Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp5685276pxj; Wed, 23 Jun 2021 06:55:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxdtUfEjWL1yXmUVAVQkmlKJZhmZF4Z14oNZArFmDu0R8yqG9iwVQKa1BB90YX+QLUv18Tx X-Received: by 2002:a05:6402:51d0:: with SMTP id r16mr13055837edd.138.1624456558660; Wed, 23 Jun 2021 06:55:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624456558; cv=none; d=google.com; s=arc-20160816; b=0YXZKga/CqMYP/GsyLPrH0WKOEWuyW8zhBZqFJrtadcIesoMReIjqJV3NNwSuKPyjr EeFaEVIjnewy5LuqpPuI0CFXbsNxdVhtWEmjzY4ySrQ+hMzVheL8vBg8BycTQFKdyR/e DRj25vkE0E9KTh5SB+fh9zDIjJl2/FGuM/2lrKtUJjC8HV30BBdxOwv2x6vLfkQbB8JI uvnUvZxW5dOCE+qPY21+Kzq/icdeBNIzukRto2+34hnku4R8PEExdiPe+IJBMbff+NsZ 2SmK0w0/EmhgvHtnVHYJGcssmMdQaEF0NJByJ9mY3k8e6dCJn70Zu91X+XyeQ2F5XnLR XO5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=cLgFj61Q4Tbh3fxp/OuBS/I2gBFjG5+DvGiwzz0G6VE=; b=dGqhTnNIhjRjlWwt+yl09VbJNjOlNWuZe1pPPTd3IZLqXQAIBmQqjMPsXlPMzeIWm7 6g8ULRNKabUwKPDte+IukSa66t5AaINm19DsKNe35a802FWYN4K+NjS+5Qf25ZbgjSC8 pcZGj1D0XeIBBHo3XGg8RMRR6iV5ajm52Ev5mr1yrBvVa8y/3VFrP0rD2iNfwvWeZGd7 76NXczmUP1RFr345CnB4bwHcNFk1wNQaItx7M+pd54xtD/643jsHx1C55WRipEh+0oJt XbM2HX0A1iw+TONEDhp6c7iKGhOHNNIh0NUDJhj3QYfMqAklPthnVmiw5Hc+q0al8b2S u5/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=EMVeZtES; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yd7si12037314ejb.537.2021.06.23.06.55.35; Wed, 23 Jun 2021 06:55:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=EMVeZtES; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230392AbhFWN4s (ORCPT + 99 others); Wed, 23 Jun 2021 09:56:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:48370 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230229AbhFWN4r (ORCPT ); Wed, 23 Jun 2021 09:56:47 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C2E126120D; Wed, 23 Jun 2021 13:54:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624456469; bh=hYyYMjvBoYqZUjc4iHoF9iZ8mlqdhcrrQvHE2YL+mXE=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=EMVeZtES9Vdre/xYD+DpqGJzCImQLmchVgaz7hkPA+UdrgT9GetR3qzqfRZ9Y0gDp TZigkXB85apMaifPLs/XcwYyJjDdjooSEHBK0UsR2Knj8pxrI/0Yw2QMNpjqR6ggNL BM/a4Vj4iO5echfTg4jSjx2nOHfQ10kOl2oyujDdFaM8xpaa5uEKZMOw6n6DfzAo6i KX0kH23DnoUaQEnznOl/2s0Y8v7dwISnw5SsCwoig8LzpAV4rl6qLnkikJ/SNkmsJL 18b5YTBgI0aOt+C5RhTSIVk38bBW44PiIQhD/G4of8QSzPy/O7HPiOIcmO1n/1D82G KB37tHT+twQGg== Received: by mail-ed1-f48.google.com with SMTP id c7so3603176edn.6; Wed, 23 Jun 2021 06:54:29 -0700 (PDT) X-Gm-Message-State: AOAM53153QKo8TCyM0Lj2Ca54m+NGBnjGNVOb0lu1RbP3jiZh5u5lyu9 R3A3sW4yHWboXVOhCmWXPK60Lzj1BTp/ghbrpQ== X-Received: by 2002:a05:6402:cb0:: with SMTP id cn16mr12468162edb.165.1624456468126; Wed, 23 Jun 2021 06:54:28 -0700 (PDT) MIME-Version: 1.0 References: <20210621235248.2521620-1-dianders@chromium.org> <067dd86d-da7f-ac83-6ce6-b8fd5aba0b6f@arm.com> <20210622200219.GA28722@robh.at.kernel.org> In-Reply-To: From: Rob Herring Date: Wed, 23 Jun 2021 07:54:15 -0600 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 0/6] iommu: Enable devices to request non-strict DMA, starting with QCom SD/MMC To: Doug Anderson Cc: Saravana Kannan , Robin Murphy , Greg Kroah-Hartman , "Rafael J. Wysocki" , "Rafael J. Wysocki" , Will Deacon , Joerg Roedel , Bjorn Andersson , Ulf Hansson , Adrian Hunter , Bjorn Helgaas , Rob Clark , linux-arm-msm , PCI , quic_c_gdjako@quicinc.com, "list@263.net:IOMMU DRIVERS , Joerg Roedel ," , Sonny Rao , Sai Prakash Ranjan , Linux MMC List , Veerabhadrarao Badiganti , Rajat Jain , Joel Fernandes , Andy Gross , Bartosz Golaszewski , Dan Williams , Geert Uytterhoeven , Heikki Krogerus , Randy Dunlap , LKML Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 22, 2021 at 2:10 PM Doug Anderson wrote: > > Hi, > > On Tue, Jun 22, 2021 at 1:06 PM Saravana Kannan wrote: > > > > On Tue, Jun 22, 2021 at 1:02 PM Rob Herring wrote: > > > > > > On Tue, Jun 22, 2021 at 09:06:02AM -0700, Doug Anderson wrote: > > > > Hi, > > > > > > > > On Tue, Jun 22, 2021 at 4:35 AM Robin Murphy wrote: > > > > > > > > > > Hi Doug, > > > > > > > > > > On 2021-06-22 00:52, Douglas Anderson wrote: > > > > > > > > > > > > This patch attempts to put forward a proposal for enabling non-strict > > > > > > DMA on a device-by-device basis. The patch series requests non-strict > > > > > > DMA for the Qualcomm SDHCI controller as a first device to enable, > > > > > > getting a nice bump in performance with what's believed to be a very > > > > > > small drop in security / safety (see the patch for the full argument). > > > > > > > > > > > > As part of this patch series I am end up slightly cleaning up some of > > > > > > the interactions between the PCI subsystem and the IOMMU subsystem but > > > > > > I don't go all the way to fully remove all the tentacles. Specifically > > > > > > this patch series only concerns itself with a single aspect: strict > > > > > > vs. non-strict mode for the IOMMU. I'm hoping that this will be easier > > > > > > to talk about / reason about for more subsystems compared to overall > > > > > > deciding what it means for a device to be "external" or "untrusted". > > > > > > > > > > > > If something like this patch series ends up being landable, it will > > > > > > undoubtedly need coordination between many maintainers to land. I > > > > > > believe it's fully bisectable but later patches in the series > > > > > > definitely depend on earlier ones. Sorry for the long CC list. :( > > > > > > > > > > Unfortunately, this doesn't work. In normal operation, the default > > > > > domains should be established long before individual drivers are even > > > > > loaded (if they are modules), let alone anywhere near probing. The fact > > > > > that iommu_probe_device() sometimes gets called far too late off the > > > > > back of driver probe is an unfortunate artefact of the original > > > > > probe-deferral scheme, and causes other problems like potentially > > > > > malformed groups - I've been forming a plan to fix that for a while now, > > > > > so I for one really can't condone anything trying to rely on it. > > > > > Non-deterministic behaviour based on driver probe order for multi-device > > > > > groups is part of the existing problem, and your proposal seems equally > > > > > vulnerable to that too. > > > > > > > > Doh! :( I definitely can't say I understand the iommu subsystem > > > > amazingly well. It was working for me, but I could believe that I was > > > > somehow violating a rule somewhere. > > > > > > > > I'm having a bit of a hard time understanding where the problem is > > > > though. Is there any chance that you missed the part of my series > > > > where I introduced a "pre_probe" step? Specifically, I see this: > > > > > > > > * really_probe() is called w/ a driver and a device. > > > > * -> calls dev->bus->dma_configure() w/ a "struct device *" > > > > * -> eventually calls iommu_probe_device() w/ the device. > > > > * -> calls iommu_alloc_default_domain() w/ the device > > > > * -> calls iommu_group_alloc_default_domain() > > > > * -> always allocates a new domain > > > > > > > > ...so we always have a "struct device" when a domain is allocated if > > > > that domain is going to be associated with a device. > > > > > > > > I will agree that iommu_probe_device() is