Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp2592762pxb; Fri, 17 Sep 2021 13:32:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxH8cNiJ/eLUXXR4pAa7/fa20INkM5Q3HvldWD7MUYiY4VcH1WbMrD0G4e9V7og7RM/JzHd X-Received: by 2002:a05:6e02:12a1:: with SMTP id f1mr9236523ilr.293.1631910732205; Fri, 17 Sep 2021 13:32:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631910732; cv=none; d=google.com; s=arc-20160816; b=VP69e6W5hZ/GKhdJAgeCFMk6eUcF/UPiFE8sCG30p6fHcOwG9OjimA2sctCAvaqA3n bvkhgOaommO7fBDuB6sSTHDPj80AYFzCWFnU2RaGtBg8thHTGOHpKnrlhvEawtYRyj+a TF381gueTQXw/DxK3FLzXHTzMcdOzJRJxflTrR2Z1vnM5l9RmXO7jy6Fo4S1/BGdVETI fOVcm5KAdoX4pAeVUzAXTfV/Aqv64UxwtHbGctV1wlY9cFRTm84pXwWaxr3GTat3kmyA SyT+baKZfIWtq7EtuZVdt8G8ciylZSjgWRaKBDMgUnTM0PbVCJ+fJXwf6od6nyYRMrrd /3yQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:mail-followup-to:message-id:subject:cc:to:from:date :dkim-signature; bh=B4xbw9gEcqky1hkIaKGJsZCnwDYURbkYMy8wOSBcFZM=; b=i5wXgC9UxaW6+KEDnLDhlhvIHRuquAFAUnmwJS++2QiqOQVsri8jONbER2qFVIbx1n /l56grgKizfiOqu524AIUxkv081OpaArStI1hBeatjjlnUo2WRdG/Ap4uOtM+ruzE4iz TGCr7m3B2ui9KSLo1qlJWT7ZLwe/irA9ddRKcl9RQHW3BNo3qW6AdB+x55plog/NU+ot QcmpKx/gT+AWH/Rn8bkr9gpH6ZkRDiOGmuQD+lfGASfGSfVQeY0f2vw7gzByeQpPX0eW J2zvLd/qVaiyLwGCT6t9N3t2OG4xuozkwnsNMf0raZ6S15Lv2Y4LRKJgjJGxC8preSXP awFw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=DBbT+Z73; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a7si7304644ila.148.2021.09.17.13.31.28; Fri, 17 Sep 2021 13:32:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=DBbT+Z73; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243763AbhIQM0x (ORCPT + 99 others); Fri, 17 Sep 2021 08:26:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35742 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235941AbhIQM0u (ORCPT ); Fri, 17 Sep 2021 08:26:50 -0400 Received: from mail-wr1-x432.google.com (mail-wr1-x432.google.com [IPv6:2a00:1450:4864:20::432]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 19EE5C061574 for ; Fri, 17 Sep 2021 05:25:24 -0700 (PDT) Received: by mail-wr1-x432.google.com with SMTP id d21so14853523wra.12 for ; Fri, 17 Sep 2021 05:25:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=date:from:to:cc:subject:message-id:mail-followup-to:references :mime-version:content-disposition:in-reply-to; bh=B4xbw9gEcqky1hkIaKGJsZCnwDYURbkYMy8wOSBcFZM=; b=DBbT+Z73wXFx7Ix5ddCqc9nQajcrsU49nmmjtksdzvj4VIUhu9a12X6mxydVGcyr31 hkbTnOZYoHZBblsPGhC4cqiN5vTy2EZ/ap7N566BgNdEzkAG+xpa6VwhSk6rstGS1sPD 4IZWgIghyDL60XFxmzUrIJNR7pW0cc0ak4VI0= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id :mail-followup-to:references:mime-version:content-disposition :in-reply-to; bh=B4xbw9gEcqky1hkIaKGJsZCnwDYURbkYMy8wOSBcFZM=; b=kuGFeWDkkLcCRP7BDNiYrBXJo1bD0eD+m+D2R7m3p3OjDWE7WjTBkO6VjUVJJ/swkS WmfjLiOZoxMy98p7wNvIgACPwUNA7WSmC4cOPPubZVT66TXCDMFXYmlgnX7XeUCDgZFo H0HPcAQqw0QR1wlU5G6TiwoTaDOXVe1O+l/QnzFdeiUxqWseSIQzyW5fI+jyPkKNu+2B 5Hc2L0tsmIErPxu4SXn5J0uMES110fC4CaqfZh0PG8ltNw12cVgbymY9x1H5cM1JvZlJ 7rUrqdpV+iECRathunqkuCmzg/yADpHXva4ll9d/B9RbpNtLdPkp/7OwQE3hCDWyjqyf 9U6g== X-Gm-Message-State: AOAM530/75p9tSlHKg+SEDV/Z4jDciMq83Rz3b12KSEq+2uyuXpIbnYa qOSmIHMgMhq02N+ctKy1kOv0MQ== X-Received: by 2002:adf:f084:: with SMTP id n4mr12033899wro.362.1631881522631; Fri, 17 Sep 2021 05:25:22 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:57f4:0:efd0:b9e5:5ae6:c2fa]) by smtp.gmail.com with ESMTPSA id m18sm6529557wrn.85.2021.09.17.05.25.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Sep 2021 05:25:21 -0700 (PDT) Date: Fri, 17 Sep 2021 14:25:19 +0200 From: Daniel Vetter To: Oded Gabbay Cc: Jason Gunthorpe , "Linux-Kernel@Vger. Kernel. Org" , Greg Kroah-Hartman , Christian =?iso-8859-1?Q?K=F6nig?= , Gal Pressman , Yossi Leybovich , Maling list - DRI developers , linux-rdma , Linux Media Mailing List , Doug Ledford , Dave Airlie , Alex Deucher , Leon Romanovsky , Christoph Hellwig , amd-gfx list , "moderated list:DMA BUFFER SHARING FRAMEWORK" Subject: Re: [PATCH v6 0/2] Add p2p via dmabuf to habanalabs Message-ID: Mail-Followup-To: Oded Gabbay , Jason Gunthorpe , "Linux-Kernel@Vger. Kernel. Org" , Greg Kroah-Hartman , Christian =?iso-8859-1?Q?K=F6nig?