210217040958.1354670-10-ben.widawsky@intel.com> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210217040958.1354670-1-ben.widawsky@intel.com> References: <20210217040958.1354670-1-ben.widawsky@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org It's often useful in debug scenarios to see what the hardware has dumped out. As it stands today, any device error will result in the payload not being copied out, so there is no way to triage commands which weren't expected to fail (and sometimes the payload may have that information). The functionality is protected by normal kernel security mechanisms as well as a CONFIG option in the CXL driver. This was extracted from the original version of the CXL enabling patch series. Signed-off-by: Ben Widawsky --- drivers/cxl/Kconfig | 13 +++++++++++++ drivers/cxl/mem.c | 8 ++++++++ 2 files changed, 21 insertions(+) diff --git a/drivers/cxl/Kconfig b/drivers/cxl/Kconfig index 97dc4d751651..3eec9276e586 100644 --- a/drivers/cxl/Kconfig +++ b/drivers/cxl/Kconfig @@ -50,4 +50,17 @@ config CXL_MEM_RAW_COMMANDS potential impact to memory currently in use by the kernel. If developing CXL hardware or the driver say Y, otherwise say N. + +config CXL_MEM_INSECURE_DEBUG + bool "CXL.mem debugging" + depends on CXL_MEM + help + Enable debug of all CXL command payloads. + + Some CXL devices and controllers support encryption and other + security features. The payloads for the commands that enable + those features may contain sensitive clear-text security + material. Disable debug of those command payloads by default. + If you are a kernel developer actively working on CXL + security enabling say Y, otherwise say N. endif diff --git a/drivers/cxl/mem.c b/drivers/cxl/mem.c index 6d7d3870b5da..d63c8eaf23c7 100644 --- a/drivers/cxl/mem.c +++ b/drivers/cxl/mem.c @@ -346,6 +346,14 @@ static int __cxl_mem_mbox_send_cmd(struct cxl_mem *cxlm, /* #5 */ rc = cxl_mem_wait_for_doorbell(cxlm); + + if (!cxl_is_security_command(mbox_cmd->opcode) || + IS_ENABLED(CONFIG_CXL_MEM_INSECURE_DEBUG)) { + print_hex_dump_debug("Payload ", DUMP_PREFIX_OFFSET, 16, 1, + mbox_cmd->payload_in, mbox_cmd->size_in, + true); + } + if (rc == -ETIMEDOUT) { cxl_mem_mbox_timeout(cxlm, mbox_cmd); return rc; -- 2.30.1