Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp547080pxb; Thu, 30 Sep 2021 11:31:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyoa+IjNizj/qvG0I6bLb+jag/ocWBwhnO/+RgT6pJP+YtPnJE1SjW9tgxHKYKGNt+BCit1 X-Received: by 2002:a17:90a:f0cc:: with SMTP id fa12mr8021969pjb.166.1633026694605; Thu, 30 Sep 2021 11:31:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633026694; cv=none; d=google.com; s=arc-20160816; b=ppvuY6tvsZkRujtVZMf5ReQOq03hsjahvbgO1HB6VUsUwS/ecwPpvZ8eYbzZXb29MO fwps76QDr8Y9omMxnsexmudrIeQyWIHfFVynUK6PQDjDjnHFFkI7ED9peJbgjc/XUHfd L6cjV3xjEvCFTzTiG42HezyTrEKWuymTXInhR2QBboW4E1DN3kUvO7Ecy4swKiV51tZ3 8UvHXfIfBtvhKXlcP1B+HDoRjxUbB39KFd2ixGVzbv4ULnS/9bXBJSaBSKAfb36OvDri aoF5hX3AmRMq3qbeig2Rm3D5CUoa+/YDfpR0bSVpC15OhIOhqeqMa59Yyn06D503wCRR 67dw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=zptMMX+xorScj8oCKZfu7vNyw+QcA+InPw6+3Zh+fcA=; b=e623MVSY2eZuiTCmSeu9xXztG4W946JclL2WU/LVV2GKtAicwMjLAmB0c0D0lRNVvr bHRntC+Vp7EFzPfLP9MMq143jY6HD4PCfi9c2hW0swzDF81Zr5uAbU2S5254F45V9zqG sg8wpYoHsb85HI69557+0szzCJiHztpLlQWoYID6GMKRQAyhG1tijCoFJPgzMq1y27mO XBqW8YrN6WQM3ia5w2bXhVvB8aeaKlQzV7e/Nh3OcTvqYgv9QfUVRWfn6BTJP+Dd2cN4 DzR10xDR8tjddlganzyx6nFywJqN7YiE3gDhqs+GI7e96FNkh59r1miuVgTj5w+/Fsqh a3FA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=WdqNw6J0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b5si4955643plz.341.2021.09.30.11.31.18; Thu, 30 Sep 2021 11:31:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=WdqNw6J0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1352062AbhI3PAD (ORCPT + 99 others); Thu, 30 Sep 2021 11:00:03 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:51072 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1352018AbhI3O77 (ORCPT ); Thu, 30 Sep 2021 10:59:59 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1633013895; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=zptMMX+xorScj8oCKZfu7vNyw+QcA+InPw6+3Zh+fcA=; b=WdqNw6J0B+IZB9mZa9kbTLPEdzqL1iWo4eWniUwapPQ6/TYKAFM3hg9FA1wLqu6Pk1KDp+ 9dEkHghzE+s6jRWUKp1dMoBzano4jhv9IZD5bE82OwC6jtTWzi9BydfuD9cJWPrdzQa8iy xR5voX0Bf+4T/zpqW6PGgmEkp03H5ug= Received: from mail-wm1-f71.google.com (mail-wm1-f71.google.com [209.85.128.71]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-456-kLYA-t4RMoOIfZVpa1lShw-1; Thu, 30 Sep 2021 10:58:14 -0400 X-MC-Unique: kLYA-t4RMoOIfZVpa1lShw-1 Received: by mail-wm1-f71.google.com with SMTP id f10-20020a7bcd0a000000b0030d2def848dso868215wmj.0 for ; Thu, 30 Sep 2021 07:58:14 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=zptMMX+xorScj8oCKZfu7vNyw+QcA+InPw6+3Zh+fcA=; b=nIIrqAKh6/8MdmyuVcTXqDJ2BdXDL5ESfdCh2jInkSH7BiuyljI3EfS53WgAY11jTH 8wQ5TsidT9SQJxvi9jOmdppMkB1TAG3CoBTpYvMj/Mrthcjfjlh8mqptW4akfKW3a2o/ xaJsnkt15oaMIVe1jzkTucg0fV6HObcaDiBI4y63DPbuNWugH4jngVxqe9pdln7+kYjn 15Tekg/58btCJmk+2MEnj/A9M19RkrG+CeHJF06DSOJL7B+qjmTPOra7QmX9OFDdI34K ZEhHdmE4n5g6ZTdMk8JpIvofnG7cq+rtcl5vc/aDOQtS+XUJbb1gphptQ2MD4ORVklhn m3wQ== X-Gm-Message-State: AOAM532xk4m63yVNGMrfCKndqBleRNBM8D7pBJhIHRI3VgRUU8WxJkuA mDusur43iRlQkhtaGBVFUAF7VqGQhV8Nq4mkoDXDQDl3aKBwRx6j7fTrkOyH6xN2cD+3eoF4fUB jTo1W0DQLsgyFAUTJ4ht60KQc X-Received: by 2002:a1c:7e87:: with SMTP id z129mr5645386wmc.75.1633013893057; Thu, 30 Sep 2021 07:58:13 -0700 (PDT) X-Received: by 2002:a1c:7e87:: with SMTP id z129mr5645358wmc.75.1633013892858; Thu, 30 Sep 2021 07:58:12 -0700 (PDT) Received: from redhat.com ([2.55.134.220]) by smtp.gmail.com with ESMTPSA id q18sm5031993wmc.7.2021.09.30.07.58.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Sep 2021 07:58:12 -0700 (PDT) Date: Thu, 30 Sep 2021 10:58:07 -0400 From: "Michael S. Tsirkin" To: Alan Stern Cc: Greg Kroah-Hartman , Kuppuswamy Sathyanarayanan , Borislav Petkov , x86@kernel.org, Bjorn Helgaas , Thomas Gleixner , Ingo Molnar , Andreas Noever , Michael Jamet , Yehezkel Bernat , "Rafael J . Wysocki" , Mika Westerberg , Jonathan Corbet , Jason Wang , Dan Williams , Andi Kleen , Kuppuswamy Sathyanarayanan , linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, linux-usb@vger.kernel.org, virtualization@lists.linux-foundation.org Subject: Re: [PATCH v2 2/6] driver core: Add common support to skip probe for un-authorized devices Message-ID: <20210930104924-mutt-send-email-mst@kernel.org> References: <20210930010511.3387967-1-sathyanarayanan.kuppuswamy@linux.intel.com> <20210930010511.3387967-3-sathyanarayanan.kuppuswamy@linux.intel.com> <20210930065807-mutt-send-email-mst@kernel.org> <20210930144305.GA464826@rowland.harvard.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210930144305.GA464826@rowland.harvard.edu> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Sep 30, 2021 at 10:43:05AM -0400, Alan Stern wrote: > I don't see any point in talking about "untrusted drivers". If a > driver isn't trusted then it doesn't belong in your kernel. Period. > When you load a driver into your kernel, you are implicitly trusting > it (aside from limitations imposed by security modules). Trusting it to do what? Historically a ton of drivers did not validate input from devices they drive. Most still don't. > The code > it contains, the module_init code in particular, runs with full > superuser permissions. -- MST