[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <09b340dd-c8a8-689c-4dad-4fe0e36d39ae@linux.intel.com>
Date: Sun, 29 Aug 2021 09:17:53 -0700
From: Andi Kleen <ak@...ux.intel.com>
To: "Michael S. Tsirkin" <mst@...hat.com>
Cc: Dan Williams <dan.j.williams@...el.com>,
"Kuppuswamy, Sathyanarayanan"
<sathyanarayanan.kuppuswamy@...ux.intel.com>,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
Peter Zijlstra <peterz@...radead.org>,
Andy Lutomirski <luto@...nel.org>,
Bjorn Helgaas <bhelgaas@...gle.com>,
Richard Henderson <rth@...ddle.net>,
Thomas Bogendoerfer <tsbogend@...ha.franken.de>,
James E J Bottomley <James.Bottomley@...senpartnership.com>,
Helge Deller <deller@....de>,
"David S . Miller" <davem@...emloft.net>,
Arnd Bergmann <arnd@...db.de>,
Jonathan Corbet <corbet@....net>,
Peter H Anvin <hpa@...or.com>,
Dave Hansen <dave.hansen@...el.com>,
Tony Luck <tony.luck@...el.com>,
Kirill Shutemov <kirill.shutemov@...ux.intel.com>,
Sean Christopherson <seanjc@...gle.com>,
Kuppuswamy Sathyanarayanan <knsathya@...nel.org>,
X86 ML <x86@...nel.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Linux PCI <linux-pci@...r.kernel.org>,
linux-alpha@...r.kernel.org, linux-mips@...r.kernel.org,
linux-parisc@...r.kernel.org, sparclinux@...r.kernel.org,
linux-arch <linux-arch@...r.kernel.org>,
Linux Doc Mailing List <linux-doc@...r.kernel.org>,
virtualization@...ts.linux-foundation.org
Subject: Re: [PATCH v4 11/15] pci: Add pci_iomap_shared{,_range}
> Let's be frank, even without encryption disabling most drivers -
> especially weird ones that poke at hardware before probe -
> is far safer than keeping them, but one loses a bunch of features.
Usually we don't lose features at all. None of the legacy drivers are
needed on a guest (or even a modern native system). It's all just all
for old hardware. Maybe in 20+ years it can be all removed, but we can't
wait that long.
> IOW all this hardening is nice but which security/feature tradeoff
> to take it a policy decision, not something kernel should do
> imho.
There's no mechanism to push this kind of policy to user space. Users
don't have control what initcalls run. At the time they execute there
isn't even any user space yet.
Even if they could somehow control them it's very unlikely they would
understand them and make an informed decision.
Doing it at build time is not feasible either since we want to run on
standard distribution kernels.
For modules we have a policy mechanism (prevent udev probing by
preventing enumeration), and that is implemented, but only handling
modules is not enough. The compiled in drivers have to be handled too,
otherwise you have gaping holes in the protection. We don't prevent
users manually loading modules that might probe, but that is a policy
decision that users actually sensibly make in user space.
Also I changing this single call really that bad? It's not that we
changing anything drastic here, just give the low level subsystem a
better hint about the intention. If you don't like the function name,
could make it an argument instead?
-Andi
>
Powered by blists - more mailing lists