Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp394963pxb; Thu, 23 Sep 2021 02:26:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxbKcTAEnAuYEg+u6QdWbUcFX2p6TNR1M9IOhFfp/AOQYOvnja3O/NQw84NPOUU+Z98Hakf X-Received: by 2002:a92:c26a:: with SMTP id h10mr2872360ild.284.1632389209659; Thu, 23 Sep 2021 02:26:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632389209; cv=none; d=google.com; s=arc-20160816; b=hWC8wR9GcZVWFXZrH5UjrJtCNmFRnOV1k3XqxLgcbTmOSiwYzCrjcxIQerUalHmkoW Ded8ZoYA7tc03WmE3p2HS+C2dwRcvP8L79S0VZ9RS4dCacfkFC/3mvnjHSZIQxZ6PYhM /+lXmt6j74+BgokOunR6ajoJLKZpDzFANAsR3FHVDora3hs5k6pVyDqMRWlYVslmauNr u37b4xW0Zb/nB0FE9otXgLKIe6CfDeWAexejZAI241LPI9wTRQ6f51KO34NUjM3tqlIn DROdidkiEqju8Jo4pz2nbRHUeBmm/ictwiRPQQ0GP3ieX5B4xeMKTaRdWhjZGweklQa+ zGxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=eeZV336N5BGmb3VuCW9M+uFb3ay6gz1iE8iSg4RzYJA=; b=AT0s156/YDH8zru/QzpWfSp49DRvbJz4I1qW+uL/JLRTCHP7xtnaji/CcMbUNeE1zN 2E+wTRVncAdC8lRpClnt4CQLj/CJBTyo9YWoNzWJ0mSl5IIE7gLhWTxmoYF2UDqEwXHn HBdHwt0pz5DUa/72BHEJ1EEu7TmuNAvCcblBKYjTH3BHMgo4OGWJv6Np76dc9PqAqmH8 nfk2zFyDFE6vbEbXBV21Uyh7KqJ83hlz11yE1gZ4tdlKJOZlvFgL/jgJu9uaC0x4ZYCH Z2HuXVbqnbr938LegF8Di+vI5+e9X1tSgqgwM5cVFArpwXYkz8J2q469cUxZi56OMUQD rWgw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fQJtSnrf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l1si5912765iln.37.2021.09.23.02.26.37; Thu, 23 Sep 2021 02:26:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fQJtSnrf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240156AbhIWJY7 (ORCPT + 99 others); Thu, 23 Sep 2021 05:24:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:46458 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240135AbhIWJY5 (ORCPT ); Thu, 23 Sep 2021 05:24:57 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C932E61263; Thu, 23 Sep 2021 09:23:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1632389005; bh=569bnNYpES6eJYp9Sh/W/cLEjYEtuiHWkMl00AUFATo=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=fQJtSnrfM/uDFOLC4+sEDSw5EB7H7cxc8dK5vTSSeTl710WpHddWJx0Hr66Ca9HQM 8qC0g9I7MlLwDPXitIG8z2/ArzDVSn1E1QwlbZ67XIdhF+Ja4z1a6VQP87+2Ew13hY NMDaSLdjxwRTfdaUrmXM+q1Z0KXVVlHsMfIIjeIptrczoGFBVc6gIrL3pSlu/nV6/X zmkouwRPfo7eUKGjRTAktnMg3Si1PEqJmp10feLI1nNENxLKxtpJi5nB0okentxAF1 Ed6Cca1Uj7LqyVrGwE5L9TMO1BiJEWLbFTcYdIGeq5kTK+xWBJ8vsJNwzR3Owxklu0 P//3pQMqoV6tw== Received: by mail-oi1-f177.google.com with SMTP id 24so8898905oix.0; Thu, 23 Sep 2021 02:23:25 -0700 (PDT) X-Gm-Message-State: AOAM531/4s/3WrnYfbH7uC9ye6czQ/3cCbU7+xhvC41ibaPvdXugowHS Sn1A5jlpiIKjEhXtvlrfomFhMNowUct1SWK5eds= X-Received: by 2002:aca:230f:: with SMTP id e15mr11840674oie.154.1632389005065; Thu, 23 Sep 2021 02:23:25 -0700 (PDT) MIME-Version: 1.0 References: <20210912165309.98695-1-ogabbay@kernel.org> <20210914161218.GF3544071@ziepe.ca> <20210916131014.GK3544071@ziepe.ca> In-Reply-To: From: Oded Gabbay Date: Thu, 23 Sep 2021 12:22:57 +0300 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v6 0/2] Add p2p via dmabuf to habanalabs To: Jason Gunthorpe , Daniel Vetter Cc: "Linux-Kernel@Vger. Kernel. Org" , Greg Kroah-Hartman , =?UTF-8?Q?Christian_K=C3=B6nig?= , Gal Pressman , Yossi Leybovich , Maling list - DRI developers , linux-rdma , Linux Media Mailing List , Doug Ledford , Dave Airlie , Alex Deucher , Leon Romanovsky , Christoph Hellwig , amd-gfx list , "moderated list:DMA BUFFER SHARING FRAMEWORK" Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Sep 18, 2021 at 11:38 AM Oded Gabbay wrote: > > On Fri, Sep 17, 2021 at 3:30 PM Daniel Vetter wrote: > > > > On Thu, Sep 16, 2021 at 10:10:14AM -0300, Jason Gunthorpe wrote: > > > On Thu, Sep 16, 2021 at 02:31:34PM +0200, Daniel Vetter wrote: > > > > On Wed, Sep 15, 2021 at 10:45:36AM +0300, Oded Gabbay wrote: > > > > > On Tue, Sep 14, 2021 at 7:12 PM Jason Gunthorpe wrote: > > > > > > > > > > > > On Tue, Sep 14, 2021 at 04:18:31PM +0200, Daniel Vetter wrote: > > > > > > > On Sun, Sep 12, 