Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp5935401ybl; Tue, 27 Aug 2019 11:50:13 -0700 (PDT) X-Google-Smtp-Source: APXvYqxGeJYMEiolzHdBKFf8TBDiQRt733+eZRy5Msz4jg7VOhQ1sOS9WhMK24TRmYvOD9xHH08L X-Received: by 2002:a17:90a:5d0d:: with SMTP id s13mr115626pji.133.1566931813909; Tue, 27 Aug 2019 11:50:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566931813; cv=none; d=google.com; s=arc-20160816; b=Fkqo4dw7xx3EQZsZzs5CiSxoNXMqNu/8/iZeORQ8142C9prxW87Qyu2krTLGhe1zG4 tMeS5L/R8gQAn44P3+ORSgOZzW/BIFuyU0ger8ziANYnHZFd5c7OdjffoIwjCrAbzHTO RT4GHQKIThacHI1Wuwl7b+OJ6pFbgOx0AHFtaJHs7MWKhHSkNTPv++gjDs007PvHX8YM nCfdoqIFkpwqwLQCYMu+jrE+wYB8dWIrF1xKe44iaVpKobsjx6l4o0Xd4VdNS/Rsl3uL 42RxYhC4JmvUWUo/T+UzB9HycymRIudcSryafxUXrOdIOUYuycZSk9P1rLCmuqDYxq+9 xRzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=jc6X0h2nbX22Qxihy619L97ZxiDDJndHwr4qVHP8IrY=; b=kzLAzkCzxQ2KjTAuyFh65ufPpDLFkEap0BXEOeoomwqeEDrv06Sz2lCBfFk/KLTv2X iYSxs0vIcvkl3PNddOY88+NTPwyqWt7LF8yuqThLxsTh6XoQ7LKHHdSykxVqP44eBds9 CcfYNAFC64y40mc2bxQZWFPKQDHX/yl1gMQaIn9LkJwT6RV/JezCF3wNO6yn3VEhsulc cqs06GMmuDvFKuXOAmBxNlJ9FyxI4KlyRBCyR1wxckt+B6o7R5BbgJB+TdW2deUtTnAb MIXA6cO/6KVHVm9k/XcMzKQPWVGbyGU2Ghmzr/7lIUrajZgRmDKLLK1f5AtDWzG4qkBT 1qew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CZi2h0ed; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o4si13399679plb.153.2019.08.27.11.49.58; Tue, 27 Aug 2019 11:50:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CZi2h0ed; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730683AbfH0Ss2 (ORCPT + 99 others); Tue, 27 Aug 2019 14:48:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:46036 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729903AbfH0Ss1 (ORCPT ); Tue, 27 Aug 2019 14:48:27 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D621720644; Tue, 27 Aug 2019 18:48:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1566931706; bh=ZiCAIffTdsF1bgCrGidfjVki+oHlbaJt6PVAuhhR8cY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=CZi2h0edM4wr9EPiY0R5BM8VzmhFkHaiLiRzetS0zchYepWLldK/VEo3BPuK/gfE0 wDya2tEpSrWQVMv07h8S0uxjBLGHT9+epEYWnlDfpt4isX813Bq9MgKZ4q4UPXPteZ FBJxeaoHjnaqMifwWE27dsKIXrrRndSRvOI3waDg= Date: Tue, 27 Aug 2019 20:48:23 +0200 From: Greg Kroah-Hartman To: Kenneth Lee Cc: zhangfei , Arnd Bergmann , linux-accelerators@lists.ozlabs.org, linux-kernel@vger.kernel.org, Zaibo Xu , Zhou Wang Subject: Re: [PATCH 2/2] uacce: add uacce module Message-ID: <20190827184823.GC2987@kroah.com> References: <20190815141351.GD23267@kroah.com> <6daab785-a8f9-684e-eb71-7a81604d3bb0@linaro.org> <20190820165947.GC3736@kroah.com> <5d5cf0fc.1c69fb81.ec57f.b853SMTPIN_ADDED_BROKEN@mx.google.com> <20190821091709.GA22914@kroah.com> <20190821160542.GA14760@kroah.com> <20190826041042.GB27955@Turing-Arch-b> <20190826042910.GA26547@kroah.com> <20190827114208.GB116872@Turing-Arch-b> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190827114208.GB116872@Turing-Arch-b> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Aug 27, 2019 at 07:42:08PM +0800, Kenneth Lee wrote: > On Mon, Aug 26, 2019 at 06:29:10AM +0200, Greg Kroah-Hartman wrote: > > Date: Mon, 26 Aug 2019 06:29:10 +0200 > > From: Greg Kroah-Hartman > > To: Kenneth Lee > > CC: zhangfei , Arnd Bergmann , > > linux-accelerators@lists.ozlabs.org, linux-kernel@vger.kernel.org, Zaibo > > Xu , Zhou Wang > > Subject: Re: [PATCH 2/2] uacce: add uacce module > > User-Agent: Mutt/1.12.1 (2019-06-15) > > Message-ID: <20190826042910.GA26547@kroah.com> > > > > On Mon, Aug 26, 2019 at 12:10:42PM +0800, Kenneth Lee wrote: > > > On Wed, Aug 21, 2019 at 09:05:42AM -0700, Greg Kroah-Hartman wrote: > > > > Date: Wed, 21 Aug 2019 09:05:42 -0700 > > > > From: Greg Kroah-Hartman > > > > To: zhangfei > > > > CC: Arnd Bergmann , linux-accelerators@lists.ozlabs.org, > > > > linux-kernel@vger.kernel.org, Kenneth Lee , Zaibo > > > > Xu , Zhou Wang > > > > Subject: Re: [PATCH 2/2] uacce: add uacce module > > > > User-Agent: Mutt/1.12.1 (2019-06-15) > > > > Message-ID: <20190821160542.GA14760@kroah.com> > > > > > > > > On