Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2420677pxj; Sun, 13 Jun 2021 20:29:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzHis0FhBUGYLJDSmkX1xfUIFbJxb6uGstxNa3+68pt/MuHnn5E9OyECSFCfa7oDHyjlSRi X-Received: by 2002:a17:906:4308:: with SMTP id j8mr13454985ejm.315.1623641374848; Sun, 13 Jun 2021 20:29:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623641374; cv=none; d=google.com; s=arc-20160816; b=SKa190mXoqMIQug/RBzK0jPrr7boLXfwrUO4sMcet+ExxAt5Ed+SKmco8TYPu3jc5q EdMJcuANfeYABXh3B5kOztCw77TTjLLAjtVeQVX5sjmWphS/CGyhFIqdElVtjkIIs2In sdC4SuPw1i/jjDPLBbYfXLcjiSZMsqGvRmRAuA61rhaLpaocsEsakafBVUsAZz+jB20y Zs/SOLtPYMw4pMzzzzX3xLqxl07HpJSlOJfp4Nw95Doi4aWxwEVfPof/qclyW4VGZPtY pznicFyfvpwvKAtspaDnKsyjeiEQu3MGExiLqz8GQOdepy7sKk+/QFJMqtYYbMitF5JG cc7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:dkim-signature; bh=DH6kGuqwSpyXtcecevk99gjqJDJGvAzEG8igZ3sFLDE=; b=MfLiSn44LebyYUCkJH5my3eXsTwzqOgpRdMxJQ3bNGOJusvlvvxpa9HTef93HATnxU nAPyruaWjp+ziXCwiqTnK87622sf0Rf7bF1QHmKNTXHZu8+sg7URx93fSHiHpzuyk8pX ysbza2dD3yUv+9d3/I9D1BKfMocXt8m2y7UXm8SgH42xDq9E98evZU7rpacuOMXlhLvG /KXj8Ce/fo1xmhTUtkDEgLReANI4Q59JVXm0qjF9oId5yETfxbXYSd5/wSUpbyOcqK0X 15LIhbJq9lk4+wYNGKj5B2yMhQJpvRvfzSWlKY2R1Mwl5xpDRJWnPghTaTHYcMKGCxoA mjmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=a0E+gbJ4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 6si270589ejr.201.2021.06.13.20.29.02; Sun, 13 Jun 2021 20:29:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=a0E+gbJ4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232342AbhFNDZH (ORCPT + 99 others); Sun, 13 Jun 2021 23:25:07 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:58498 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232320AbhFNDZG (ORCPT ); Sun, 13 Jun 2021 23:25:06 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1623640983; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=DH6kGuqwSpyXtcecevk99gjqJDJGvAzEG8igZ3sFLDE=; b=a0E+gbJ404sPFbXC51m0g1Sg1AYrbNJD01Clm1WwB1ff0pdJe1+hDptrZSJhJA/R+Uow8t PbYzdHsP5yndYPwaL6d02FKNl4DtSYSCCvl/ydRLn1DUTulDrv86mS3g4AT5wmdZgcXCj7 Uh4aQdEyeBkX6ioQ095H+iFoWgU6GP0= Received: from mail-ot1-f70.google.com (mail-ot1-f70.google.com [209.85.210.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-172-3e4DwTBrPFC_DyFT_e_usg-1; Sun, 13 Jun 2021 23:23:02 -0400 X-MC-Unique: 3e4DwTBrPFC_DyFT_e_usg-1 Received: by mail-ot1-f70.google.com with SMTP id q20-20020a9d7c940000b02903f5a4101f8eso6388564otn.17 for ; Sun, 13 Jun 2021 20:23:02 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:in-reply-to :references:organization:mime-version:content-transfer-encoding; bh=DH6kGuqwSpyXtcecevk99gjqJDJGvAzEG8igZ3sFLDE=; b=kAqXkiQ+Ai+gMKVF07jcvcOekdSplrh0F/Kr3ipq2tReu+7ch9ZYa7wb0JHjdH6XF4 OMpmpuK5BcCyf/PWDfRRNHLf2TuaiwTCOr8aP8+Hjijo5UfKZ9iTMm8dG0tdli1L/zXi 45ngVANG3j7uw3PZszO56BCuZvnhxYhjjANGK7nidR4Xv25O7oOV2KRK9kuP6PbBQodv uccJOdZFTnkmP1+f5nQEjZqz2eMghDKPXXp1N/lzWjbRZtMGHYO3rpvJnkR95YMsJ+gP yah2Kpc4V4xFOpoOFIqPmW9jZnHnm/p4UVj4Oxbo/Sjd6EmnYGSCPmqs1abqeX6mokgZ oKXA== X-Gm-Message-State: AOAM5322nHAMqsJVIa7WmDPJyHSSohdeMWozb6b63FsXqjmA0k5Q5CsQ lsErUU+Fm1fhXX0crlYL2dwPvi5Ml4/EctUM4RXqkktf2y0GJjofxFCwjYl0X1ERHbl2sP9CeIV nSUtj6ZuWFq+rK3V14lv+r0Pl X-Received: by 2002:a4a:d781:: with SMTP id c1mr11469391oou.23.1623640981480; Sun, 13 Jun 2021 20:23:01 -0700 (PDT) X-Received: by 2002:a4a:d781:: with SMTP id c1mr11469382oou.23.1623640981204; Sun, 13 Jun 2021 20:23:01 -0700 (PDT) Received: from redhat.com ([198.99.80.109]) by smtp.gmail.com with ESMTPSA id c205sm2706192oib.20.2021.06.13.20.22.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 13 Jun 2021 20:23:00 -0700 (PDT) Date: Sun, 13 Jun 2021 21:22:58 -0600 From: Alex Williamson To: "Tian, Kevin" Cc: Jason Gunthorpe , Joerg Roedel , Jean-Philippe Brucker , David Gibson , Jason Wang , "parav@mellanox.com" , "Enrico Weigelt, metux IT consult" , Paolo Bonzini , Shenming Lu , Eric Auger , Jonathan Corbet , "Raj, Ashok" , "Liu, Yi L" , "Wu, Hao" , "Jiang, Dave" , Jacob Pan , "Kirti Wankhede" , Robin Murphy , "kvm@vger.kernel.org" , "iommu@lists.linux-foundation.org" , "David Woodhouse" , LKML , "Lu Baolu" Subject: Re: Plan for /dev/ioasid RFC v2 Message-ID: <20210613212258.6f2a2dac.alex.williamson@redhat.com> In-Reply-To: References: <20210609123919.GA1002214@nvidia.com> <20210609150009.GE1002214@nvidia.com> <20210609101532.452851eb.alex.williamson@redhat.com> <20210609102722.5abf62e1.alex.williamson@redhat.com> <20210609184940.GH1002214@nvidia.com> <20210610093842.6b9a4e5b.alex.williamson@redhat.com> <20210611153850.7c402f0b.alex.williamson@redhat.com> Organization: Red Hat X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.32; x86_64-redhat-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 14 Jun 2021 03:09:31 +0000 "Tian, Kevin" wrote: > > From: Alex Williamson > > Sent: Saturday, June 12, 2021 5:39 AM > > > > On Fri, 11 Jun 2021 00:58:35 +0000 > > "Tian, Kevin" wrote: > > > > > Hi, Alex, > > > > > > > From: Alex Williamson > > > > Sent: Thursday, June 10, 2021 11:39 PM > > > > > > > > On Wed, 9 Jun 2021 15:49:40 -0300 > > > > Jason Gunthorpe wrote: > > > > > > > > > On Wed, Jun 09, 2021 at 10:27:22AM -0600, Alex Williamson wrote: > > > > > > > > > > > > > It is a kernel decision, because a fundamental task of the kernel is > > to > > > > > > > > ensure isolation between user-space tasks as good as it can. And if > > a > > > > > > > > device assigned to one task can interfer with a device of another > > task > > > > > > > > (e.g. by sending P2P messages), then the promise of isolation is > > > > broken. > > > > > > > > > > > > > > AIUI, the IOASID model will still enforce IOMMU groups, but it's not > > an > > > > > > > explicit part of the interface like it is for vfio. For example the > > > > > > > IOASID model allows attaching individual devices such that we have > > > > > > > granularity to create per device IOASIDs, but all devices within an > > > > > > > IOMMU group are required to be attached to an IOASID before they > > can > > > > be > > > > > > > used. > > > > > > > > > > Yes, thanks Alex > > > > > > > > > > > > It's not entirely clear to me yet how that last bit gets > > > > > > > implemented though, ie. what barrier is in place to prevent device > > > > > > > usage prior to reaching this viable state. > > > > > > > > > > The major security checkpoint for the group is on the VFIO side. We > > > > > must require the group before userspace can be allowed access to any > > > > > device registers. Obtaining the device_fd from the group_fd does this > > > > > today as the group_fd is the security proof. > > > > > > > > > > Actually, thinking about this some more.. If the only way to get a > > > > > working device_fd in the first place is to get it from the group_fd > > > > > and thus pass a group-based security check, why do we need to do > > > > > anything at the ioasid level? > > > > > > > > > > The security concept of isolation was satisfied as soon as userspace > > > > > opened the group_fd. What do more checks in the kernel accomplish? > > > > > > > > Opening the group is not the extent of the security check currently > > > > required, the group must be added to a container and an IOMMU model > > > > configured for the container *before* the user can get a devicefd. > > > > Each devicefd creates a reference to this security context, therefore > > > > access to a device does not exist without such a context. > > > > > > IIUC each device has a default domain when it's probed by iommu driver > > > at boot time. This domain includes an empty page table, implying that > > > device is already in a security context before it's probed by device driver. > > > > The default domain could be passthrough though, right? > > Good point. > > > > > > Now when this device is added to vfio, vfio creates another security > > > context through above sequence. This sequence requires the device to > > > switch from default security context to this new one, before it can be > > > accessed by user. > > > > This is true currently, we use group semantics with the type1 IOMMU > > backend to attach all devices in the group to a secure context, > > regardless of the default domain. > > > > > Then I wonder whether it's really necessary. As long as a device is in > > > a security context at any time, access to a device can be allowed. The > > > user itself should ensure that the access happens only after the device > > > creates a reference to the new security context that is desired by this > > > user. > > > > > > Then what does group really bring to us? > > > > By definition an IOMMU group is the smallest set of devices that we > > can consider isolated from all other devices. Therefore devices in a > > group are not necessarily isolated from each other. Therefore if any > > device within a group is not isolated, the group is not isolated. VFIO > > needs to know when it's safe to provide userspace access to the device, > > but the device isolation is dependent on the group isolation. The > > group is therefore part of this picture whether implicit