Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp1875205rdb; Thu, 7 Dec 2023 11:02:50 -0800 (PST) X-Google-Smtp-Source: AGHT+IE7ioogl/Sr85KaJvEa6BJBsUmZSvASzSfCMLq53f4gEe9U/2WtbWNiOSsuYnTDDGWPc8oJ X-Received: by 2002:a05:6359:6d04:b0:170:9559:4fff with SMTP id te4-20020a0563596d0400b0017095594fffmr73308rwb.9.1701975769776; Thu, 07 Dec 2023 11:02:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701975769; cv=none; d=google.com; s=arc-20160816; b=Xmzi6Akht4vGZybbm9vIAsQspdJPwuG5Zn6TgttIhapGT+wZKhsMeJHNvnzRoX4pat pwscPNCPRaRn9Ka72cA5T0Uw6Yh8fT5yobgH9JavkkACpZT+3fChTVoJ4+ETCR5y2KQ0 yPghwOKbnhhprixzZRXBgm/Jr4tmG3lk7t0bizKsj6pzjXSuQEZ7A1FyGUjuzgLLDYD/ S0GoYWLHLqamG99/ZF4uKvYrEGtKAyRIw5auxnzrKcxZ4su8K8F18M1Ekfc0VgcmRtGb SXszsGFXkDrvngmz1/uZZ/wQHYJtyHewV6CsLijmuWicKef/GEiwnslijrvTxFlliMNX vRxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Lp4XJ1aqwUEf86+3xhp9+XdmCpF1YtsDAR77+7S8C10=; fh=Zb8VfsmTa3n53YapGPfd7DhQ7mZaBPGchmLOKyxgk7I=; b=LfxOKAppIrumEFHDKx2EDsWp5mF8BJnakWNF5P9SpRi1G8VmmWshoFV5un/nqbJWP3 3CvuFGCrDawpzy/1CJmuvri8ckhazDHre7gh0+2ciWYlclHeUntY+lFdndlEAiORVhWj pi7Bic2+h55lxYTT3jWy/FVDkMg/Ws4Oby0GsDVc5r8ttNEKsMg6ZRH5RLDwpgGK78id ZboWsBY899cTgEjpG+TqDvOuNXVh4+M9s42zaklRoYdJ7udWxu9jTLvanA2KURt0DtLK KRLEZhWs95nM35RbW9QSGCzMwc5HKbwPFSTjJpmzS/wXMSQg8/evC7SYjoh1O7p5tl0+ tx7w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Ll0TFuur; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id b13-20020a631b4d000000b005c6c9572a4fsi134848pgm.568.2023.12.07.11.02.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 11:02:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Ll0TFuur; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 6C04B802B40E; Thu, 7 Dec 2023 11:02:48 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235237AbjLGTCf (ORCPT + 99 others); Thu, 7 Dec 2023 14:02:35 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59978 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233077AbjLGTCb (ORCPT ); Thu, 7 Dec 2023 14:02:31 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8A3B6171A for ; Thu, 7 Dec 2023 11:02:37 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 06B60C433C8; Thu, 7 Dec 2023 19:02:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1701975757; bh=Lp4XJ1aqwUEf86+3xhp9+XdmCpF1YtsDAR77+7S8C10=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Ll0TFuur7xZX3Jve0cKmqyLBvYhGcwQteAtzj617bQsTT6j/C2VqH0dlyYJIIBHXM w+NUQszJRHPzIyAMMEnLRIi/Px9joMoIigtyY5eKzBAcver2lgzduAd9nJGIHiln/8 447val4HGq706N32t+0SZpopA7ZOz/7TBE6gTQhQU2jTjqn6fQ0NizCLQ/44KjVRBx 6rNu6qaI7KuN0ZvgIJ/UZWeBiNj85cHJWDAPGzvlEe2dhd59iFg9TxsQq5FiMQytA/ lKwSWc8z0L1g3Icj8bbyofkyVGBCLIAaB1Nkq10wtJNNlcpF/1QwIgQDczwOs3u/KA +BVmRodNhhaLw== Date: Thu, 7 Dec 2023 11:02:36 -0800 From: Saeed Mahameed To: Aron Silverton Cc: Jakub Kicinski , Greg Kroah-Hartman , Jason Gunthorpe , David Ahern , Arnd Bergmann , Leon Romanovsky , Jiri Pirko , Leonid Bloch , Itay Avraham , linux-kernel@vger.kernel.org, Saeed Mahameed Subject: Re: [PATCH V3 2/5] misc: mlx5ctl: Add mlx5ctl misc driver Message-ID: References: <20231128103304.25c2c642@kernel.org> <2023112922-lyricist-unclip-8e78@gregkh> <20231204185210.030a72ca@kernel.org> <20231205204855.52fa5cc1@kernel.org> <20231207092329.3ec04dca@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 07 Dec 2023 11:02:48 -0800 (PST) On 07 Dec 12:06, Aron Silverton wrote: >On Thu, Dec 07, 2023 at 09:23:29AM -0800, Jakub Kicinski wrote: >> On Thu, 7 Dec 2023 10:41:25 -0600 Aron Silverton wrote: >> > > I understand that having everything packaged and shipped together makes >> > > life easier. >> > >> > I think it is a requirement. We operate with Secure Boot. The kernel is >> > locked down. We don't have debugfs access, even if it were sufficient, >> > and we cannot compile and load modules. Even without Secure Boot, there >> > may not be a build environment available. >> >> This 'no debugfs' requirement is a kernel lockdown thing, I presume? >> Are we expected to throw debugfs out the window and for all vendors >> to reimplement their debug functionality via a misc driver taking >> arbitrary ioctls? Not only does that sound like a complete waste of >> time and going backward in terms of quality of the interfaces, needing >> custom vendor tools etc. etc., but also you go from (hopefully somewhat) >> upstream reviewed debugfs interface to an interface where the only >> security assurance is vendor telling you "trust me, it's all good". > >IIRC, with lockdown, we can read from debugfs IFF the entries' >permissions are 0400. We cannot write. It's not suitable for >implementing an interactive debug interface. I would like to add that debugfs is usually used to expose the driver software states, as it evolves and changes with the driver code, but as I explained in the other email, it's clearly not a good solution to expose arbitrary objects of complex devices, that require interactive and selective debug interfaces tailored to the user use-case.