lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 23 Sep 2010 15:11:33 +0100
From:	Mark Brown <broonie@...nsource.wolfsonmicro.com>
To:	Alan Cox <alan@...ux.intel.com>
Cc:	Alan Cox <alan@...rguk.ukuu.org.uk>,
	Grant Likely <grant.likely@...retlab.ca>,
	linux-kernel@...r.kernel.org, x86@...nel.org,
	David Woodhouse <dwmw2@...radead.org>,
	Thomas Gleixner <tglx@...utronix.de>
Subject: Re: [PATCH] x86/mrst: add SFI platform device parsing code

On Thu, Sep 23, 2010 at 11:13:47AM +0100, Alan Cox wrote:

> > So the expectation is that the platform data parser functions in the
> > SFI device list will be querying the DMI data and selecting the actual
> > parsing based on that?  Perhaps adding DMI keys to the match tables so
> > the infrastructure is there for doing the device specific things would

> That will just encourage people not to be careful.

I'm not see anything here which provides a way for people to be careful
- people just need to add the code directly into the parser if there's
no format defined in the kernel the're working on.  If (as will be the
case with most chips) there's nothing there then people are pretty much
left to their own devices unless they choose to work upstream.  From
experience what the overwheming majority of OEMs will actually do is
work on the latest kernel from their distro of choice, normally without
contributing their changes anywhere.

> > My main issue here is that the code is working on the assumption that
> > we have one standard idea of what the SFI data means and provides no
> > guidance to users about handling the inevitable variations.

> There should be no variations and the nature of the platform means that
> might even work out. I don't really want to add it to the table unless
> we have lots needing DMI data. Right now we don't and there are
> multiple platform implementations in existence.

What is it about this platform that is going to restrict the problem?

Code which makes this sort of assumption about knowing the platforms
that the device will be deployed on well is relatively common but the
usual result is that OEMs want to change the reference platforms and the
assumptions that the code has been making about the systems and about
how people will work with the code break down.  This problem is much
more pronounced in the embedded space where the hardware is much less
self-describing and regular than on PCs.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