lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAPybu_0C44q+d33LN8yKGSyv6HKBMPNy0AG4LkCOqxc87w3WrQ@mail.gmail.com>
Date: Fri, 26 Jul 2024 10:04:48 +0200
From: Ricardo Ribalda Delgado <ricardo.ribalda@...il.com>
To: Laurent Pinchart <laurent.pinchart@...asonboard.com>
Cc: Jason Gunthorpe <jgg@...dia.com>, James Bottomley <James.Bottomley@...senpartnership.com>, 
	Jiri Kosina <jikos@...nel.org>, Dan Williams <dan.j.williams@...el.com>, ksummit@...ts.linux.dev, 
	linux-cxl@...r.kernel.org, linux-rdma@...r.kernel.org, netdev@...r.kernel.org
Subject: Re: [MAINTAINERS SUMMIT] Device Passthrough Considered Harmful?

Hi Laurent

On Thu, Jul 25, 2024 at 10:07 PM Laurent Pinchart
<laurent.pinchart@...asonboard.com> wrote:
>
> Hi Jason,
>
> On Thu, Jul 25, 2024 at 04:43:14PM -0300, Jason Gunthorpe wrote:
> > On Thu, Jul 25, 2024 at 10:31:25PM +0300, Laurent Pinchart wrote:
> >
> > > I don't think those are necessarily relevant examples, as far as device
> > > pass-through goes. Vendors have many times reverted to proprietary ways,
> > > and they still do, at least in the areas of the kernel I'm most active
> > > in. I've seen first hand a large SoC vendor very close to opening a
> > > significant part of their camera stack and changing their mind at the
> > > last minute when they heard they could possibly merge their code through
> > > a different subsystem with a pass-through blank cheque.
> >
> > If someone came with a fully open source framework for (say) some
> > camera,
>
> We have such a framework, it's called libcamera :-) Multiple vendors are
> already collaborating.
>
> > with a passthrough kernel driver design, would you reject it
> > soley because it is passthrough based and you are scared that
> > something else will use it to do something not open source?
>
> It depends what "passthrough kernel driver design" means. If it means
> accessing the PCI registers directly from userspace, yes. That's what X
> used to do before KMS, and I'm glad it's now a distant past.


Nobody has suggested giving PCI register access to userspace.


>
> If it means a kernel driver that takes the majority of its runtime
> parameters from a buffer blob assembled by userspace, while controlling
> clocks, power domains and performing basic validation in kernelspace,
> then I've already acked multiple drivers with such a design, exactly
> because they have open-source userspace that doesn't try to keep many
> device features proprietary and usable by closed-source userspace only.

If that was an option we would not be having this discussion.

Vendors cannot have vendor access in v4l2.
"""
It is not an option to upstream a driver that has support for
undocumented closed features. Basically maintainers can't put their
name on something that contains unverifiable (for them) and unusable
(by all except the vendor) features.
"""
https://linuxtv.org/news.php?entry=2022-11-14-1.hverkuil


>
> > I wouldn't agree with that position, I think denying users useful open
> > source solutions out of fear is not what Linux should be doing.
>
> --
> Regards,
>
> Laurent Pinchart
>


--
Ricardo Ribalda

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