Received: by 10.213.65.68 with SMTP id h4csp1665968imn; Thu, 15 Mar 2018 06:20:13 -0700 (PDT) X-Google-Smtp-Source: AG47ELtF7s2QPn+qgv3cwlWHepa/+W3MU4lCg4PtyXtS2sLMDmCwxQewpyZe90gdeNJRgem1BZpS X-Received: by 2002:a17:902:183:: with SMTP id b3-v6mr8276952plb.80.1521120012977; Thu, 15 Mar 2018 06:20:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521120012; cv=none; d=google.com; s=arc-20160816; b=as1eFdPXzrOy38UJbbmP4OYt6qsVbJFvbMrBFlwZLt+beaIlezZlU025KXBW1nnsm2 MRG1XDbT8eFGVus+Zyyw8RVqqGYY2IiLGQSvCz7Gj8Pl/AZp2eG7b7/QOGw7IXt0a0Jr koO1+XWWr/PdVPwDRFt9vZjlZrMLsRwRUAjBJPUvw3uWVz6EOPhM4791XRZlYCPpm4IR TVGx6/cAv/geU2is/D0YN5kEGrIWsB/ZVpCVqP6rx9GePrrBFvbJZjTXk0PUdtdqZ5jt eMG4rqhYCTjk47R4J2lMcgo2GquDdsSs8s9ZJeY79UOZuhNGC6qFgV2DNkDFQsncLiXq 2pqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature:arc-authentication-results; bh=UHp6cxVJ5SBFr4E8U1Mr3As27EG+Roi21/ko7ANBnJg=; b=VVGtZkWAwiVOXvRwxP/jJf6LahsaAVj7Y1n/DjaUGPPzLluL0FVcdhRapFpv6XIF7Y bnmVYjtDLYYqtmxbf2vkGfrBMFdZtqPVYHpWJoaQnYctJMTfDQnUEeS44I97vuj1jWvK b3wJoJ9xMYdqo+N8KaZbxdx5qR3fn9wkFXYKc5oYnwIkFZY10F2zaFOY+kqZFLgptgHC 2ohVvWZ38dLLYDCyNeuaDhQxLk2xHiWgE1dxzc/+JeI7uCG0lou76WHRzPs1dh9Z5e8Y EuFN3roZxmOj+S8ZRmMzqe2KTWN773pkh0Qs93Y458RfT936rvwx1mQojAKdyJarLsqJ cdlg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail (test mode) header.i=@8bytes.org header.s=mail-1 header.b=mIzKCxNi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f11-v6si2020864plm.19.2018.03.15.06.19.58; Thu, 15 Mar 2018 06:20:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail (test mode) header.i=@8bytes.org header.s=mail-1 header.b=mIzKCxNi; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751909AbeCONTA (ORCPT + 99 others); Thu, 15 Mar 2018 09:19:00 -0400 Received: from 8bytes.org ([81.169.241.247]:42338 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751833AbeCONS5 (ORCPT ); Thu, 15 Mar 2018 09:18:57 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id AEC3330C; Thu, 15 Mar 2018 14:18:55 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=8bytes.org; s=mail-1; t=1521119935; bh=BP+wGWxrTiXLazdtPaFyVIuAajC5j0k94MVaMhBr4cg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=mIzKCxNihmH4Vy0YA0huF/Vclt33S836tos+2V8RNt02bSmZZSKfSNbGTYNSt62qI OMaekI89CaXf3NAtQwATyjXGtps0zGJeIkPc28uYs9KDIIokt9yXsrJkN+Pn8uQRK5 O41FC88X5aqVKYoIjsjYATr6Wt7DRNcJzi7lIRkXPYaFQOKNLBk+54L40FBhpJB3MP 839mv58az3a9JVpkKv5/7EklfJ6P9+nbKy9p6onJuJLDGddVE8kYP5hEFE/TJxZV++ yeUGzjYeOlN0OEJjc9IWYZgfCcemIhzH6OgCZGbidHsDbjkYwxfYh4GHIv9sptu58s HfPYSu+U65BcQ== Date: Thu, 15 Mar 2018 14:18:54 +0100 From: Joerg Roedel To: Jacob Pan Cc: "Raj, Ashok" , Sohil Mehta , Alex Williamson , David Woodhouse , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Gayatri Kammela , Ravi V Shankar , Andy Shevchenko , Lu Baolu , Fenghua Yu Subject: Re: [PATCH v7 0/5] Add Intel IOMMU debugfs support Message-ID: <20180315131854.s6xmltsvsysublcw@8bytes.org> References: <1517619001-148586-1-git-send-email-sohil.mehta@intel.com> <20180213140303.42mbzfxpypljy37l@8bytes.org> <20180213214002.GA27066@otc-nc-03> <20180213145332.35c73eda@jacob-builder> <20180215095337.fccoozdclfnbepi4@8bytes.org> <20180215083811.3ec86e49@jacob-builder> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180215083811.3ec86e49@jacob-builder> User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 15, 2018 at 08:38:11AM -0800, Jacob Pan wrote: > Just wondering if your concern is on the implementation or the debugfs > idea in general. Perhaps have some common IOMMU debugfs? My concern mainly is that we add interfaces which reveal potentially security relevant information to user-space and that tools come up using it so that this also becomes kABI and we can't easily change it anymore and this whole stuff turns into a maintence nightmare. So that is definitly not something I'd like to see enabled in the distros, and its better to avoid it at all and search for better ways to debug upcoming issues. BPF tracers and tracing in general comes to mind here... Joerg