2021 at 07:53:07PM +0300, Oded Gabbay wrote: > > > > > > > > Hi, > > > > > > > > Re-sending this patch-set following the release of our user-space TPC > > > > > > > > compiler and runtime library. > > > > > > > > > > > > > > > > I would appreciate a review on this. > > > > > > > > > > > > > > I think the big open we have is the entire revoke discussions. Having the > > > > > > > option to let dma-buf hang around which map to random local memory ranges, > > > > > > > without clear ownership link and a way to kill it sounds bad to me. > > > > > > > > > > > > > > I think there's a few options: > > > > > > > - We require revoke support. But I've heard rdma really doesn't like that, > > > > > > > I guess because taking out an MR while holding the dma_resv_lock would > > > > > > > be an inversion, so can't be done. Jason, can you recap what exactly the > > > > > > > hold-up was again that makes this a no-go? > > > > > > > > > > > > RDMA HW can't do revoke. > > > > > > > > Like why? I'm assuming when the final open handle or whatever for that MR > > > > is closed, you do clean up everything? Or does that MR still stick around > > > > forever too? > > > > > > It is a combination of uAPI and HW specification. > > > > > > revoke here means you take a MR object and tell it to stop doing DMA > > > without causing the MR object to be destructed. > > > > > > All the drivers can of course destruct the MR, but doing such a > > > destruction without explicit synchronization with user space opens > > > things up to a serious use-after potential that could be a security > > > issue. > > > > > > When the open handle closes the userspace is synchronized with the > > > kernel and we can destruct the HW objects safely. > > > > > > So, the special HW feature required is 'stop doing DMA but keep the > > > object in an error state' which isn't really implemented, and doesn't > > > extend very well to other object types beyond simple MRs. > > > > Yeah revoke without destroying the MR doesn't work, and it sounds like > > revoke by destroying the MR just moves the can of worms around to another > > place. > > > > > > 1. User A opens gaudi device, sets up dma-buf export > > > > > > > > 2. User A registers that with RDMA, or anything else that doesn't support > > > > revoke. > > > > > > > > 3. User A closes gaudi device > > > > > > > > 4. User B opens gaudi device, assumes that it has full control over the > > > > device and uploads some secrets, which happen to end up in the dma-buf > > > > region user A set up > > > > > > I would expect this is blocked so long as the DMABUF exists - eg the > > > DMABUF will hold a fget on the FD of #1 until the DMABUF is closed, so > > > that #3 can't actually happen. > > > > > > > It's not mlocked memory, it's mlocked memory and I can exfiltrate > > > > it. > > > > > > That's just bug, don't make buggy drivers :) > > > > Well yeah, but given that habanalabs hand rolled this I can't just check > > for the usual things we have to enforce this in drm. And generally you can > > just open chardevs arbitrarily, and multiple users fighting over each > > another. The troubles only start when you have private state or memory > > allocations of some kind attached to the struct file (instead of the > > underlying device), or something else that requires device exclusivity. > > There's no standard way to do that. > > > > Plus in many cases you really want revoke on top (can't get that here > > unfortunately it seems), and the attempts to get towards a generic > > revoke() just never went anywhere. So again it's all hand-rolled > > per-subsystem. *insert lament about us not having done this through a > > proper subsystem* > > > > Anyway it sounds like the code takes care of that. > > -Daniel > > Daniel, Jason, > Thanks for reviewing this code. > > Can I get an R-B / A-B from you for this patch-set ? > > Thanks, > Oded A kind reminder. Thanks, Oded