From patchwork Fri Sep 6 03:07:11 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Huang, Ying" X-Patchwork-Id: 13793167 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id EEBCACE7AA5 for ; Fri, 6 Sep 2024 03:09:25 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 636206B008C; Thu, 5 Sep 2024 23:09:25 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 5BCEE6B008A; Thu, 5 Sep 2024 23:09:25 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 442CE6B008C; Thu, 5 Sep 2024 23:09:25 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 2546E6B0088 for ; Thu, 5 Sep 2024 23:09:25 -0400 (EDT) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id C2EA240D65 for ; Fri, 6 Sep 2024 03:09:24 +0000 (UTC) X-FDA: 82532832648.30.FB35692 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.15]) by imf26.hostedemail.com (Postfix) with ESMTP id ACBBF140008 for ; Fri, 6 Sep 2024 03:09:21 +0000 (UTC) Authentication-Results: imf26.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=UCUMWvQA; spf=pass (imf26.hostedemail.com: domain of ying.huang@intel.com designates 198.175.65.15 as permitted sender) smtp.mailfrom=ying.huang@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1725592063; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=10FN7twCLlNXTdK8QQjJaoUiev1Y4bp41Li4mPr2OyE=; b=Fnpr+17pl9xsS3MxN8Lwzkugf4+/Ng2Fqp/NFladNvnAKzFoqUgZQrHDffDh7Hu77+Tk9p IxuVL/c8rrbYhtidi+vlhz5Igx37Azh378iduzDzhHlyXX8+t6KxdIU8Cbx3IGg99BgefO At0fUEj0tyPcV6E/7oDe1TwJJw4dZPU= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1725592063; a=rsa-sha256; cv=none; b=4kpP/SS5JDNgf46//RjnG/elrC9CqCyUltqMCbDPl6wqg9/LFy4dc9OH2+9DSYf+DChe/Z lxzDXlddTa1v+GqYbka/chN760N1QIDtumlXoqzYP2dvfQ/+TC+W2rTgVGNJqyGs15gTk+ WLAzUDCXjNUTUoIo1rUvMN20kqTOb6k= ARC-Authentication-Results: i=1; imf26.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=UCUMWvQA; spf=pass (imf26.hostedemail.com: domain of ying.huang@intel.com designates 198.175.65.15 as permitted sender) smtp.mailfrom=ying.huang@intel.com; dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1725592161; x=1757128161; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=VYfkWvOLxKs5tnPDOT4ijueKx8g5WPX+vAVaKP8jU2Q=; b=UCUMWvQArr7yj+dc9nwk5s9ei9JpaqZMzVE+elW1zJmwjQJRdrdmpAwo ENKUXKUtv4nYveQnM2EljrPmkMQXR680bzBBjGl8uXcLMFOBfGcwW4beE iIXdcQIbGGZOtidUIECGBXJVPHtV/RtGVUcmg4DG7Z6T/03MN00M1W8YG LpnTaXmQVBrCi+HuhX6WErLnKt3npxL1JH0NgugH+G/FWLy4jqQ/wpjBY XigjkMOJP/IFrlcVXuniXmeAPgB5Yx5lms7LEylX/OVAB+JNe22H5ihNQ g5/NluLN3e9NaojomqtVoLAz3rjoeRmeKfI35f9IQdnP+ezRx1R0A+8FY w==; X-CSE-ConnectionGUID: 7bjBhl2yT76TeevlZuW+fw== X-CSE-MsgGUID: 0xlPJU/3Tr6mYo5UO8QHNQ== X-IronPort-AV: E=McAfee;i="6700,10204,11186"; a="28089461" X-IronPort-AV: E=Sophos;i="6.10,206,1719903600"; d="scan'208";a="28089461" Received: from orviesa007.jf.intel.com ([10.64.159.147]) by orvoesa107.