Re: [MAINTAINERS SUMMIT] Device Passthrough Considered Harmful?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Jul 09, 2024 at 12:43:50PM -0700, Dan Williams wrote:

> A "Command Effects Log" seems like that starting point, with trust that
> cynical abuses of that contract have a higher cost than benefit, and
> trust that the protocol limits the potential damage of such abuse.

I've taken the view that companies are now very vigilant about
security and often have their own internal incentives and procedures
to do secure things.

If someone does a cynical security breaking thing and deploys it to a
wide user base they are likely to be caught by a security researcher
and embarassed with a CVE and a web site with a snappy name.

Not 100% of course, but it is certainly not a wild west of people just
doing whatever they want.

The other half of this bargin is we have to be much clearer about what
the security model is and what is security breaking. Like Christoph I
often have conversations with people who don't understand the basics
of how the Linux security models should work and are doing device-side
work that has to fit into it.

Jason




[Index of Archives]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Photo]     [Yosemite News]     [Yosemite Photos]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux