Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp1486258pxb; Fri, 1 Oct 2021 11:39:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwb6pUzu0GXEAxCLrINohG1edimPfbE0ZVT4eH0KMokYAjf9jG7CPYbsF0mkH8+Oe5ZaTCA X-Received: by 2002:a17:902:da91:b0:13e:545b:5f7c with SMTP id j17-20020a170902da9100b0013e545b5f7cmr10749740plx.72.1633113544357; Fri, 01 Oct 2021 11:39:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633113544; cv=none; d=google.com; s=arc-20160816; b=RBoN1IGVg8h0V+NR8icVkj7hfMvSJvpzm5YuZjvXzXYMHT5uqI9bQ/ODmBQcbIXOO8 ziKaIIxpmODmsh1ooM9uoxsDM1y+ir4rxuAfJzSesApLrHISTIMDswha14fWKfOm0eLN z3rGDhLYNVnOZkDLMHn8Fv56hHcz0H1rxLIuKJbB2KNI8tfYOaOUt1b2OQcY7ylsy4EV GMQnTEJKGHAG4WkH7JwyKvzXvHt0GPlBltiFLGisFTU1nM0tppA+3yN/isgEnU7N0Z92 DUUI/a+kGbDorW3fJ7nwnUJDJMVfG1+GUJOk2/gCtDMkPcKK19biGQWITZ3L1kn6an4a bH7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=isfTpTS7fB2u+GbZgogRlP8V1Lj7W42iwgm2aksWV9g=; b=Eu9PFPNfenOlQA5YguBxC5sSrH8Gfv7lBcA3ec7LjORhk+k53fGPB/drMd77UvV7N+ DM8EICyjk15zbGW+Y/NCTT+CiRCunXTRO0fdyh9dBii0FIQyRGa6WBW1cDHHZ3gacOr0 zk0CZ7qucShaJXGDgZ+nmVVMWAq/kQ66pkYmLrNtKXRBWd/sDwcPh+o9P7KnIkgVVc4G oJZjYaqNDF2CZhECWFMEdtTTzRH+KnwD0bRWg4fa98QmUvRhnOEbz1JgDNYMiRASsFNr ZD5qWxU0LB8njGGrEn6QJfXUqPGNaERL248KYsAtC98HxE9ujYF8muvGOfVKyjfgZvwV Meag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i69si7683680pfe.276.2021.10.01.11.38.40; Fri, 01 Oct 2021 11:39:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231603AbhJAPx3 (ORCPT + 99 others); Fri, 1 Oct 2021 11:53:29 -0400 Received: from netrider.rowland.org ([192.131.102.5]:46971 "HELO netrider.rowland.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S231267AbhJAPx2 (ORCPT ); Fri, 1 Oct 2021 11:53:28 -0400 Received: (qmail 507274 invoked by uid 1000); 1 Oct 2021 11:51:43 -0400 Date: Fri, 1 Oct 2021 11:51:43 -0400 From: Alan Stern To: Greg Kroah-Hartman Cc: Andi Kleen , "Michael S. Tsirkin" , Kuppuswamy Sathyanarayanan , Borislav Petkov , x86@kernel.org, Bjorn Helgaas , Thomas Gleixner , Ingo Molnar , Andreas Noever , Michael Jamet , Yehezkel Bernat , "Rafael J . Wysocki" , Mika Westerberg , Jonathan Corbet , Jason Wang , Dan Williams , Kuppuswamy Sathyanarayanan , linux-kernel@vger.kernel.org, linux-pci@vger.kernel.org, linux-usb@vger.kernel.org, virtualization@lists.linux-foundation.org, "Reshetova, Elena" Subject: Re: [PATCH v2 2/6] driver core: Add common support to skip probe for un-authorized devices Message-ID: <20211001155143.GB505557@rowland.harvard.edu> References: <20210930065807-mutt-send-email-mst@kernel.org> <20210930103537-mutt-send-email-mst@kernel.org> <20210930105852-mutt-send-email-mst@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 01, 2021 at 08:29:36AM +0200, Greg Kroah-Hartman wrote: > On Thu, Sep 30, 2021 at 12:15:16PM -0700, Andi Kleen wrote: > > > > On 9/30/2021 10:23 AM, Greg Kroah-Hartman wrote: > > > On Thu, Sep 30, 2021 at 10:17:09AM -0700, Andi Kleen wrote: > > > > The legacy drivers could be fixed, but nobody really wants to touch them > > > > anymore and they're impossible to test. > > > Pointers to them? > > > > For example if you look over old SCSI drivers in drivers/scsi/*.c there is a > > substantial number that has a module init longer than just registering a > > driver. As a single example look at drivers/scsi/BusLogic.c > > Great, send patches to fix them up instead of adding new infrastructure > to the kernel. It is better to remove code than add it. You can rip > the ISA code out of that driver and then you will not have the issue > anymore. > > Or again, just add that module to the deny list and never load it from > userspace. > > > There were also quite a few platform drivers like this. > > Of