Received: by 10.192.165.148 with SMTP id m20csp72030imm; Wed, 9 May 2018 08:59:48 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqHKae4+/bDsQJhdrh9MW+X5UBVbq9fbW2aE4aJVnOT3MpO6Iaf2A1YFF+5RUqsNdFU3qpJ X-Received: by 2002:a63:be42:: with SMTP id g2-v6mr21358707pgo.44.1525881588389; Wed, 09 May 2018 08:59:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525881588; cv=none; d=google.com; s=arc-20160816; b=ny3o+mAGjytpxVhV5qY1CpWQvWQ+DQ6sdVuf4JLDYiKNCYzZWsOHruRJPz8QFEmR3M z5oagDNb3Oh4LGv4jD07NcTGRTnwtnYUw3KCceP0nIDGgE8yX3w1IzHID1eVv0WXoJw2 q2WoHLXTeHSsj6udMKBXkgDrMQ/8sBhFB4dIZSbny/eo2VLvGB8OAbR2v3GMEK+nmJhb j8Lq7HOIG2o0kKglvw6qkksBq9dY4l+wc+DHslXIKx+Hcq4ZZI/Bhq0Two8QMSJ3lh+e cPpxI9jJg6UCGy/0D/Rz6/evRdSI7VyA4gXuGAQ7bxE/jxTXk1EsLopze9uHNDtso28u m4uA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=IKeVaoLIxF9kQKBa8Lej864RSGURMDzGcHAyvBPurSE=; b=ZxbxQnADMBn7l7TBSdG7DcUj/a6f0lBin3Fbth6fVr+N+i3VP67YznDqVuz9Ns9PKb nPz7VBkzq2h64MRYB8QffWMHj2TwYcN7S8K/5XD8kiAXQvEr6JAIOu8PN8KBZ069x1t3 bLDpGFPIidCfT7ketA3uzkFoiPZYcotk9RSeJNCxsRXEs+c/EiZr5bAQ4F3Lg6G0guL8 ktfEzCI3zQZQieFlOvwUa6YvMIT/J3jXRWMe/OiwuJbOgn8FZW4D/7CZ7ZWCSL6GwclF X0c/ro8U/55N6woQLXUc6pZruNGC/d+0eMkshxWr/MzV4f8rq1J1hGavHw+Oi/+r5Ivk A/TQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b10-v6si26794552plb.177.2018.05.09.08.59.33; Wed, 09 May 2018 08:59:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965345AbeEIP6w (ORCPT + 99 others); Wed, 9 May 2018 11:58:52 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:55590 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S965055AbeEIP6u (ORCPT ); Wed, 9 May 2018 11:58:50 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 40E4C77067; Wed, 9 May 2018 15:58:49 +0000 (UTC) Received: from [10.18.17.89] (dhcp-17-89.bos.redhat.com [10.18.17.89]) by smtp.corp.redhat.com (Postfix) with ESMTP id 0D7462024CA1; Wed, 9 May 2018 15:58:47 +0000 (UTC) Subject: Re: [PATCH v4 04/14] PCI/P2PDMA: Clear ACS P2P flags for all devices behind switches To: Stephen Bates , Alex Williamson Cc: Logan Gunthorpe , =?UTF-8?Q?Christian_K=c3=b6nig?= , Bjorn Helgaas , "linux-kernel@vger.kernel.org" , "linux-pci@vger.kernel.org" , "linux-nvme@lists.infradead.org" , "linux-rdma@vger.kernel.org" , "linux-nvdimm@lists.01.org" , "linux-block@vger.kernel.org" , Christoph Hellwig , Jens Axboe , Keith Busch , Sagi Grimberg , Bjorn Helgaas , Jason Gunthorpe , Max Gurtovoy , Dan Williams , =?UTF-8?B?SsOpcsO0bWUgR2xpc3Nl?= , Benjamin Herrenschmidt References: <20180423233046.21476-1-logang@deltatee.com> <20180423233046.21476-5-logang@deltatee.com> <20180507231306.GG161390@bhelgaas-glaptop.roam.corp.google.com> <0b4183ef-e720-204b-9e85-b9eaf7a4136a@deltatee.com> <3584a6ac-95c7-5d23-1859-aee30605776e@deltatee.com> <20180508133407.57a46902@w520.home> <5fc9b1c1-9208-06cc-0ec5-1f54c2520494@deltatee.com> <20180508141331.7cd737cb@w520.home> <20180508144341.0441b676@w520.home> <20180508152631.50fd583c@w520.home> <354F7407-0DC7-470C-B9AA-74FDF9C46B08@raithlin.com> <20180508160336.0935ddde@w520.home> <11819753-af26-4632-8580-d4a47127a3b2@redhat.com> From: Don Dutile Message-ID: <09b4088a-838a-48f5-4395-f261de483dbf@redhat.com> Date: Wed, 9 May 2018 11:58:46 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Wed, 09 May 2018 15:58:49 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Wed, 09 May 2018 15:58:49 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'ddutile@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/09/2018 08:44 AM, Stephen Bates wrote: > Hi Don > >> RDMA VFs lend themselves to NVMEoF w/device-assignment.... need a way to >> put NVME 'resources' into an assignable/manageable object for 'IOMMU-grouping', >> which is really a 'DMA security domain' and less an 'IOMMU grouping domain'. > > Ha, I like your term "DMA Security Domain" which sounds about right for what we are discussing with p2pdma and ACS disablement ;-). The problem is that ACS is, in some ways, too big of hammer for what we want here in the sense that it is either on or off for the bridge or MF EP we enable/disable it for. ACS can't filter the TLPs by address or ID though PCI-SIG are having some discussions on extending ACS. That's a long term solution and won't be applicable to us for some time. > > NVMe SSDs that support SR-IOV are coming to market but we can't assume all NVMe SSDs with support SR-IOV. That will probably be a pretty high end-feature... > > Stephen > > > Sure, we could provide unsecure enablement for development and kick-the-tires deployment .. device-assignment started that way (no ACS, no intr-remapping, etc.), but for secure setups, VF's for both p2p EPs is the best security model. So, we should have a design goal for the secure configuration. workarounds/unsecure modes to deal with near-term what-we-have-to-work-with can be employed, but they shoudn't be the only/defacto/final-solution.