Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp105731pxj; Thu, 13 May 2021 22:36:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzi/NFkGLmvx9k+lf/tT1aStpSAODI7XEMh9SHNHZl2ESi0dTivwyljWQezEN5wVQnCHWWY X-Received: by 2002:a17:907:3f28:: with SMTP id hq40mr46755897ejc.283.1620970561889; Thu, 13 May 2021 22:36:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620970561; cv=none; d=google.com; s=arc-20160816; b=c3InzPxs68u6ofg3KYXCiCqJ/tTfU23LD+dNmmBGuhraBDfOLyZ385ALOK/mZiqcwR xIjXM7JWPafgksoOA6gENJOkipBhOd+m96qySvkM3zbYBVCwZ1GDjRXEE5gZerfkBa/r giyGycipXlr0JhEMqYzq/wHO1T0Mq2abhcmspYg5kHRoCTfAO7K5YWzxPBzym+n3XyWP x9y9gUZq0d/Aqb4fpxZklcQM302p+xmOBezhf0yK0VoMMefxHUeBCkdORjk4iyZyypPl 3iSI+YVfCt+zGhgsOUtlEm4o5NGFORr3Rso7QmtcnPV+HPTRg8/TwZjtobkUVOt1VNrw e7zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:ironport-sdr :ironport-sdr; bh=4a7uklCWt/cc2TEHceffT8kizsoDwA51twCXM2fcpGM=; b=bk7S24KpJ6HzJrivujc32NulBYwNqgPRfkT0DJcz6CFjVsnnHFhVpkWsHe7OUMWPwb dCBFAuGls3S6r1+BFwYxswjImwL1p5ZUGA0/xeVx4H5AfZcRlb6fxqvLBEcIbhuuETFw xPYcoDKRz0FB+KcB8vCbUbC03KCS+3p1RHEszzCrbvf39tMuPEY+Rwrs49QMevIOoehQ ouzSc0V3YG2U7t280zQLmgXKHe7cQz3pIatkyaEEwnHaiMS5sDSnS7Bq9YbP4yXAlrQv CWNzZmtOPBk75DNRK6LOT1jcQrfODxZmaYI1wJDf73oc/vTKu13dmzqPGt7W7dVlMftc c6hg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w24si968536ejb.384.2021.05.13.22.35.38; Thu, 13 May 2021 22:36:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231709AbhEMSzE (ORCPT + 99 others); Thu, 13 May 2021 14:55:04 -0400 Received: from mga18.intel.com ([134.134.136.126]:21422 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230366AbhEMSzD (ORCPT ); Thu, 13 May 2021 14:55:03 -0400 IronPort-SDR: bdavYTQgf/Zo8bNZMMVUMwO7biC10MI8sBpElUx0snHgnn5TIOOKRkrV/Xs9rpAlGWM9WzdQa2 DNoXCjIwpRgA== X-IronPort-AV: E=McAfee;i="6200,9189,9983"; a="187438245" X-IronPort-AV: E=Sophos;i="5.82,296,1613462400"; d="scan'208";a="187438245" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 May 2021 11:53:51 -0700 IronPort-SDR: 9Up57c0CDb2ZmIMevyH92mTBnr53E6sGPaiKBteRDKCDfWtXeUgBwaGMn3vmPUXfWWGWYM4yMA Ije96e4uOsyg== X-IronPort-AV: E=Sophos;i="5.82,296,1613462400"; d="scan'208";a="626346317" Received: from agluck-desk2.sc.intel.com (HELO agluck-desk2.amr.corp.intel.com) ([10.3.52.146]) by fmsmga005-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 May 2021 11:53:50 -0700 Date: Thu, 13 May 2021 11:53:49 -0700 From: "Luck, Tony" To: Jason Gunthorpe Cc: Jacob Pan , Christoph Hellwig , LKML , "iommu@lists.linux-foundation.org" , Joerg Roedel , Lu Baolu , Jean-Philippe Brucker , "Liu, Yi L" , "Raj, Ashok" , "Tian, Kevin" , "Jiang, Dave" , "wangzhou1@hisilicon.com" , "zhangfei.gao@linaro.org" , "vkoul@kernel.org" , David Woodhouse Subject: Re: [PATCH v4 1/2] iommu/sva: Tighten SVA bind API with explicit flags Message-ID: <20210513185349.GA801495@agluck-desk2.amr.corp.intel.com> References: <20210511091452.721e9a03@jacob-builder> <20210511163521.GN1002214@nvidia.com> <20210511110550.477a434f@jacob-builder> <20210511194726.GP1002214@nvidia.com> <20210513060012.0fcc7653@jacob-builder> <20210513133834.GC1002214@nvidia.com> <20210513081050.5cf6a6ed@jacob-builder> <20210513173303.GL1002214@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210513173303.GL1002214@nvidia.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, May 13, 2021 at 02:33:03PM -0300, Jason Gunthorpe wrote: > The page table under the kernel PASID should behave the same way that > the kernel would operate the page table assigned to a kernel RID. > > If the kernel has security off then the PASID should map to all > physical memory, just like the RID does. > > If security is on then every DMA map needs to be loaded into the > PASID's io page table no different than a RID page table. > > "kernel SVA" is, IMHO, not a desirable thing, it completely destroys > the kernel's DMA security model. > > > If people want to use an accelerator on memory allocated by vmalloc() > > things will get more complicated. But maybe we can delay solving that > > problem until someone comes up with a real use case that needs to > > do this? > > If you have a HW limitation that the device can only issue TLPs > with a PASID, even for kernel users, then I think the proper thing is > to tell the IOMMU layer than a certain 'struct device' enters > PASID-only mode and the IOMMU layer should construct an appropriate > PASID and flow the dma operations through it. > > Pretending the DMA layer doesn't exist and that PASID gets a free pass > is not OK in the kernel. I can see why a tight security model is needed to stop random devices having access to mamory that they should not be able to access. Now that PCIe devices can be plugged into Thunderbolt ports on computers, nobody wants to repeat the disaster that Firewire ports created for systems over a decade ago. But I'd like to challege the one-size-fits-all policy. There's a big difference between a random device plugged into a port (which may even lie about its VendorID/DeviceID) and a device that is part of the CPU socket. I'd like people to think of DSA as an extension to the instruction set. It implements asynchronous instructions like "MEMFILL" and "MEMCOPY". These can be limited in scope when executed in user processes or guests. But when executed by the host OS ring0 code they can have all the same access that ring0 code has when it dereferences a pointer. -Tony