Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp545868pxb; Thu, 30 Sep 2021 11:29:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwLb1Eiiorh0wIuHVxS0twrGjzW02ltKuoTBNbEIl5OhV3HfESNGHaqHWWEdh1JfVbPT1vd X-Received: by 2002:a17:902:8bc1:b0:13d:e884:125a with SMTP id r1-20020a1709028bc100b0013de884125amr5700223plo.38.1633026590293; Thu, 30 Sep 2021 11:29:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633026590; cv=none; d=google.com; s=arc-20160816; b=ruPhGIr+Fhdw6kVZkCmdWvnE+L4YtyikE+9C3wIFJPOhUwDn+L0PupFpjQpdUIGWz1 622RtAUq+lkLpF4lRab/vcvlIlgEq8JT4RMH8e2NlNtOz7Bl2Zrm/C7/JvplTSmmK9Su eFJRe+ks5O1urM8j89z0Hi5HkT/1qLQyn/BBPwwy0FkDdtMFxclw0FWFZBkwh58VA0oC NzmeToOZF+2f7Rpl0kEjQzsdmOhsXvU+PK6I1f0XHYQcWI6pytLwIAUhDawSMtCxsbeD 2b0QpUmBD+JysFhsOPAqgMeOjR1lxl1xpqKj68kIxAKqIclnDzqz+XTr+OSPEEmcmyKH SMVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=3KosCX4f1PhIzHF9L0OxoAxGyTBmk3JioSz8D7KbHdE=; b=xIaUxN5v7wdZZg3007T48DjQhL3tNunH/8QFubTnWVbi2+NcPkkImLIsv5TXVcy/PK UXFpKqW+I3l/ALPF7N0wq1fj+8RIqbjFjnyvOhNIpL3a2XQBJdaGmw//6DPAOYgIfmSP il2Rq9YzpoNk82jxfwyLCQm1auvXOpGYcBtalNtJf5KI0hTpdNts8e6UqGt0lNOexVmG 6C9vcbNcN5iEwlbG3Cwps38ehEthDAfR5/Hg1evV/taNCKPfoh+qFJRMvacFBbHk16AR 30JJiYyRLBtk6cTBvb1YI8mk4F9UqlEcQKxKjc/hJwoRm3IbYRZxKZkKfVR+Mm2adSdi +43w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tNSn5AO0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g22si6724091pfj.141.2021.09.30.11.29.36; Thu, 30 Sep 2021 11:29:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=tNSn5AO0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351865AbhI3OvJ (ORCPT + 99 others); Thu, 30 Sep 2021 10:51:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:43674 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1349797AbhI3OvI (ORCPT ); Thu, 30 Sep 2021 10:51:08 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 5DAEC61A3B; Thu, 30 Sep 2021 14:49:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1633013365; bh=+VWo9f2x1mA2mUNtwsxmxOXwidb40muMDmCp7e4rtwI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=tNSn5AO076IxEWMe8KU2SPA4cFwGTC6vWDzR/boQr4xYmxO3KJMlhIJjSc7qRGNRh E7NrKH2CtXvuqxFZpM315+arBVVEEbxx60Y8JNSI6gJz5WPyQnK+bO+UgLUiXC0Nna DaNI0KiF/VLRPiwIxtg1xens782T7YKlk/TOm9w0= Date: Thu, 30 Sep 2021 16:49:23 +0200 From: Greg Kroah-Hartman To: "Michael S. Tsirkin" Cc: Kuppuswamy Sathyanarayanan , Borislav Petkov , x86@kernel.org, Bjorn Helgaas , Thomas Gleixner , Ingo Molnar , Andreas Noever , Michael Jamet , Yehezkel Bernat , "Rafael J . Wysocki" , Mika Westerberg , Jonathan Corbet , Jason Wang , Dan Williams , Andi Kleen , Kuppuswamy Sathyanarayanan , linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, linux-usb@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: Re: [PATCH v2 2/6] driver core: Add common support to skip probe for un-authorized devices Message-ID: References: <20210930010511.3387967-1-sathyanarayanan.kuppuswamy@linux.intel.com> <20210930010511.3387967-3-sathyanarayanan.kuppuswamy@linux.intel.com> <20210930065807-mutt-send-email-mst@kernel.org> <20210930103537-mutt-send-email-mst@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210930103537-mutt-send-email-mst@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 30, 2021 at 10:38:42AM -0400, Michael S. Tsirkin wrote: > On Thu, Sep 30, 2021 at 03:52:52PM +0200, Greg Kroah-Hartman wrote: > > On Thu, Sep 30, 2021 at 06:59:36AM -0400, Michael S. Tsirkin wrote: > > > On Wed, Sep 29, 2021 at 06:05:07PM -0700, Kuppuswamy Sathyanarayanan wrote: > > > > While the common case for device-authorization is to skip probe of > > > > unauthorized devices, some buses may still want to emit a message on > > > > probe failure (Thunderbolt), or base probe failures on the > > > > authorization status of a related device like a parent (USB). So add > > > > an option (has_probe_authorization) in struct bus_type for the bus > > > > driver to own probe authorization policy. > > > > > > > > Reviewed-by: Dan Williams > > > > Signed-off-by: Kuppuswamy Sathyanarayanan > > > > > > > > > > > > So what e.g. the PCI patch > > > https://lore.kernel.org/all/CACK8Z6E8pjVeC934oFgr=VB3pULx_GyT2NkzAogdRQJ9TKSX9A@mail.gmail.com/ > > > actually proposes is a list of > > > allowed drivers, not devices. Doing it at the device level > > > has disadvantages, for example some devices might have a legacy > > > unsafe driver, or an out of tree driver. It also does not > > > address drivers that poke at hardware during init. > > > > Doing it at a device level is the only sane way to do this. > > > > A user needs to say "this device is allowed to be controlled by this > > driver". This is the trust model that USB has had for over a decade and > > what thunderbolt also has. > > > > > Accordingly, I think the right thing to do is to skip > > > driver init for disallowed drivers, not skip probe > > > for specific devices. > > > > What do you mean by "driver init"? module_init()? > > > > No driver should be touching hardware in their module init call. They > > should only be touching it in the probe callback as that is the only > > time they are ever allowed to talk to hardware. Specifically the device > > that has been handed to them. > > > > If there are in-kernel PCI drivers that do not do this, they need to be > > fixed today. > > > > We don't care about out-of-tree drivers for obvious reasons that we have > > no control over them. > > > > thanks, > > > > greg k-h > > Well talk to Andi about it pls :) > https://lore.kernel.org/r/ad1e41d1-3f4e-8982-16ea-18a3b2c04019%40linux.intel.com As Alan said, the minute you allow any driver to get into your kernel, it can do anything it wants to. So just don't allow drivers to be added to your kernel if you care about these things. The system owner has that mechanism today. thanks, greg k-h