Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp410761pxb; Thu, 30 Sep 2021 08:37:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz9D9Mqd5nDrJv4M43ekEAWwhLGkyhpDqPN/Mlh7j6Mmm8r/D6VxwiLXTDU2WCayfHDDQ7Y X-Received: by 2002:aa7:d1cf:: with SMTP id g15mr7638282edp.75.1633016272712; Thu, 30 Sep 2021 08:37:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633016272; cv=none; d=google.com; s=arc-20160816; b=dprm3mJse2/Rjh5lVuh7w9rNqqWwt+pLX6dOmCfow+j4xxWvBX1z5aZUU/AfL4OOqb lkACLW6xWkplc8VEck5lnynsar87SI/UqXBOs/63PWsnGuaEVZ7UvL9yFMW/A3viKImG fMteDlVMjYRbTNGSYyJSDze6R15mGZNGKbaGSu4Qp6DnYfwP2NTDkzO5Z6YjxL8YmKBV trQ87WLFIclmsVrkXaMdJOLwDvc8/37rgESlMjuJMG5CIE3luKSw8+eWYXxoh28JgLq3 28r/1/rS72kKqHrWR9GdfIrJHW+EPvVFX/5A0UJREeqmVLBG3BYfWb+Z1FweIN6d8Guv PQIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=cpUF0jKyRiVMnZBmWDaoVp/ekbNhP2wSN4WZa5JV3Vs=; b=ONGiubLpJSclyH/JfVLUDcGZP8ykYNYE+Syix9yqK3UtESpCkBcasK0S/tWGUXcSiH g41OtmYS7baZt2xLne1MnX5CuxNT6CW/Wc+lfXLJVr0CHGb6EUXP/KTF0ZK3P6s0yhRa jib8iu41XpPppu9bG2GVo5s33tz7NHrhLwGe6ePr2qMHizvtAv+uF/UyhM95nDPEfZRp JttSHZDHCImb6yTMky8RRGn+gKlMI2k/ZEgbxAOo91mSjnZ7QlrLvCB/NhrR/+1iYURT zIvVaCnlijDRLHUp7k4Sc1bjx5MJf18vxtlIFulnJTjdAyJlW97E77WYDZ2hMaMjtQfR qMqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c27si1639765edx.124.2021.09.30.08.37.27; Thu, 30 Sep 2021 08:37:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344509AbhI3Pg7 (ORCPT + 99 others); Thu, 30 Sep 2021 11:36:59 -0400 Received: from netrider.rowland.org ([192.131.102.5]:41749 "HELO netrider.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1344452AbhI3Pgw (ORCPT ); Thu, 30 Sep 2021 11:36:52 -0400 Received: (qmail 472903 invoked by uid 1000); 30 Sep 2021 11:35:09 -0400 Date: Thu, 30 Sep 2021 11:35:09 -0400 From: Alan Stern To: "Michael S. Tsirkin" Cc: Greg Kroah-Hartman , Kuppuswamy Sathyanarayanan , Borislav Petkov , x86@kernel.org, Bjorn Helgaas , Thomas Gleixner , Ingo Molnar , Andreas Noever , Michael Jamet , Yehezkel Bernat , "Rafael J . Wysocki" , Mika Westerberg , Jonathan Corbet , Jason Wang , Dan Williams , Andi Kleen , Kuppuswamy Sathyanarayanan , linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, linux-usb@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: Re: [PATCH v2 2/6] driver core: Add common support to skip probe for un-authorized devices Message-ID: <20210930153509.GF464826@rowland.harvard.edu> References: <20210930010511.3387967-1-sathyanarayanan.kuppuswamy@linux.intel.com> <20210930010511.3387967-3-sathyanarayanan.kuppuswamy@linux.intel.com> <20210930065807-mutt-send-email-mst@kernel.org> <20210930144305.GA464826@rowland.harvard.edu> <20210930104924-mutt-send-email-mst@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210930104924-mutt-send-email-mst@kernel.org> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 30, 2021 at 10:58:07AM -0400, Michael S. Tsirkin wrote: > On Thu, Sep 30, 2021 at 10:43:05AM -0400, Alan Stern wrote: > > I don't see any point in talking about "untrusted drivers". If a > > driver isn't trusted then it doesn't belong in your kernel. Period. > > When you load a driver into your kernel, you are implicitly trusting > > it (aside from limitations imposed by security modules). > > Trusting it to do what? Historically a ton of drivers did not > validate input from devices they drive. Most still don't. Trusting it to behave properly (i.e., not destroy your system, among other things). The fact that many drivers haven't been trustworthy is beside the point. By loading them into your kernel, you are trusting them regardless. In the end, you may regret having done so. :-( Alan Stern