[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YFwzw3VK0okr+taA@kroah.com>
Date: Thu, 25 Mar 2021 07:54:59 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: Dan Williams <dan.j.williams@...el.com>
Cc: bhelgaas@...gle.com,
Jonathan Cameron <Jonathan.Cameron@...wei.com>,
linux-pci@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] PCI: Allow drivers to claim exclusive access to config
regions
On Wed, Mar 24, 2021 at 06:23:54PM -0700, Dan Williams wrote:
> The PCIE Data Object Exchange (DOE) mailbox is a protocol run over
> configuration cycles. It assumes one initiator at a time is
> reading/writing the data registers.
That sounds like a horrible protocol for a multi-processor system.
Where is it described and who can we go complain to for creating such a
mess?
> If userspace reads from the response
> data payload it may steal data that a kernel driver was expecting to
> read. If userspace writes to the request payload it may corrupt the
> request a driver was trying to send.
Fun! So you want to keep root in userspace from doing this? I thought
we already do that today?
> Introduce pci_{request,release}_config_region() for a driver to exclude
> the possibility of userspace induced corruption while accessing the DOE
> mailbox. Likely there are other configuration state assumptions that a
> driver may want to assert are under its exclusive control, so this
> capability is not limited to any specific configuration range.
As you do not have a user for these functions, it's hard to see how they
would be used. We also really can't add new apis with no in-tree users,
so do you have a patch series that requires this functionality
somewhere?
> Since writes are targeted and are already prepared for failure the
> entire request is failed. The same can not be done for reads as the
> device completely disappears from lspci output if any configuration
> register in the request is exclusive. Instead skip the actual
> configuration cycle on a per-access basis and return all f's as if the
> read had failed.
returning all ff is a huge hint to many drivers that the device is gone,
not that it just failed. So what happens to code that thinks that and
then tears stuff down as if the device has been removed?
Trying to protect drivers from userspace here feels odd, what userspace
tools are trying to access these devices while they are under
"exclusive" control from the kernel? lspci not running as root should
not be doing anything crazy, but if you want to run it as root,
shouldn't you be allowed to access it properly?
What hardware has this problem that we need to claim exclusive ownership
over that differs from the old hardware we used to have that would do
crazy things when reading from from userspace? We had this problem a
long time ago and lived with it, what changed now?
thanks,
greg k-h
Powered by blists - more mailing lists