Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp3888692rdb; Mon, 11 Dec 2023 03:07:14 -0800 (PST) X-Google-Smtp-Source: AGHT+IFQHFpIyxcpw8wMF4GOYVgMr+BeFpmY/ZHMJeJdvw/yKmJkWCeojj8J4PwonYfqa/aKT4eT X-Received: by 2002:a17:90b:b93:b0:286:9e2f:475c with SMTP id bd19-20020a17090b0b9300b002869e2f475cmr3105521pjb.47.1702292834237; Mon, 11 Dec 2023 03:07:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702292834; cv=none; d=google.com; s=arc-20160816; b=V847rByzh8mNgTi4xlTS+NVdGNpCKtvpDM/uIDKmb6rjr/Sg+swZK09qNKPrK4PGhb yojWfuvi9ZxJsjvjO0BCcqRAk/xz9kX1dXEJhWWcu67ce16OZAsa1OQHGm8mHAX/I9dD 5cYOjAiD5w4efA8D+rWE1OWmyIO6AwnUD/Abgx2JrcKcPPZ2xEid7D0ZaRyvVn1A5TUi /sp20Vc1qB3OSrd5k7oPjWUmR02EcRyzgjOTDuUlHR6wLnrRolUCqjI9gyd37fNC4NI+ q5aChqNV34OuP+RXZfz+n9a9Z1GtAubneZNXXWj+GX7H+KaHMQJqDTj8+uMN0d5jcv8P Z4hQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:date:from:dkim-signature; bh=gpZFgq2JQT00AFccAFHOw7lcf0YTqiBbVKALZi+RIp0=; fh=7CJ0W97wKwfLCP6lmRwYvyE7MB5tcuNZThpiuw8a9FA=; b=n4plGfWXB3poVu8wIJcYtSZUXrTZx+8Ht/WfaF17RJpLAzVhtkeGZRbK326ge0bilq kBYYbJ46rRxn0SEsGt3NZhr1M1GXgazySMTlOyNU330Qt1vqIPqq+mig+G+slcFDKLm2 +8j99w4d7eosKsI28lqzECqw5woWIXoJSzBWuSL6x5Dr19HgARVw72gNoaaieotbdV4C cA8MVHG0tc4T4bz3k3T9CeE+4u722adzXF/Q30jaY+hYagxNKiXiSPKdTldinYqzKhj5 mAgUI0Caua8hMSUVV+4qYdQyBdr2rTt5l+DpEVInuJFBTYt1jScmcZ1000GFyAUuEsJq REAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@foundries.io header.s=google header.b=YPBgMzy+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=foundries.io Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id h9-20020a17090a054900b0028658c54f6bsi7343247pjf.11.2023.12.11.03.07.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 03:07:14 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@foundries.io header.s=google header.b=YPBgMzy+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=foundries.io Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id A640F807AFC3; Mon, 11 Dec 2023 03:07:09 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234444AbjLKLGv (ORCPT + 99 others); Mon, 11 Dec 2023 06:06:51 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51642 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234509AbjLKLGt (ORCPT ); Mon, 11 Dec 2023 06:06:49 -0500 Received: from mail-wr1-x436.google.com (mail-wr1-x436.google.com [IPv6:2a00:1450:4864:20::436]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7CE6EDB for ; Mon, 11 Dec 2023 03:06:54 -0800 (PST) Received: by mail-wr1-x436.google.com with SMTP id ffacd0b85a97d-3333131e08dso4911935f8f.2 for ; Mon, 11 Dec 2023 03:06:54 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foundries.io; s=google; t=1702292813; x=1702897613; darn=vger.kernel.org; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:date:from:from:to :cc:subject:date:message-id:reply-to; bh=gpZFgq2JQT00AFccAFHOw7lcf0YTqiBbVKALZi+RIp0=; b=YPBgMzy+ipl8Tzp9gdc9U66jaOiqsb0HLCfWVZMvycloY83vGkHkw9ohl1S/CZ3deX oECMrFrnpFE6tq3gwAvOxfEg5sBUpAGEGDkx0YIAVkrUnXDyQ23kJ6Nj7yHx1eNjGHN1 q0/2rSAJmnT9jBoTjwlhXZg3Y7GSrzCOzs2h+UHV544sWJqPGrrP4FUQLSzA3eZKJpep SfMCoetoEeuwgcON3NuobduJmb0nML8kZDQOgrDA2VgtpiHwgX+/Luc12xWVH3g4WAa7 powSFyPS83yw72XcvJaaJCbUe04ZialsYJhAY8+YbZRoLxhYudRDqhZkTwsFLdEGL1W4 mi7Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1702292813; x=1702897613; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:date:from :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=gpZFgq2JQT00AFccAFHOw7lcf0YTqiBbVKALZi+RIp0=; b=Mufbtlc83oW2J+Cq7w/JdOa0gMf4QVz3PMFQBdg7aswil0hKW1UVmCx3EJVStSNymp cSBYLQy/fIq0lKB8vVgtEZv72XWwOXDK3KeC4LGxV6+VM9oWwE6YZX8cykdcsKROXTqP uD86A0HXOMC3J3uxmzXXOh5FYPpPVQKMrT74go65w2JSDFGbfsR9kf05k8cjfwya9+40 ZFKRVeSAg/uhDr3gueMyu0X7+D5I7dC0Frcga6DJPOuLxvbwn5srzwsoB6NMhcOslqav 8Uhzu9qOlFOtKDT8VdGpqQonftzIGSrEYLjOw0c3C7ds3GZwc4+1S4haw9/gjnqcnsCe B5JQ== X-Gm-Message-State: AOJu0Yxkbb7NoWajP+IFyQ+CjMcLCZR6pWcaIEuMI7FaTcTXVbMIWnMV M5sun2QdBUFTUGl77g2afuQB9g== X-Received: by 2002:a7b:cbd4:0:b0:40b:5e4a:4088 with SMTP id n20-20020a7bcbd4000000b0040b5e4a4088mr1965208wmi.168.1702292812851; Mon, 11 Dec 2023 03:06:52 -0800 (PST) Received: from trax (139.red-79-144-198.dynamicip.rima-tde.net. [79.144.198.139]) by smtp.gmail.com with ESMTPSA id w7-20020a5d6807000000b0033334625bdbsm8328819wru.13.2023.12.11.03.06.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 03:06:52 -0800 (PST) From: "Jorge Ramirez-Ortiz, Foundries" X-Google-Original-From: "Jorge Ramirez-Ortiz, Foundries" Date: Mon, 11 Dec 2023 12:06:51 +0100 To: Adrian Hunter Cc: "Jorge Ramirez-Ortiz, Foundries" , Avri Altman , "ulf.hansson@linaro.org" , "christian.loehle@arm.com" , "jinpu.wang@ionos.com" , "axboe@kernel.dk" , "beanhuo@micron.com" , "yibin.ding@unisoc.com" , "victor.shih@genesyslogic.com.tw" , "asuk4.q@gmail.com" , "hkallweit1@gmail.com" , "yangyingliang@huawei.com" , "yebin10@huawei.com" , "linux-mmc@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH] mmc: rpmb: do not force a retune before RPMB switch Message-ID: References: <20231204150111.3320071-1-jorge@foundries.io> <7443a730-411a-4dd3-b911-241356493516@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <7443a730-411a-4dd3-b911-241356493516@intel.com> X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Mon, 11 Dec 2023 03:07:10 -0800 (PST) On 11/12/23 12:25:19, Adrian Hunter wrote: > On 11/12/23 10:00, Jorge Ramirez-Ortiz, Foundries wrote: > > On 06/12/23 11:00:47, Jorge Ramirez-Ortiz, Foundries wrote: > >> On 06/12/23 07:02:43, Avri Altman wrote: > >>>> > >>>> On 4/12/23 17:01, Jorge Ramirez-Ortiz wrote: > >>>>> Requesting a retune before switching to the RPMB partition has been > >>>>> observed to cause CRC errors on the RPMB reads (-EILSEQ). > >>>> > >>>> There are still 2 concerns: > >>>> 1) We don't really know the root cause. Have you determined if here are > >>>> CRC errors in the main partition also? > >> > >> right, and I don't disagree with that. > >> > >> As a test I created a 4GB file from /dev/random which I then copied > >> several times (dd if= ....) > >> > >> root@uz3cg-dwg-sec:/sys/kernel/debug/mmc0# cat err_stats > >> # Command Timeout Occurred: 0 > >> # Command CRC Errors Occurred: 0 > >> # Data Timeout Occurred: 0 > >> # Data CRC Errors Occurred: 0 > >> # Auto-Cmd Error Occurred: 0 > >> # ADMA Error Occurred: 0 > >> # Tuning Error Occurred: 0 > >> # CMDQ RED Errors: 0 > >> # CMDQ GCE Errors: 0 > >> # CMDQ ICCE Errors: 0 > >> # Request Timedout: 0 > >> # CMDQ Request Timedout: 0 > >> # ICE Config Errors: 0 > >> # Controller Timedout errors: 0 > >> # Unexpected IRQ errors: 0 > >> > >> However as soon as I access RPMB and fails (it takes just a few tries) I see: > >> > >> I/TC: RPMB: Using generated key > >> [ 86.902118] sdhci-arasan ff160000.mmc: __mmc_blk_ioctl_cmd: data error -84 > >> E/TC:? 0 > >> E/TC:? 0 TA panicked with code 0xffff0000 > >> E/LD: Status of TA 22250a54-0bf1-48fe-8002-7b20f1c9c9b1 > >> E/LD: arch: aarch64 > >> E/LD: region 0: va 0xc0004000 pa 0x7e200000 size 0x002000 flags rw-s (ldelf) > >> E/LD: region 1: va 0xc0006000 pa 0x7e202000 size 0x008000 flags r-xs (ldelf) > >> E/LD: region 2: va 0xc000e000 pa 0x7e20a000 size 0x001000 flags rw-s (ldelf) > >> E/LD: region 3: va 0xc000f000 pa 0x7e20b000 size 0x004000 flags rw-s (ldelf) > >> E/LD: region 4: va 0xc0013000 pa 0x7e20f000 size 0x001000 flags r--s > >> E/LD: region 5: va 0xc0014000 pa 0x7e22c000 size 0x005000 flags rw-s (stack) > >> E/LD: region 6: va 0xc0019000 pa 0x818ea9ba8 size 0x002000 flags rw-- (param) > >> E/LD: region 7: va 0xc001b000 pa 0x818e97ba8 size 0x001000 flags rw-- (param) > >> E/LD: region 8: va 0xc004f000 pa 0x00001000 size 0x014000 flags r-xs [0] > >> E/LD: region 9: va 0xc0063000 pa 0x00015000 size 0x008000 flags rw-s [0] > >> E/LD: [0] 22250a54-0bf1-48fe-8002-7b20f1c9c9b1 @ 0xc004f000 > >> E/LD: Call stack: > >> E/LD: 0xc0051a14 > >> E/LD: 0xc004f31c > >> E/LD: 0xc0052d40 > >> E/LD: 0xc004f624 > >> > >> root@uz3cg-dwg-sec:/var/rootdirs/home/fio# cat /sys/kernel/debug/mmc0/err_stats > >> # Command Timeout Occurred: 0 > >> # Command CRC Errors Occurred: 0 > >> # Data Timeout Occurred: 0 > >> # Data CRC Errors Occurred: 1 > >> # Auto-Cmd Error Occurred: 0 > >> # ADMA Error Occurred: 0 > >> # Tuning Error Occurred: 0 > >> # CMDQ RED Errors: 0 > >> # CMDQ GCE Errors: 0 > >> # CMDQ ICCE Errors: 0 > >> # Request Timedout: 0 > >> # CMDQ Request Timedout: 0 > >> # ICE Config Errors: 0 > >> # Controller Timedout errors: 0 > >> # Unexpected IRQ errors: 0 > >> > >>>> 2) Forcing this on everyone > >>>> > >>>> The original idea was that because re-tuning cannot be done in RPMB, the > >>>> need to re-rune in RPMB could be avoided by always re-tuning before > >>>> switching to RPMB and then switching straight back. IIRC re-tuning should > >>>> guarantee at least 4MB more I/O without issue. > >>> Performance is hardly an issue in the context of RPMB access - > >>> For most cases it’s a single frame. > >> > >> Yes, the security use case typically stores hashes, variables > >> (bootcount, upgrade_available, versions, that sort of thing) and > >> certificates in RPMB. > >> > >> Since you mentioned, I am seeing that tuning before switching to RPMB > >> has an impact on performance. As a practical test, just reading a 6 byte > >> variable incurs in 50ms penalty in kernel space due to the need to > >> retune 5 times. Not great since the request is coming from a Trusted > >> Application via OP-TEE through the supplicant meaning this TEE thread > >> (they are statically allocated CFG_NUM_THREADS) will be reserved for > >> quite a bit of time. > >> > >> Roughly: > >> TA --> OP-TEE (core) --> TEE-supplicant --> Kernel (>50ms) --> OP-TEE --> TA > > > > To add more detail to the timing above, when using RPMB, OP-TEE stores > > the secure filesystem on RPMB as well, so accessing one of the variables > > stored in the filesystem consists on a number (~5) of individual RPMB > > requests (each one forcing a retune, each retune taking around 10ms). > > > > BTW, I also tried delaying the timing between those consecutive retunes > > (up to 1 second), but the issue still persisted. > > > >> > >> Adrian, I