lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 26 Oct 2021 20:43:00 -0300
From:   Jason Gunthorpe <jgg@...dia.com>
To:     Alex Williamson <alex.williamson@...hat.com>
Cc:     Cornelia Huck <cohuck@...hat.com>,
        Yishai Hadas <yishaih@...dia.com>, bhelgaas@...gle.com,
        saeedm@...dia.com, linux-pci@...r.kernel.org, kvm@...r.kernel.org,
        netdev@...r.kernel.org, kuba@...nel.org, leonro@...dia.com,
        kwankhede@...dia.com, mgurtovoy@...dia.com, maorg@...dia.com,
        "Dr. David Alan Gilbert" <dgilbert@...hat.com>
Subject: Re: [PATCH V2 mlx5-next 12/14] vfio/mlx5: Implement vfio_pci driver
 for mlx5 devices

On Tue, Oct 26, 2021 at 01:50:46PM -0600, Alex Williamson wrote:
> On Tue, 26 Oct 2021 12:18:51 -0300
> Jason Gunthorpe <jgg@...dia.com> wrote:
> 
> > On Tue, Oct 26, 2021 at 08:42:12AM -0600, Alex Williamson wrote:
> > 
> > > > This is also why I don't like it being so transparent as it is
> > > > something userspace needs to care about - especially if the HW cannot
> > > > support such a thing, if we intend to allow that.  
> > > 
> > > Userspace does need to care, but userspace's concern over this should
> > > not be able to compromise the platform and therefore making VF
> > > assignment more susceptible to fatal error conditions to comply with a
> > > migration uAPI is troublesome for me.  
> > 
> > It is an interesting scenario.
> > 
> > I think it points that we are not implementing this fully properly.
> > 
> > The !RUNNING state should be like your reset efforts.
> > 
> > All access to the MMIO memories from userspace should be revoked
> > during !RUNNING
> > 
> > All VMAs zap'd.
> > 
> > All IOMMU peer mappings invalidated.
> > 
> > The kernel should directly block userspace from causing a MMIO TLP
> > before the device driver goes to !RUNNING.
> > 
> > Then the question of what the device does at this edge is not
> > relevant as hostile userspace cannot trigger it.
> > 
> > The logical way to implement this is to key off running and
> > block/unblock MMIO access when !RUNNING.
> > 
> > To me this strongly suggests that the extra bit is the correct way
> > forward as the driver is much simpler to implement and understand if
> > RUNNING directly controls the availability of MMIO instead of having
> > an irregular case where !RUNNING still allows MMIO but only until a
> > pending_bytes read.
> > 
> > Given the complexity of this can we move ahead with the current
> > mlx5_vfio and Yishai&co can come with some followup proposal to split
> > the freeze/queice and block MMIO?
> 
> I know how much we want this driver in, but I'm surprised that you're
> advocating to cut-and-run with an implementation where we've identified
> a potentially significant gap with some hand waving that we'll resolve
> it later.

I don't view it as cut and run, but making reasonable quanta of
progress with patch series of reviewable size and scope.

At a certain point we need to get the base level of functionality,
that matches the currently defined ABI merged so we can talk about
where the ABI needs to go.

If you are uncomfortable about this from a uABI stability perspective
then mark the driver EXPERIMENTAL and do not merge any other migration
drivers until the two details are fully sorted out.

As far as the actual issue, if you hadn't just discovered it now
nobody would have known we have this gap - much like how the very
similar reset issue was present in VFIO for so many years until you
plugged it.

> Deciding at some point in the future to forcefully block device MMIO
> access from userspace when the device stops running is clearly a user
> visible change and therefore subject to the don't-break-userspace
> clause.  

I don't think so, this was done for reset retroactively after
all. Well behaved qmeu should have silenced all MMIO touches as part
of the ABI contract anyhow.

The "don't-break-userspace" is not an absolute prohibition, Linus has
been very clear this limitation is about direct, ideally demonstrable,
breakage to actually deployed software.

> That might also indicate that "freeze" is only an implementation
> specific requirement.  Thanks,

It doesn't matter if a theoretical device can exist that doesn't need
"freeze" - this device does, and so it is the lowest common
denominator for the uAPI contract and userspace must abide by the
restriction.

Further, I can think of no utility to exposing some non-freeze route
as an optional feature. If someone has a scenario where this is useful
they should come with a uAPI design and feature bit to describe how it
works and what it does. This driver will probably not ever set that
feature.

Jason

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