Quoting Bloomfield, Jon (2018-06-14 15:53:13) > > -----Original Message----- > > From: Chris Wilson <chris@xxxxxxxxxxxxxxxxxx> > > Sent: Thursday, June 14, 2018 5:00 AM > > To: intel-gfx@xxxxxxxxxxxxxxxxxxxxx > > Cc: Chris Wilson <chris@xxxxxxxxxxxxxxxxxx>; Bloomfield, Jon > > <jon.bloomfield@xxxxxxxxx>; Joonas Lahtinen > > <joonas.lahtinen@xxxxxxxxxxxxxxx>; Matthew Auld > > <matthew.william.auld@xxxxxxxxx> > > Subject: [PATCH 3/5] drm/i915: Prevent writing into a read-only object via a > > GGTT mmap > > > > If the user has created a read-only object, they should not be allowed > > to circumvent the write protection by using a GGTT mmapping. Deny it. > > > > Also most machines do not support read-only GGTT PTEs, so again we have > > to reject attempted writes. Fortunately, this is known a priori, so we > > can at least reject in the call to create the mmap with backup in the > > fault handler. This is a little draconian as we could blatantly ignore > > the write protection on the pages, but it is far simply to keep the > > readonly object pure. (It is easier to lift a restriction than to impose > > it later!) > Are you sure this is necessary? I assumed you would just create a ro IA > mapping to the page, irrespective of the ability of ggtt. You are thinking of the CPU mmap? The GTT mmap offers a linear view of the tiled object. It would be very wrong for us to bypass the PROT_READ protection of a user page by accessing it via the GTT. > It feels wrong to > disallow mapping a read-only object to the CPU as read-only. With ppgtt > the presence of an unprotected mapping in the ggtt should be immune > from tampering in the GT, so only the cpu mapping should really matter. And the CPU mapping has its protection bits on the IA PTE. -Chris _______________________________________________ Intel-gfx mailing list Intel-gfx@xxxxxxxxxxxxxxxxxxxxx https://lists.freedesktop.org/mailman/listinfo/intel-gfx