Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp4643552pxb; Tue, 28 Sep 2021 00:09:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzEU1mP8feu/f9CoMoCHKrM2GlvFR9xYcRc/TjUjeWHfvYftXEdvV5c0Kzw2LHEx9DFh4Rl X-Received: by 2002:a50:8145:: with SMTP id 63mr2848179edc.190.1632812974168; Tue, 28 Sep 2021 00:09:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632812974; cv=none; d=google.com; s=arc-20160816; b=lGtwW0A55qEwlk9qhizhs6d8COOaJElHf4HxHkhaNzu8yOVtdosDr9bQMhXf/pen9D tszjd2ieX2A2RXOg6djiaKv8TBcCblmwqpYl/EuHoYLm86M12mZGSjCCr0awmMLIkiyP hk7WDAohT7ftrimTbvtK2uU+pnAo3Q+5yQ5rMMAjKeWsTLHdn29m2eIi9uWmqkBxSF1I ejiCbUlt11VsohqPjnrsayD6NyxbYFvHUZgLMnMouhZSE23TuX5Kg0Xmr8P77U539vNo TC/rgEFWD2mnSmwa1U1PZMHoBCzEj5gRqb2YO74n3FgV0bOa/6mw6TMuj7HYzW2rkZil UsKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=AWjXHBtklarPMQd5K78TMw1vQkbWpigVxV9haTdwk/I=; b=P2RgAu9AbMUusQEIegyXqlDEXTMAVllkBkDSMdONII7Q1jnZYVO3y7hdkYqTa6N+0A ZCcQi74iJk4Yn6DJcRgJK2RLKXGIYG5ZiIyfR+4cqZtcXVRdWiYT4qKBk9VhB6n1xFcP GwrDIlJyZvKnqA+B6t7Nr+V+RcNXK797peJFiuujisb/bckTr8CxYSgFCMmtGkicZUQk B5Dem3ST7Sg3vyezeds0R/qW2eK+neQnW6YACPf0qm9QZjCYyRVWxz75C4eK9mnnpyZa cF8LYAG4KaFa1rO7AVHA8p5FenxRvCzh34XUogG4vY/lJ37in3iUWJKD2qAJI0LFeMFJ Zaiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="ZYDfy30/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p9si21074274ejn.472.2021.09.28.00.09.09; Tue, 28 Sep 2021 00:09:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="ZYDfy30/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239167AbhI1HGf (ORCPT + 99 others); Tue, 28 Sep 2021 03:06:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:42404 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238806AbhI1HGe (ORCPT ); Tue, 28 Sep 2021 03:06:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 40BE06120D; Tue, 28 Sep 2021 07:04:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1632812695; bh=uk0cBqp8mJmxC4hvpD+WS8Fqi0WFUUo+M5zqdDQbazY=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=ZYDfy30/tBP5/iCcMrH4okxJH98hSVzSe0pHLCxrxNCdYHE0/mDev9XllrrCJRE9B 7Mk4dWURNWeAaz33Mj6Cu5pQtxE2qHGKhgD2F8Wn0MoEsttBsBIgdUN9Ft3MC3m+bZ yNlUoWIAzhKfLvhvHziiUERFnyWi4HO+uXMuvB4Q3/8xhSLN7vMhdAeKHAsDC/GQTy xb1YIltPnbmNP53U4svjLs+CZZZfIGgQLl/5pV9boVk2p62lG3/RsawwZgD3/isy1f ESY0Bsi3N9m1humhlZjWtb9oy2khd+hy4HO2qiQX5/ciGOrK040W+3VpS1eAbyPFCp oN0WjKPKJrI1A== Received: by mail-yb1-f178.google.com with SMTP id m132so9545361ybf.8; Tue, 28 Sep 2021 00:04:55 -0700 (PDT) X-Gm-Message-State: AOAM531iVl5u4o6nc/ydr18bqVineNouOWwO5H1xEefd/xRMFUUhnyFX zO54x0126YyCsPu4H/z9HmHMhm2vF46scbco92E= X-Received: by 2002:a25:5b85:: with SMTP id p127mr744801ybb.444.1632812694370; Tue, 28 Sep 2021 00:04:54 -0700 (PDT) MIME-Version: 1.0 References: <20210912165309.98695-1-ogabbay@kernel.org> <20210914161218.GF3544071@ziepe.ca> <20210916131014.GK3544071@ziepe.ca> In-Reply-To: From: Oded Gabbay Date: Tue, 28 Sep 2021 10:04:29 +0300 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v6 0/2] Add p2p via dmabuf to habanalabs To: Jason Gunthorpe , Daniel Vetter , Dave Airlie Cc: "Linux-Kernel@Vger. Kernel. Org" , Greg Kroah-Hartman , =?UTF-8?Q?Christian_K=C3=B6nig?= , Gal Pressman , Yossi Leybovich , Maling list - DRI developers , linux-rdma , Linux Media Mailing List , Doug Ledford , Alex Deucher , Leon Romanovsky , Christoph Hellwig , amd-gfx list , "moderated list:DMA BUFFER SHARING FRAMEWORK" Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 23, 2021 at 12:22 PM Oded Gabbay wrote: > > On Sat, Sep 18, 2021 at 11:38 AM Oded Gabbay wrote: > > > > On Fri, Sep 17, 2021 at 3:30 PM Daniel Vetter wrote: > > > > > > On Thu, Sep 16, 2021 at 10:10:14AM -0300, Jason Gunthorpe wrote: > > > > On Thu, Sep 16, 2021 at 02:31:34PM +0200, Daniel Vetter wrote: > > > > > On Wed, Sep 15, 2021 at 10:45:36AM +0300, Oded Gabbay wrote: > > > > > > On Tue, Sep 14, 2021 at 7:12 PM Jason Gunthorpe wrote: > > > > > > > > > > > > > > On Tue, Sep 14, 2021 at 04:18:31PM +0200, Daniel Vetter wrote: > > > > > > > > On Sun, Sep 12, 2021 at 07:53:07PM +0300, Oded Gabbay wrote: > > > > > > > > > Hi, > > > > > > > > > Re-sending this patch-set following the release of our user-space TPC > > > > > > > > > compiler and runtime library. > > > > > > > > > > > > > > > > > > I would appreciate a review on this. > > > > > > > > > > > > > > > > I think the big open we have is the entire revoke discussions. Having the > > > > > > > > option to let dma-buf hang around which map to random local memory ranges, > > > > > > > > without clear ownership link and a way to kill it sounds bad to me. > > > > > > > > > > > > > > > > I think there's a few options: > > > > > > > > - We require revoke support. But I've heard rdma really doesn't like that, > > > > > > > > I guess because taking out an MR while holding the dma_resv_lock would > > > > > > > > be an inversion, so can't be done. Jason, can you recap what exactly the > > > > > > > > hold-up was again that makes this a no-go? > > > > > > > > > > > > > > RDMA HW can't do revoke. > > > > > > > > > > Like why? I'm assuming when the final open handle or whatever for that MR > > > > > is closed, you do clean up everything? Or does that MR still stick around > > > > > forever too? > > > > > > > > It is a combination of uAPI and HW specification. > > > > > > > > revoke here means you take a MR object and tell it to stop doing DMA > > > > without causing the MR object to be destructed. > > > > > > > > All the drivers can of course destruct the MR, but doing such a > > > > destruction without explicit synchronization with user space opens > > > > things up to a serious use-after potential that could be a security > > > > issue. > > > > > > > > When the open handle closes the userspace is synchronized with the > > > > kernel and we can destruct the HW objects safely. > > > > > > > > So, the special HW feature required is 'stop doing DMA but keep the > > > > object in an error state' which isn't really implemented, and doesn't > > > > extend very well to other object types beyond simple MRs. > > > > > > Yeah revoke without destroying the MR doesn't work, and it sounds like > > > revoke by destroying the MR just moves the can of worms around to another > > > place. > > > > > > > > 1. User A opens gaudi device, sets up dma-buf export > > > > > > > > > > 2. User A registers that with RDMA, or anything else that doesn't support > > > > > revoke. > > > > > > > > > > 3. User A closes gaudi device > > > > > > > > > > 4. User B opens gaudi device, assumes that it has full control over the > > > > > device and uploads some secrets, which happen to end up in the dma-buf > > > > > region user A set up > > > > > > > > I would expect this is blocked so long as the DMABUF exists - eg the > > > > DMABUF will hold a fget on the FD of #1 until the DMABUF is closed, so > > > > that #3 can't actually happen. > > > > > > > > > It's not mlocked memory, it's mlocked memory and I can exfiltrate > > > > > it. > > > > > > > > That's just bug, don't make buggy drivers :) > > > > > > Well yeah, but given that habanalabs hand rolled this I can't just check > > > for the usual things we have to enforce this in drm. And generally you can > > > just open chardevs arbitrarily, and multiple users fighting over each > > > another. The troubles only start when you have private state or memory > > > allocations of some kind attached to the struct file (instead of the > > > underlying device), or something else that requires device exclusivity. > > > There's no standard way to do that. > > > > > > Plus in many cases you really want revoke on top (can't get that here > > > unfortunately it seems), and the attempts to get towards a generic > > > revoke() just never went anywhere. So again it's all hand-rolled > > > per-subsystem. *insert lament about us not having done this through a > > > proper subsystem* > > > > > > Anyway it sounds like the code takes care of that. > > > -Daniel > > > > Daniel, Jason, > > Thanks for reviewing this code. > > > > Can I get an R-B / A-B from you for this patch-set ? > > > > Thanks, > > Oded > > A kind reminder. > > Thanks, > Oded Hi, I know last week was LPC and maybe this got lost in the inbox, so I'm sending it again to make sure you got my request for R-B / A-B. Thanks, Oded