or explicit. > > > > > With this new proposal we just need to make sure that a device cannot > > > be attached to any IOASID before all devices in its group are bound to > > > the IOASIDfd. If we want to start with a vfio-like policy, then all devices > > > in the group must be attached to the same IOASID. Or as Jason suggests, > > > they can attach to different IOASIDs (if in the group due to !ACS) if the > > > user wants, or have some devices attached while others detached since > > > both are in a security context anyway. > > > > But if it's the device attachment to the IOASID that provides the > > isolation and the user might attach a device to multiple IOASIDs within > > the same IOASIDfd, and presumably make changes to the mapping of device > > to IOASID dynamically, are we interrupting user access around each of > > those changes? How would vfio be able to track this, and not only > > track it per device, but for all devices in the group. Suggesting a > > user needs to explicitly attach every device in the group is also a > > semantic change versus existing vfio, where other devices in the group > > must only be considered to be in a safe state for the group to be > > usable. > > > > The default domain may indeed be a solution to the problem, but we need > > to enforce a secure default domain for all devices in the group. To me > > that suggests that binding the *group* to an IOASIDfd is the point at > > which device access becomes secure. VFIO should be able to consider > > that the IOASIDfd binding has taken over ownership of the DMA context > > for the device and it will always be either an empty, isolated, default > > domain or a user defined IOASID. > > Yes, this is one way of enforcing the group security. > > In the meantime, I'm thinking about another way whether group > security can be enforced in the iommu layer to relax the uAPI design. > If a device can be always blocked from accessing memory in the > IOMMU before it's bound to a driver or more specifically before > the driver moves it to a new security context, then there is no need > for VFIO to track whether IOASIDfd has taken over ownership of > the DMA context for all devices within a group. But we know we don't have IOMMU level isolation between devices in the same group, so I don't see how this helps us. > But as you said this cannot be achieved via existing default domain > approach. So far a device is always attached to a domain: > > - DOMAIN_IDENTITY: a default domain without DMA protection > - DOMAIN_DMA: a default domain with DMA protection via DMA > API and iommu core > - DOMAIN_UNMANAGED: a driver-created domain which is not > managed by iommu core. > > The special sequence in current vfio group design is to mitigate > the 1st case, i.e. if a device is left in passthrough mode before > bound to VFIO it's definitely insecure to allow user to access it. > Then the sequence ensures that the user access is granted on it > only after all devices within a group switch to a security context. > > Now if the new proposed scheme can be supported, a device > is always in a security context (block-dma) before it's switched > to a new security context and existing domain types should be > applied only in the new context when the device starts to do > DMAs. For VFIO case this switch happens explicitly when attaching > the device to an IOASID. For kernel driver it's implicit e.g. could > happen when the 1st DMA API call is received. > > If this works I didn't see the need for vfio to keep the sequence. > VFIO still keeps group fd to claim ownership of all devices in a > group. Once it's done, vfio doesn't need to track the device attach > status and user access can be always granted regardless of > how the attach status changes. Moving a device from IOASID1 > to IOASID2 involves detaching from IOASID1 (back to blocked > dma context) and then reattaching to IOASID2 (switch to a > new security context). > > Following this direction even IOASIDfd doesn't need to verify > the group attach upon such guarantee from the iommu layer. > The devices within a group can be in different security contexts, > e.g. with some devices attached to GPA IOASID while others not > attached. In this way vfio userspace could choose to not attach > every device of a group to sustain the current semantics. It seems like this entirely misses the point of groups with multiple devices. If we had IOMMU level isolation between all devices, we'd never have multi-device groups. Thanks, Alex