= , Gal Pressman , Yossi Leybovich , Maling list - DRI developers , linux-rdma , Linux Media Mailing List , Doug Ledford , Dave Airlie , Alex Deucher , Leon Romanovsky , Christoph Hellwig , amd-gfx list , "moderated list:DMA BUFFER SHARING FRAMEWORK" References: <20210912165309.98695-1-ogabbay@kernel.org> <20210914161218.GF3544071@ziepe.ca> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Operating-System: Linux phenom 5.10.0-8-amd64 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 16, 2021 at 03:44:25PM +0300, Oded Gabbay wrote: > On Thu, Sep 16, 2021 at 3:31 PM Daniel Vetter wrote: > > > > On Wed, Sep 15, 2021 at 10:45:36AM +0300, Oded Gabbay wrote: > > > On Tue, Sep 14, 2021 at 7:12 PM Jason Gunthorpe wrote: > > > > > > > > On Tue, Sep 14, 2021 at 04:18:31PM +0200, Daniel Vetter wrote: > > > > > On Sun, Sep 12, 2021 at 07:53:07PM +0300, Oded Gabbay wrote: > > > > > > Hi, > > > > > > Re-sending this patch-set following the release of our user-space TPC > > > > > > compiler and runtime library. > > > > > > > > > > > > I would appreciate a review on this. > > > > > > > > > > I think the big open we have is the entire revoke discussions. Having the > > > > > option to let dma-buf hang around which map to random local memory ranges, > > > > > without clear ownership link and a way to kill it sounds bad to me. > > > > > > > > > > I think there's a few options: > > > > > - We require revoke support. But I've heard rdma really doesn't like that, > > > > > I guess because taking out an MR while holding the dma_resv_lock would > > > > > be an inversion, so can't be done. Jason, can you recap what exactly the > > > > > hold-up was again that makes this a no-go? > > > > > > > > RDMA HW can't do revoke. > > > > Like why? I'm assuming when the final open handle or whatever for that MR > > is closed, you do clean up everything? Or does that MR still stick around > > forever too? > > > > > > So we have to exclude almost all the HW and several interesting use > > > > cases to enable a revoke operation. > > > > > > > > > - For non-revokable things like these dma-buf we'd keep a drm_master > > > > > reference around. This would prevent the next open to acquire > > > > > ownership rights, which at least prevents all the nasty potential > > > > > problems. > > > > > > > > This is what I generally would expect, the DMABUF FD and its DMA > > > > memory just floats about until the unrevokable user releases it, which > > > > happens when the FD that is driving the import eventually gets closed. > > > This is exactly what we are doing in the driver. We make sure > > > everything is valid until the unrevokable user releases it and that > > > happens only when the dmabuf fd gets closed. > > > And the user can't close it's fd of the device until he performs the > > > above, so there is no leakage between users. > > > > Maybe I got the device security model all wrong, but I thought Guadi is > > single user, and the only thing it protects is the system against the > > Gaudi device trhough iommu/device gart. So roughly the following can > > happen: > > > > 1. User A opens gaudi device, sets up dma-buf export > > > > 2. User A registers that with RDMA, or anything else that doesn't support > > revoke. > > > > 3. User A closes gaudi device > This can not happen without User A closing the FD of the dma-buf it exported. > We prevent User A from closing the device because when it exported the > dma-buf, the driver's code took a refcnt of the user's private > structure. You can see that in export_dmabuf_common() in the 2nd > patch. There is a call there to hl_ctx_get. > So even if User A calls close(device_fd), the driver won't let any > other user open the device until User A closes the fd of the dma-buf > object. > > Moreover, once User A will close the dma-buf fd and the device is > released, the driver will scrub the device memory (this is optional > for systems who care about security). > > And AFAIK, User A can't close the dma-buf fd once it registered it > with RDMA, without doing unregister. > This can be seen in ib_umem_dmabuf_get() which calls dma_buf_get() > which does fget(fd) Yeah that's essentially what I was looking for. This is defacto hand-rolling the drm_master owner tracking stuff. As long as we have something like this in place it should be fine I think. -Daniel > > 4. User B opens gaudi device, assumes that it has full control over the > > device and uploads some secrets, which happen to end up in the dma-buf > > region user A set up > > > > 5. User B extracts secrets. > > > > > > I still don't think any of the complexity is needed, pinnable memory > > > > is a thing in Linux, just account for it in mlocked and that is > > > > enough. > > > > It's not mlocked memory, it's mlocked memory and I can exfiltrate it. > > Mlock is fine, exfiltration not so much. It's mlock, but a global pool and > > if you didn't munlock then the next mlock from a completely different user > > will alias with your stuff. > > > > Or is there something that prevents that? Oded at least explain that gaudi > > works like a gpu from 20 years ago, single user, no security at all within > > the device. > > -Daniel > > -- > > Daniel Vetter > > Software Engineer, Intel Corporation > > http://blog.ffwll.ch -- Daniel Vetter Software Engineer, Intel Corporation http://blog.ffwll.ch