Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1422468pxj; Fri, 18 Jun 2021 06:50:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxqpRYf7e3t4A995GWLfVSywmOkNeTZWAY6Vqtjgh42pOIBPNWKKW5LMKxpWR9j076j/+4j X-Received: by 2002:a17:906:6d59:: with SMTP id a25mr3000759ejt.83.1624024237058; Fri, 18 Jun 2021 06:50:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624024237; cv=none; d=google.com; s=arc-20160816; b=oljA4wKigiqwqWAE74KxtSPBFg2maAgwCWmpRKaVgL1bcgOg5N2lgGL0+KgrhIVJ1t eZC4quyUJ8JwexA/WKfV+EBn9U62X3CnbbHvQLi1+BcbTSB0DjdPpuYZUz28cn1HEzws I4X5GVxa2axUjcvNs13miz4KcZN43GgQMA/gJLSbjfl0ji0zVlbKUYpPUTeIruazOlCG nPIZrgOxUwIXzFkcCfVTElScKHS2LI0IiqXuZoKUqb87oAqzKz6zfVT+a6yYe27SA38l IwXIvidkU/LSDkI31RVtHe+VNeoC2qOJUvkzrgZUgK3F62TxK1MJq6/LEBHKxepxE89Z /Zaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=0bhZZpdQlnlVmcDccWtdzhMm2nsWqMQd2KVxci7Kto8=; b=tMVqWQnhydHQJu2MdcfrK9Y5zrVy13dSgiotMbCCgmfSLOcKWZMD4PR0UXt7gum9FK LPJGQkwCJWgXvHiOH9K82Z4nbTyy3dk3QAFtOzIxHNEQ7xhPcJdNNglYM7kQxRaZziMm KCMY+cbM1EG5esTS+tW46ucAo3POh39jA30ButmMcE0+TOGEtwemk0joWmyXC7i1Wmxw rss6LRIUhHmHcoNNUwgyfy3fY4yK6WZEJmMC5i9mKjhPKN5BQezIFpYSMRlEJjfbSGIz 97alJBByK/+GKCzqEGhi8xlhGDGtzNnFKpqGrC9yrP/GyeRViN1dzCaMF4HYyjW3u1Fi Vt0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d23si8832642ede.200.2021.06.18.06.50.13; Fri, 18 Jun 2021 06:50:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234015AbhFRNuD (ORCPT + 99 others); Fri, 18 Jun 2021 09:50:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35920 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233615AbhFRNuD (ORCPT ); Fri, 18 Jun 2021 09:50:03 -0400 Received: from theia.8bytes.org (8bytes.org [IPv6:2a01:238:4383:600:38bc:a715:4b6d:a889]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DCCA0C061574; Fri, 18 Jun 2021 06:47:53 -0700 (PDT) Received: by theia.8bytes.org (Postfix, from userid 1000) id 6801E3A7; Fri, 18 Jun 2021 15:47:52 +0200 (CEST) Date: Fri, 18 Jun 2021 15:47:51 +0200 From: Joerg Roedel To: "Tian, Kevin" Cc: Alex Williamson , Jason Gunthorpe , Jean-Philippe Brucker , David Gibson , Jason Wang , "parav@mellanox.com" , "Enrico Weigelt, metux IT consult" , Paolo Bonzini , Shenming Lu , Eric Auger , Jonathan Corbet , "Raj, Ashok" , "Liu, Yi L" , "Wu, Hao" , "Jiang, Dave" , Jacob Pan , Kirti Wankhede , Robin Murphy , "kvm@vger.kernel.org" , "iommu@lists.linux-foundation.org" , David Woodhouse , LKML , Lu Baolu Subject: Re: Plan for /dev/ioasid RFC v2 Message-ID: References: <20210611133828.6c6e8b29.alex.williamson@redhat.com> <20210612012846.GC1002214@nvidia.com> <20210612105711.7ac68c83.alex.williamson@redhat.com> <20210614140711.GI1002214@nvidia.com> <20210614102814.43ada8df.alex.williamson@redhat.com> <20210615101215.4ba67c86.alex.williamson@redhat.com> <20210616133937.59050e1a.alex.williamson@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Kevin, On Thu, Jun 17, 2021 at 07:31:03AM +0000, Tian, Kevin wrote: > Now let's talk about the new IOMMU behavior: > > - A device is blocked from doing DMA to any resource outside of > its group when it's probed by the IOMMU driver. This could be a > special state w/o attaching to any domain, or a new special domain > type which differentiates it from existing domain types (identity, > dma, or unmanged). Actually existing code already includes a > IOMMU_DOMAIN_BLOCKED type but nobody uses it. There is a reason for the default domain to exist: Devices which require RMRR mappings to be present. You can't just block all DMA from devices until a driver takes over, we put much effort into making sure there is not even a small window in time where RMRR regions (unity mapped regions on AMD) are not mapped. And if a device has no RMRR regions defined, then the default domain will be identical to a blocking domain. Device driver bugs don't count here, as they can be fixed. The kernel trusts itself, so we can rely on drivers unmapping all of their DMA buffers. Maybe that should be checked by dma-debug to find violations there. Regards, Joerg