couldn't find the original performance justification for > >> enabling this feature globally. At which point do you think it becomes > >> beneficial to retune before accessing RPMB? > > > > How should we proceed with this patch then? can it be merged as I > > proposed? should I rewrite it differently? not sure what is next > > It would be good to try to determine if the error happens when the > switch command comes immediately after tuning. For example, add > a delay after tuning and see if that makes any difference. e.g. > > diff --git a/drivers/mmc/host/sdhci.c b/drivers/mmc/host/sdhci.c > index c79f73459915..6b168659282a 100644 > --- a/drivers/mmc/host/sdhci.c > +++ b/drivers/mmc/host/sdhci.c > @@ -2867,8 +2867,10 @@ int __sdhci_execute_tuning(struct sdhci_host *host, u32 opcode) > > ctrl = sdhci_readw(host, SDHCI_HOST_CONTROL2); > if (!(ctrl & SDHCI_CTRL_EXEC_TUNING)) { > - if (ctrl & SDHCI_CTRL_TUNED_CLK) > + if (ctrl & SDHCI_CTRL_TUNED_CLK) { > + msleep(10); > return 0; /* Success! */ > + } > break; > } > > Thanks Adrian. The issue sill triggers (in this case on the last but one access to retrieve the 6 byte variable). --- a/drivers/mmc/host/sdhci.c +++ b/drivers/mmc/host/sdhci.c @@ -2781,6 +2781,7 @@ static int __sdhci_execute_tuning(struct sdhci_host *host, u32 opcode) * Issue opcode repeatedly till Execute Tuning is set to 0 or the number * of loops reaches tuning loop count. */ + printk(KERN_ERR "tune starts[loop %d]\n", host->tuning_loop_count); for (i = 0; i < host->tuning_loop_count; i++) { u16 ctrl; @@ -2799,8 +2800,11 @@ static int __sdhci_execute_tuning(struct sdhci_host *host, u32 opcode) ctrl = sdhci_readw(host, SDHCI_HOST_CONTROL2); if (!(ctrl & SDHCI_CTRL_EXEC_TUNING)) { - if (ctrl & SDHCI_CTRL_TUNED_CLK) - return 0; /* Success! */ + if (ctrl & SDHCI_CTRL_TUNED_CLK) { + printk(KERN_ERR "tune success[%d]\n", i); + msleep(10); + return 0; /* Success! */ + } break; } [ 164.919090] tune starts[loop 40] [ 164.923152] tune success[39] [ 164.952106] tune starts[loop 40] [ 164.956611] tune success[39] [ 165.084402] tune starts[loop 40] [ 165.089350] tune success[39] [ 165.116491] tune starts[loop 40] [ 165.120806] tune success[39] [ 165.145016] sdhci-arasan ff160000.mmc: __mmc_blk_ioctl_cmd: data error -84 E/TC:? 0 E/TC:? 0 TA panicked with code 0xffff0000 E/LD: Status of TA 22250a54-0bf1-48fe-8002-7b20f1c9c9b1 E/LD: arch: aarch64 E/LD: region 0: va 0xc0004000 pa 0x7e200000 size 0x002000 flags rw-s (ldelf) E/LD: region 1: va 0xc0006000 pa 0x7e202000 size 0x008000 flags r-xs (ldelf) E/LD: region 2: va 0xc000e000 pa 0x7e20a000 size 0x001000 flags rw-s (ldelf) E/LD: region 3: va 0xc000f000 pa 0x7e20b000 size 0x004000 flags rw-s (ldelf) E/LD: region 4: va 0xc0013000 pa 0x7e20f000 size 0x001000 flags r--s E/LD: region 5: va 0xc0014000 pa 0x7e22c000 size 0x005000 flags rw-s (stack) E/LD: region 6: va 0xc0019000 pa 0x818ac38e8 size 0x001000 flags rw-- (param) E/LD: region 7: va 0xc001a000 pa 0x818ac36e8 size 0x001000 flags rw-- (param) E/LD: region 8: va 0xc0022000 pa 0x00001000 size 0x014000 flags r-xs [0] E/LD: region 9: va 0xc0036000 pa 0x00015000 size 0x008000 flags rw-s [0] E/LD: [0] 22250a54-0bf1-48fe-8002-7b20f1c9c9b1 @ 0xc0022000 E/LD: Call stack: E/LD: 0xc0024e58 E/LD: 0xc0022388 E/LD: 0xc0025d40 E/LD: 0xc0022624 [ 166.119598] tune starts[loop 40] [ 166.125700] tune success[39]