lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID:
 <PH8PR12MB667431B8552D271F906F8F4BB8FF2@PH8PR12MB6674.namprd12.prod.outlook.com>
Date: Mon, 3 Jun 2024 07:50:59 +0000
From: Vidya Sagar <vidyas@...dia.com>
To: Jason Gunthorpe <jgg@...dia.com>, Bjorn Helgaas <helgaas@...nel.org>
CC: "corbet@....net" <corbet@....net>, "bhelgaas@...gle.com"
	<bhelgaas@...gle.com>, Gal Shalom <galshalom@...dia.com>, Leon Romanovsky
	<leonro@...dia.com>, Thierry Reding <treding@...dia.com>, Jon Hunter
	<jonathanh@...dia.com>, Masoud Moshref Javadi <mmoshrefjava@...dia.com>,
	Shahaf Shuler <shahafs@...dia.com>, Vikram Sethi <vsethi@...dia.com>, Shanker
 Donthineni <sdonthineni@...dia.com>, Jiandi An <jan@...dia.com>, Tushar Dave
	<tdave@...dia.com>, "linux-doc@...r.kernel.org" <linux-doc@...r.kernel.org>,
	"linux-pci@...r.kernel.org" <linux-pci@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Krishna Thota
	<kthota@...dia.com>, Manikanta Maddireddy <mmaddireddy@...dia.com>,
	"sagar.tv@...il.com" <sagar.tv@...il.com>, Joerg Roedel <joro@...tes.org>,
	Will Deacon <will@...nel.org>, Robin Murphy <robin.murphy@....com>,
	"iommu@...ts.linux.dev" <iommu@...ts.linux.dev>
Subject: RE: [PATCH V3] PCI: Extend ACS configurability

Hi Bjorn,
Could you let me know if Jason's reply answers your question?
Please let me know if you are looking for any more information.

Thanks,
Vidya Sagar

> -----Original Message-----
> From: Jason Gunthorpe <jgg@...dia.com>
> Sent: Thursday, May 23, 2024 8:46 PM
> To: Bjorn Helgaas <helgaas@...nel.org>
> Cc: Vidya Sagar <vidyas@...dia.com>; corbet@....net; bhelgaas@...gle.com; Gal
> Shalom <galshalom@...dia.com>; Leon Romanovsky <leonro@...dia.com>; Thierry
> Reding <treding@...dia.com>; Jon Hunter <jonathanh@...dia.com>; Masoud
> Moshref Javadi <mmoshrefjava@...dia.com>; Shahaf Shuler <shahafs@...dia.com>;
> Vikram Sethi <vsethi@...dia.com>; Shanker Donthineni <sdonthineni@...dia.com>;
> Jiandi An <jan@...dia.com>; Tushar Dave <tdave@...dia.com>; linux-
> doc@...r.kernel.org; linux-pci@...r.kernel.org; linux-kernel@...r.kernel.org;
> Krishna Thota <kthota@...dia.com>; Manikanta Maddireddy
> <mmaddireddy@...dia.com>; sagar.tv@...il.com; Joerg Roedel <joro@...tes.org>;
> Will Deacon <will@...nel.org>; Robin Murphy <robin.murphy@....com>;
> iommu@...ts.linux.dev
> Subject: Re: [PATCH V3] PCI: Extend ACS configurability
> 
> On Thu, May 23, 2024 at 09:59:36AM -0500, Bjorn Helgaas wrote:
> > [+cc iommu folks]
> >
> > On Thu, May 23, 2024 at 12:05:28PM +0530, Vidya Sagar wrote:
> > > For iommu_groups to form correctly, the ACS settings in the PCIe
> > > fabric need to be setup early in the boot process, either via the
> > > BIOS or via the kernel disable_acs_redir parameter.
> >
> > Can you point to the iommu code that is involved here?  It sounds like
> > the iommu_groups are built at boot time and are immutable after that?
> 
> They are created when the struct device is plugged in. pci_device_group() does the
> logic.
> 
> Notably groups can't/don't change if details like ACS change after the groups are
> setup.
> 
> There are alot of instructions out there telling people to boot their servers and then
> manually change the ACS flags with set_pci or something, and these are not good
> instructions since it defeats the VFIO group based security mechanisms.
> 
> > If we need per-device ACS config that depends on the workload, it
> > seems kind of problematic to only be able to specify this at boot
> > time.  I guess we would need to reboot if we want to run a workload
> > that needs a different config?
> 
> Basically. The main difference I'd see is if the server is a VM host or running bare
> metal apps. You can get more efficicenty if you change things for the bare metal case,
> and often bare metal will want to turn the iommu off while a VM host often wants
> more of it turned on.
> 
> > Is this the iommu usage model we want in the long term?
> 
> There is some path to more dynamic behavior here, but it would require separating
> groups into two components - devices that are together because they are physically
> sharing translation (aliases and things) from devices that are together because they
> share a security boundary (ACS).
> 
> It is more believable we could dynamically change security group assigments for VFIO
> than translation group assignment. I don't know anyone interested in this right now -
> Alex and I have only talked about it as a possibility a while back.
> 
> FWIW I don't view patch as excluding more dynamisism in the future, but it is the best
> way to work with the current state of affairs, and definitely better than set_pci
> instructions.
> 
> Thanks,
> Jason

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