course, platform drivers are horrible abusers of this. Just like the > recent one submitted by Intel that would bind to any machine it was > loaded on and did not actually do any hardware detection assuming that > it owned the platform: > https://lore.kernel.org/r/20210924213157.3584061-2-david.e.box@linux.intel.com > > So yes, some drivers are horrible, it is our job to catch that and fix > it. If you don't want to load those drivers on your system, we have > userspace solutions for that (you can have allow/deny lists there.) > > > > > The drivers that probe something that is not enumerated in a standard way > > > > have no choice, it cannot be implemented in a different way. > > > PCI devices are not enumerated in a standard way??? > > > > The pci devices are enumerated in a standard way, but typically the driver > > also needs something else outside PCI that needs some other probing > > mechanism. > > Like what? What PCI drivers need outside connections to control the > hardware? > > > > > So instead we're using a "firewall" the prevents these drivers from doing > > > > bad things by not allowing ioremap access unless opted in, and also do some > > > > filtering on the IO ports The device filter is still the primary mechanism, > > > > the ioremap filtering is just belts and suspenders for those odd cases. > > > That's horrible, don't try to protect the kernel from itself. Just fix > > > the drivers. > > > > I thought we had already established this last time we discussed it. > > > > That's completely impractical. We cannot harden thousands of drivers, > > especially since it would be all wasted work since nobody will ever need > > them in virtual guests. Even if we could harden them how would such a work > > be maintained long term? Using a firewall and filtering mechanism is much > > saner for everyone. > > I agree, you can not "harden" anything here. That is why I asked you to > use the existing process that explicitly moves the model to userspace > where a user can say "do I want this device to be controlled by the > kernel or not" which then allows you to pick and choose what drivers you > want to have in your system. > > You need to trust devices, and not worry about trusting drivers as you > yourself admit :) That isn't the way they see it. In their approach you can never trust any devices at all. Therefore devices can only be allowed to bind to a very small set of "hardened" drivers. Never mind how they decide whether or not a driver is sufficiently "hardened". > The kernel's trust model is that once we bind to them, we trust almost > all device types almost explicitly. If you wish to change that model, > that's great, but it is a much larger discussion than this tiny patchset > would require. Forget about trust for the moment. Let's say the goal is to prevent the kernel from creating any bindings other that those in some small "allowed" set. To fully specify one of the allowed bindings, you would have to provide both a device ID and a driver name. But in practice this isn't necessary, since a device with a given ID will bind to only one driver in almost all cases, and hence giving just the device ID is enough. So to do what they want, all that's needed is to forbid any bindings except where the device ID is "allowed". Or to put it another way, where the device's authorized flag (which can be initialized based on the device ID) is set. (The opposite approach, in which the drivers are "allowed" rather than the device IDs, apparently has already been discussed and rejected. I'm not convinced that was a good decision, but...) Does this seem like a fair description of the situation? Alan Stern