Wed, Aug 21, 2019 at 10:30:22PM +0800, zhangfei wrote: > > > > > > > > > > > > > > > On 2019/8/21 下午5:17, Greg Kroah-Hartman wrote: > > > > > > On Wed, Aug 21, 2019 at 03:21:18PM +0800, zhangfei.gao@foxmail.com wrote: > > > > > > > Hi, Greg > > > > > > > > > > > > > > On 2019/8/21 上午12:59, Greg Kroah-Hartman wrote: > > > > > > > > On Tue, Aug 20, 2019 at 09:08:55PM +0800, zhangfei wrote: > > > > > > > > > On 2019/8/15 下午10:13, Greg Kroah-Hartman wrote: > > > > > > > > > > On Wed, Aug 14, 2019 at 05:34:25PM +0800, Zhangfei Gao wrote: > > > > > > > > > > > +int uacce_register(struct uacce *uacce) > > > > > > > > > > > +{ > > > > > > > > > > > + int ret; > > > > > > > > > > > + > > > > > > > > > > > + if (!uacce->pdev) { > > > > > > > > > > > + pr_debug("uacce parent device not set\n"); > > > > > > > > > > > + return -ENODEV; > > > > > > > > > > > + } > > > > > > > > > > > + > > > > > > > > > > > + if (uacce->flags & UACCE_DEV_NOIOMMU) { > > > > > > > > > > > + add_taint(TAINT_CRAP, LOCKDEP_STILL_OK); > > > > > > > > > > > + dev_warn(uacce->pdev, > > > > > > > > > > > + "Register to noiommu mode, which export kernel data to user space and may vulnerable to attack"); > > > > > > > > > > > + } > > > > > > > > > > THat is odd, why even offer this feature then if it is a major issue? > > > > > > > > > UACCE_DEV_NOIOMMU maybe confusing here. > > > > > > > > > > > > > > > > > > In this mode, app use ioctl to get dma_handle from dma_alloc_coherent. > > > > > > > > That's odd, why not use the other default apis to do that? > > > > > > > > > > > > > > > > > It does not matter iommu is enabled or not. > > > > > > > > > In case iommu is disabled, it maybe dangerous to kernel, so we added warning here, is it required? > > > > > > > > You should use the other documentated apis for this, don't create your > > > > > > > > own. > > > > > > > I am sorry, not understand here. > > > > > > > Do you mean there is a standard ioctl or standard api in user space, it can > > > > > > > get dma_handle from dma_alloc_coherent from kernel? > > > > > > There should be a standard way to get such a handle from userspace > > > > > > today. Isn't that what the ion interface does? DRM also does this, as > > > > > > does UIO I think. > > > > > Thanks Greg, > > > > > Still not find it, will do more search. > > > > > But this may introduce dependency in our lib, like depend on ion? > > > > > > Do you have a spec somewhere that shows exactly what you are trying to > > > > > > do here, along with example userspace code? It's hard to determine it > > > > > > given you only have one "half" of the code here and no users of the apis > > > > > > you are creating. > > > > > > > > > > > The purpose is doing dma in user space. > > > > > > > > Oh no, please no. Are you _SURE_ you want to do this? > > > > > > > > Again, look at how ION does this and how the DMAbuff stuff is replacing > > > > it. Use that api please instead, otherwise you will get it wrong and we > > > > don't want to duplicate efforts. > > > > > > > > thanks, > > > > > > > > greg k-h > > > > > > Dear Greg. I wrote a blog to explain the intention of WarpDrive here: > > > https://zhuanlan.zhihu.com/p/79680889. > > > > Putting that information into the changelog and kernel documentation is > > a much better idea than putting it there. > > Yes, will do. Thank you. > > > > > > Sharing data is not our intention, Sharing address is. NOIOMMU mode is just a > > > temporary solution to let some hardware which does not care the security issue > > > to try WarpDrive for the first step. Some user do not care this much in embedded > > > scenario. We saw VFIO use the same model so we also want to make a try. If you > > > insist this is risky, we can remove it. > > > > Why not just use vfio then? > > We tried that in previous patches. But it needs to create unnecessary mdev to > fulfill the requirement. So we discard it after the discussion in lkml. Any pointers to that discussion? thanks, greg k-h