Received: by 2002:a25:2c96:0:0:0:0:0 with SMTP id s144csp1373035ybs; Mon, 25 May 2020 14:27:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyjngybkILGknPVJkpD3HWVXRUAfmlwx+SDx4e1Zd0Dr2EbOmgxVwPyUzx0jWKsU3AgkFZ5 X-Received: by 2002:a17:906:4088:: with SMTP id u8mr21721595ejj.500.1590442071885; Mon, 25 May 2020 14:27:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590442071; cv=none; d=google.com; s=arc-20160816; b=UlVrEgwPzj5RxzYjsA3J9VtPkOxFLt5aD0JqEWiOGt+pPbVea5uYLr7KCTMbIiiy9M 2u56yhhumFkB7tnhSK0JoUt7I6+94liSoDfrGi4/zArarvnS9jFS0Tq24g0/7JMvfexE zRYil8NylXhhCBuqPo5CxEsLnv5nTh94I9RhjJyHMIgs6J5OUMrw3GkVkea3Jb4lg4xm m1MyR/fHMADXM/F7vkx1PPoib2BL/cBHf9/UTrttH4iretA3GIQztTDczfI0o1/xwk64 95wmrtJSzwcKnCFm4TKZSgSThVH+nRbZw6vRZQaz2Uys3f2tkInB+ooKJ+UHFs4+5nKw Ywkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject:dkim-signature:dkim-filter; bh=47BNGu9mWI/5K8zShWHRllGuDzpCapJXDOku6kHjppI=; b=OVW9S+dW+eRPSGMz3ubMHE2uvJC2AMuOSXfpU1ixdfD9wiAZWrggGHvl4J2D5EjqMV ipnf/kl9CmWm696AAvryaxYxpN7Qe1d69bBejQj3vuy78k5XXx6Q4VTwTeMwcP26068k /RiBV4N9l09WCpog4yFZnJeDO4dvmnnPxo77Nvl/xrb+gtJ43+Pvf+bv2T9/Y0iRE3kD VhQGzjPmP0WtDlibJrifA10tIw9WYoRsKCkTPwVfHtoBOhFIC6ug48GmScqiF1osCy67 d8KjVuzEvbXBNepgnvndHCjC2gQfHtUNKkqhNRqccgQNvwfQ7pzgjyfOXKe/Lv9PkH9G lvwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b=cNd28c6T; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rp1si10240658ejb.392.2020.05.25.14.27.26; Mon, 25 May 2020 14:27:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@candelatech.com header.s=default header.b=cNd28c6T; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=candelatech.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391287AbgEYRJP (ORCPT + 99 others); Mon, 25 May 2020 13:09:15 -0400 Received: from mail2.candelatech.com ([208.74.158.173]:60826 "EHLO mail3.candelatech.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391278AbgEYRJN (ORCPT ); Mon, 25 May 2020 13:09:13 -0400 Received: from [192.168.254.4] (unknown [50.34.197.93]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail3.candelatech.com (Postfix) with ESMTPSA id AA4AC13C2B0; Mon, 25 May 2020 10:09:02 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 mail3.candelatech.com AA4AC13C2B0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=candelatech.com; s=default; t=1590426553; bh=EHPh+E1ZdE7p6ZvU4oC5fZ1YWPc4Oc9mXxUVaWe0EHc=; h=Subject:To:References:Cc:From:Date:In-Reply-To:From; b=cNd28c6TAYcBi4SOvvfxgiL28PAd8gdOHHzYe8KJZkh6AH7ES/Jw7RqF8KNwZRZHb txfs58Et5e+MY1pgeVmomgiFqNp08PQRnjG+iVEVYBWqY0JeM32G5yaSIdoz4wYt0t IJxuxlOo+WM4ImiDRZLZLvIWukeREUnNK6Yk3bh8= Subject: Re: [RFC 1/2] devlink: add simple fw crash helpers To: Andy Shevchenko , Steve deRosier References: <20200519010530.GS11244@42.do-not-panic.com> <20200519211531.3702593-1-kuba@kernel.org> <20200522052046.GY11244@42.do-not-panic.com> <20200522101738.1495f4cc@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com> <2e5199edb433c217c7974ef7408ff8c7253145b6.camel@sipsolutions.net> <20200522215145.GC11244@42.do-not-panic.com> <20200525090749.GJ1634618@smile.fi.intel.com> Cc: Luis Chamberlain , Johannes Berg , Jakub Kicinski , jeyu@kernel.org, akpm@linux-foundation.org, arnd@arndb.de, rostedt@goodmis.org, mingo@redhat.com, aquini@redhat.com, cai@lca.pw, dyoung@redhat.com, bhe@redhat.com, peterz@infradead.org, tglx@linutronix.de, gpiccoli@canonical.com, pmladek@suse.com, Takashi Iwai , schlad@suse.de, Kees Cook , Daniel Vetter , will@kernel.org, mchehab+samsung@kernel.org, Kalle Valo , "David S. Miller" , Network Development , LKML , linux-wireless , ath10k@lists.infradead.org, jiri@resnulli.us, briannorris@chromium.org From: Ben Greear Message-ID: Date: Mon, 25 May 2020 10:08:58 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <20200525090749.GJ1634618@smile.fi.intel.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On 05/25/2020 02:07 AM, Andy Shevchenko wrote: > On Fri, May 22, 2020 at 04:23:55PM -0700, Steve deRosier wrote: >> On Fri, May 22, 2020 at 2:51 PM Luis Chamberlain wrote: > >> I had to go RTFM re: kernel taints because it has been a very long >> time since I looked at them. It had always seemed to me that most were >> caused by "kernel-unfriendly" user actions. The most famous of course >> is loading proprietary modules, out-of-tree modules, forced module >> loads, etc... Honestly, I had forgotten the large variety of uses of >> the taint flags. For anyone who hasn't looked at taints recently, I >> recommend: https://www.kernel.org/doc/html/latest/admin-guide/tainted-kernels.html >> >> In light of this I don't object to setting a taint on this anymore. >> I'm a little uneasy, but I've softened on it now, and now I feel it >> depends on implementation. >> >> Specifically, I don't think we should set a taint flag when a driver >> easily handles a routine firmware crash and is confident that things >> have come up just fine again. In other words, triggering the taint in >> every driver module where it spits out a log comment that it had a >> firmware crash and had to recover seems too much. Sure, firmware >> shouldn't crash, sure it should be open source so we can fix it, >> whatever... > > While it may sound idealistic the firmware for the end-user, and even for mere > kernel developer like me, is a complete blackbox which has more access than > root user in the kernel. We have tons of firmwares and each of them potentially > dangerous beast. As a user I really care about my data and privacy (hacker can > oops a firmware in order to set a specific vector attack). So, tainting kernel > is _a least_ we can do there, the strict rules would be to reboot immediately. > >> those sort of wishful comments simply ignore reality and >> our ability to affect effective change. > > We can encourage users not to buy cheap crap for the starter. There is no stable wifi firmware for any price. There is also no obvious feedback from even name-brand NICs like ath10k or AX200 when you report a crash. That said, at least in my experience with ath10k-ct, the OS normally recovers fine from firmware crashes. ath10k already reports full crash reports on udev, so easy for user-space to notice and report bug reports upstream if it cares to. Probably other NICs do the same, and if not, they certainly could. Thanks, Ben -- Ben Greear Candela Technologies Inc http://www.candelatech.com