called before the driver > > > > probe, but unless I missed something it's after the device driver is > > > > loaded. ...and assuming something like patch #1 in this series looks > > > > OK then iommu_probe_device() will be called after "pre_probe". > > > > > > > > So assuming I'm not missing something, I'm not actually relying the > > > > IOMMU getting init off the back of driver probe. > > > > > > > > > > > > > FWIW we already have a go-faster knob for people who want to tweak the > > > > > security/performance compromise for specific devices, namely the sysfs > > > > > interface for changing a group's domain type before binding the relevant > > > > > driver(s). Is that something you could use in your application, say from > > > > > an initramfs script? > > > > > > > > We've never had an initramfs script in Chrome OS. I don't know all the > > > > history of why (I'm trying to check), but I'm nearly certain it was a > > > > conscious decision. Probably it has to do with the fact that we're not > > > > trying to build a generic distribution where a single boot source can > > > > boot a huge variety of hardware. We generally have one kernel for a > > > > class of devices. I believe avoiding the initramfs just keeps things > > > > simpler. > > > > > > > > I think trying to revamp Chrome OS to switch to an initramfs type > > > > system would be a pretty big undertaking since (as I understand it) > > > > you can't just run a little command and then return to the normal boot > > > > flow. Once you switch to initramfs you're committing to finding / > > > > setting up the rootfs yourself and on Chrome OS I believe that means a > > > > whole bunch of dm-verity work. > > > > > > > > > > > > ...so probably the initramfs is a no-go for me, but I'm still crossing > > > > my fingers that the pre_probe() might be legit if you take a second > > > > look at it? > > > > > > Couldn't you have a driver flag that has the same effect as twiddling > > > sysfs? At the being of probe, check the flag and go set the underlying > > > sysfs setting in the device. > > > > My understanding of what Robin is saying is that we'd need this info > > well before the driver is even available. The pre_probe() is > > effectively doing the same thing you are suggesting. > > Right, I was just about to respond with the same. ;-) So overall right > now we're blocked waiting for someone to point out the error in my > logic. ;-) Okay, I don't see how sysfs would work in that case either. You can't assume the driver is not available until after sysfs. But I'll defer to others... > > > Though you may want this to be per device, not per driver. To do that > > > early, I think you'd need a DT property. I wouldn't be totally opposed > > > to that and I appreciate you not starting there. :) > > > > Which is what I'm suggest elsewhere in the thread: > > > > https://lore.kernel.org/lkml/CAGETcx83qCZF5JN5cqXxdSFiEgfc4jYESJg-RepL2wJXJv0Eww@mail.gmail.com/ > > Rob: I'd be happy if you wanted to comment on that thread. If you say > that it's fine to add a generic device tree property to control > strictness then I'm more than happy to add support for it. I've been > going on the theory that you'd NAK such a property but I'm totally > good with being wrong. ;-) > > I'd be more than happy if you could suggest what you'd envision such a > property to be named. You want me to do the hard part? ;) Would this work as a flag in iommus cell (either another cell or bit in the existing cell)? You could go the compatible match list route as well. At least until you work out the kernel implementation. Rob