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Sep 2024 20:09:21 -0700 X-CSE-ConnectionGUID: 8mcJYT+lQGWTBP+e48C9Ew== X-CSE-MsgGUID: vxdFwImFSbeOefxtS4vhhw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.10,206,1719903600"; d="scan'208";a="66364375" Received: from unknown (HELO yhuang6-mobl2.ccr.corp.intel.com) ([10.245.242.189]) by orviesa007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Sep 2024 20:09:17 -0700 From: Huang Ying To: Andrew Morton Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, linux-cxl@vger.kernel.org, Huang Ying , Dan Williams , David Hildenbrand , Davidlohr Bueso , Jonathan Cameron , Dave Jiang , Alison Schofield , Vishal Verma , Ira Weiny , Alistair Popple , Andy Shevchenko , Bjorn Helgaas , Baoquan He Subject: [PATCH -v3 1/3] resource: Fix region_intersects() vs add_memory_driver_managed() Date: Fri, 6 Sep 2024 11:07:11 +0800 Message-Id: <20240906030713.204292-2-ying.huang@intel.com> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20240906030713.204292-1-ying.huang@intel.com> References: <20240906030713.204292-1-ying.huang@intel.com> MIME-Version: 1.0 X-Stat-Signature: hos8tm6st4ggngdhje5ddn3ekrrnixbc X-Rspamd-Queue-Id: ACBBF140008 X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1725592161-9699 X-HE-Meta: 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 34ujRYWn C+VHFQfxSLJCPNMXGVziBKkHzD/Qt88o0g9Q7U6H6x1a1KC65PmnZtDQwYz+WhI86PTTemq4BH0oER/p8yUL9C8get7yba35qOqal3GX4so0CGpUktTXGJi/Kzq5+2YY6ADBfgDuXrknvlVpnWZiA9g2PKL0tGWuC9xRSKkIZrqfRqKjispe7A4CubHAgy0Mvl5fEj5+FdCUSaMgyO3AKZonBsyPx0Z2LIPXPJUuossEStL01pI3iBqOtmkAKKvo+3SM7FdleXPjiwqCXCRskDeQN/lX1rzJypvoQO9o/JHxpXU6cJvqcrN9wE37hxKuDaOGAW1z/alo+wZoHUEAuL9a2Pq9olSLN74+Gub+slbcJS29vw2YnPcnP52LTYuNosCNR X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On a system with CXL memory, the resource tree (/proc/iomem) related to CXL memory may look like something as follows. 490000000-50fffffff : CXL Window 0 490000000-50fffffff : region0 490000000-50fffffff : dax0.0 490000000-50fffffff : System RAM (kmem) Because drivers/dax/kmem.c calls add_memory_driver_managed() during onlining CXL memory, which makes "System RAM (kmem)" a descendant of "CXL Window X". This confuses region_intersects(), which expects all "System RAM" resources to be at the top level of iomem_resource. This can lead to bugs. For example, when the following command line is executed to write some memory in CXL memory range via /dev/mem, $ dd if=data of=/dev/mem bs=$((1 << 10)) seek=$((0x490000000 >> 10)) count=1 dd: error writing '/dev/mem': Bad address 1+0 records in 0+0 records out 0 bytes copied, 0.0283507 s, 0.0 kB/s the command fails as expected. However, the error code is wrong. It should be "Operation not permitted" instead of "Bad address". More seriously, the /dev/mem permission checking in devmem_is_allowed() passes incorrectly. Although the accessing is prevented later because ioremap() isn't allowed to map system RAM, it is a potential security issue. During command executing, the following warning is reported in the kernel log for calling ioremap() on system RAM. ioremap on RAM at 0x0000000490000000 - 0x0000000490000fff WARNING: CPU: 2 PID: 416 at arch/x86/mm/ioremap.c:216 __ioremap_caller.constprop.0+0x131/0x35d Call Trace: memremap+0xcb/0x184 xlate_dev_mem_ptr+0x25/0x2f write_mem+0x94/0xfb vfs_write+0x128/0x26d ksys_write+0xac/0xfe do_syscall_64+0x9a/0xfd entry_SYSCALL_64_after_hwframe+0x4b/0x53 The details of command execution process are as follows. In the above resource tree, "System RAM" is a descendant of "CXL Window 0" instead of a top level resource. So, region_intersects() will report no System RAM resources in the CXL memory region incorrectly, because it only checks the top level resources. Consequently, devmem_is_allowed() will return 1 (allow access via /dev/mem) for CXL memory region incorrectly. Fortunately, ioremap() doesn't allow to map System RAM and reject the access. So, region_intersects() needs to be fixed to work correctly with the resource tree with "System RAM" not at top level as above. To fix it, if we found a unmatched resource in the top level, we will continue to search matched resources in its descendant resources. So, we will not miss any matched resources in resource tree anymore. In the new implementation, an example resource tree |------------- "CXL Window 0" ------------| |-- "System RAM" --| will behave similar as the following fake resource tree for region_intersects(, IORESOURCE_SYSTEM_RAM, ), |-- "System RAM" --||-- "CXL Window 0a" --| Where "CXL Window 0a" is part of the original "CXL Window 0" that isn't covered by "System RAM". Fixes: c221c0b0308f ("device-dax: "Hotplug" persistent memory for use like normal RAM") Signed-off-by: "Huang, Ying" Cc: Dan Williams Cc: David Hildenbrand Cc: Davidlohr Bueso Cc: Jonathan Cameron Cc: Dave Jiang Cc: Alison Schofield Cc: Vishal Verma Cc: Ira Weiny Cc: Alistair Popple Cc: Andy Shevchenko Cc: Bjorn Helgaas Cc: Baoquan He --- kernel/resource.c | 58 ++++++++++++++++++++++++++++++++++++++++------- 1 file changed, 50 insertions(+), 8 deletions(-) diff --git a/kernel/resource.c b/kernel/resource.c index 14777afb0a99..235dc77f8add 100644 --- a/kernel/resource.c +++ b/kernel/resource.c @@ -540,20 +540,62 @@ static int __region_intersects(struct resource *parent, resource_size_t start, size_t size, unsigned long flags, unsigned long desc) { - struct resource res; + resource_size_t ostart, oend; int type = 0; int other = 0; - struct resource *p; + struct resource *p, *dp; + bool is_type, covered; + struct resource res; res.start = start; res.end = start + size - 1; for (p = parent->child; p ; p = p->sibling) { - bool is_type = (((p->flags & flags) == flags) && - ((desc == IORES_DESC_NONE) || - (desc == p->desc))); - - if (resource_overlaps(p, &res)) - is_type ? type++ : other++; + if (!resource_overlaps(p, &res)) + continue; + is_type = (p->flags & flags) == flags && + (desc == IORES_DESC_NONE || desc == p->desc); + if (is_type) { + type++; + continue; + } + /* + * Continue to search in descendant resources as if the + * matched descendant resources cover some ranges of 'p'. + * + * |------------- "CXL Window 0" ------------| + * |-- "System RAM" --| + * + * will behave similar as the following fake resource + * tree when searching "System RAM". + * + * |-- "System RAM" --||-- "CXL Window 0a" --| + */ + covered = false; + ostart = max(res.start, p->start); + oend = min(res.end, p->end); + for_each_resource(p, dp, false) { + if (!resource_overlaps(dp, &res)) + continue; + is_type = (dp->flags & flags) == flags && + (desc == IORES_DESC_NONE || desc == dp->desc); + if (is_type) { + type++; + /* + * Range from 'ostart' to 'dp->start' + * isn't covered by matched resource. + */ + if (dp->start > ostart) + break; + if (dp->end >= oend) { + covered = true; + break; + } + /* Remove covered range */ + ostart = max(ostart, dp->end + 1); + } + } + if (!covered) + other++; } if (type == 0)