Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S968439AbdDSRYQ (ORCPT ); Wed, 19 Apr 2017 13:24:16 -0400 Received: from esa4.dell-outbound.iphmx.com ([68.232.149.214]:28385 "EHLO esa4.dell-outbound.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S968338AbdDSRYN (ORCPT ); Wed, 19 Apr 2017 13:24:13 -0400 From: X-LoopCount0: from 10.170.28.39 X-IronPort-AV: E=Sophos;i="5.37,222,1488866400"; d="scan'208";a="497852373" To: CC: , , , , , , , , , Subject: RE: RFC: WMI Enhancements Thread-Topic: RFC: WMI Enhancements Thread-Index: AQHStXDRfWGz3Na/pUazu2XvXvLesqHF0EKAgASlkYCAABLTgIAA6aUAgAA5pYCAADDyAIAAOCOAgACXygCAADsZoIAAXFqA//+yhDA= Date: Wed, 19 Apr 2017 17:24:00 +0000 Message-ID: <4e3e507b116443298427002c5aafed7f@ausx13mpc120.AMER.DELL.COM> References: <20170412230854.GA11963@fury> <20170419075248.GD18887@pali> <201704191854.51783@pali> In-Reply-To: <201704191854.51783@pali> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.208.86.26] Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from base64 to 8bit by mail.home.local id v3JHOJq0001236 Content-Length: 2591 Lines: 50 > -----Original Message----- > From: Pali Rohár [mailto:pali.rohar@gmail.com] > Sent: Wednesday, April 19, 2017 11:55 AM > To: Limonciello, Mario > Cc: dvhart@infradead.org; rjw@rjwysocki.net; luto@amacapital.net; > len.brown@intel.com; corentin.chary@gmail.com; luto@kernel.org; > andriy.shevchenko@linux.intel.com; linux-kernel@vger.kernel.org; platform- > driver-x86@vger.kernel.org; linux-pm@vger.kernel.org > Subject: Re: RFC: WMI Enhancements > > On Wednesday 19 April 2017 18:29:53 Mario.Limonciello@dell.com wrote: > > > As wrote above, I'm fine with explicit whitelist of WMI GUIDs which > > > will be exported to userspace after communication with vendor. > > > > What about GUID's not yet used by kernel drivers? Would those > > default to whitelist default to blacklist? My preference would be > > to default to whitelist. This allows new GUID's to be added later > > without needing to modify kernel for something that kernel won't > > need to do anything immediately. > > I understood it as there would be explicit whitelist in kernel and new > GUIDs would be needed to add into whitelist, even those which do not > have kernel wmi driver. > > Exporting all GUIDs (to userspace) which are not bind to kernel driver > has one big problem. If kernel introduce new wmi driver for such GUID > then it block userspace to access it or at least would need to provide > audit filter and something would be probably filtered. It means that > some userspace applications which would use that GUIDs stops working > after upgrading to new kernel. And we can be in situation where *user* > need to decide: either use 3rd party userspace application from vendor > which provide some special settings for your laptop, or use kernel > module which provides standard rfkill/led/input class driver. > If this proposal goes forward it would sound like to me an audit filter would become a prerequisite for any new WMI kernel driver. This is not a problem to me. This audience recommends the way for users to configure the system but of course cannot stop users from doing what they decide to do. We're all in agreement that the kernel should keep responsibility for some of these functionalities. If a new kernel WMI driver duplicates functionality that happens to find its way in userspace and the kernel audits that out yes the userspace application may start to have less functionality, but better support would live in the kernel and the user would be better supported by the stack (for example could use standard rfkill userspace utilities).