Re: Fence wait in mmu_interval_notifier_ops::invalidate

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am 11.12.20 um 08:50 schrieb Thomas Hellström (Intel):
Hi, Christian

Thanks for the reply.

On 12/10/20 11:53 AM, Christian König wrote:
Am 09.12.20 um 17:46 schrieb Thomas Hellström (Intel):

On 12/9/20 5:37 PM, Jason Gunthorpe wrote:
On Wed, Dec 09, 2020 at 05:36:16PM +0100, Thomas Hellström (Intel) wrote:
Jason, Christian

In most implementations of the callback mentioned in the subject there's a
fence wait.
What exactly is it needed for?
Invalidate must stop DMA before returning, so presumably drivers using
a dma fence are relying on a dma fence mechanism to stop DMA.

Yes, so far I follow, but what's the reason drivers need to stop DMA?

Well in general an invalidation means that the specified part of the page tables are updated, either with new addresses or new access flags.

In both cases you need to stop the DMA because you could otherwise work with stale data, e.g. read/write with the wrong addresses or write to a read only region etc...

Yes. That's clear. I'm just trying to understand the complete implications of doing that.


Is it for invlidation before breaking COW after fork or something related?

This is just one of many use cases which could invalidate a range. But there are many more, both from the kernel as well as userspace.

Just imaging that userspace first mmaps() some anonymous memory r/w, starts a DMA to it and while the DMA is ongoing does a readonly mmap() of libc to the same location.

My understanding of this particular case is that hardware would continue to DMA to orphaned pages that are pinned until the driver is done with DMA, unless hardware would somehow in-flight pick up the new PTE addresses pointing to libc but not the protection?

Exactly that is not guaranteed under all circumstances. Especially since HMM tries to avoid grabbing a reference to the underlying pages. And it depends when the destination addresses of the DMA are read and when the access flags are evaluated.

But even when it causes no security problem the requirement we have to fulfill here is that the DMA is coherent. In other words we either have to delay updates to the page tables until the DMA operation is completed or apply both address and access flag changes in a way the DMA operation immediately sees it as well.

Regards,
Christian.


Thanks,

Thomas



Since most hardware doesn't have recoverable page faults guess what would happen if we don't wait for the DMA to finish? That would be a security hole you can push an elephant through :)

Cheers,
Christian.


Thanks,

Thomas


Jason

_______________________________________________
dri-devel mailing list
dri-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.freedesktop.org/mailman/listinfo/dri-devel




[Index of Archives]     [Linux DRI Users]     [Linux Intel Graphics]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [XFree86]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux