Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1058443yba; Sun, 31 Mar 2019 21:32:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqzZpoK/9MW6voh2I/+aZlMZgL6ZMB/3hksmZ5puGHnEdy4XiJ2y14u2xMJgPwL6KqXWzj9V X-Received: by 2002:a62:b40b:: with SMTP id h11mr50457718pfn.133.1554093124563; Sun, 31 Mar 2019 21:32:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554093124; cv=none; d=google.com; s=arc-20160816; b=SyJ+WmcmA1Rdlu5EPPAN/z252EYltKFl7yQHRZBdOxGiZjTWWp21pNgUhywOMgqiXI Ud+cHSkITIYB/IaJC/bO+tJfQUCh+hZsbf5KSZye5QhJa4UU4VBsWHo5537HVQe75uH+ HiTVZmJpStqel9h+1nZrgXJKG8aS1c9Z3XQ92+uqi4UQ9OCT3HpB/vwa2CM27g1JoPIh qJpnY9fLA5Y+1tNWO5vt5ozgwfKct2LcjM1k9HW5DPY2Bf3e9uqFkzsvW2zcoGGMNFOT LihnLJAaLY5LBJvZVstTBlW4Hg7MxRaZ6g+k5qGwD2i05MzG88EcgYlWMy5fDiNEEd+q trgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=BuS1azTnPf8WYkZ673NTjTDTGl+M7oqZ7AyH+W8pZJ4=; b=nwbuorsl9b3HkTtCVfiXHIckT8qM5l0fvV5yikgWPcXUF7bd5j3D5vI71T0zszq4xo zT5eYd/A4gRWJOX0KvEmnRAvcd5s7ImsNvNtjq+/KtF9nyEmoVzPG2VLai7cee4hPt4w eCYpFWg1/RBKtK3umPvYJLNcb5/7wKU3N2JD6D9nmcBWyv43uIuWBAnz38F2Kaok1xE+ vVRWKLeQCWpuPmxm+iLtfP568znWGD0BlSiG/ePUN5ON9UL1/LBgDO6BOMQbk6e2BPnX amUoM/zo9UyYC5l7G6r61yqs8QwfIuRy3GlHSfOnxw/YuNBgfCYtBvz0Z5fFY5q+PXgp /X+A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 64si8127403plk.279.2019.03.31.21.31.48; Sun, 31 Mar 2019 21:32:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726624AbfDAEbO (ORCPT + 99 others); Mon, 1 Apr 2019 00:31:14 -0400 Received: from bmailout2.hostsharing.net ([83.223.90.240]:46683 "EHLO bmailout2.hostsharing.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725860AbfDAEbN (ORCPT ); Mon, 1 Apr 2019 00:31:13 -0400 Received: from h08.hostsharing.net (h08.hostsharing.net [83.223.95.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "*.hostsharing.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (not verified)) by bmailout2.hostsharing.net (Postfix) with ESMTPS id 1256D2800DC4D; Mon, 1 Apr 2019 06:31:12 +0200 (CEST) Received: by h08.hostsharing.net (Postfix, from userid 100393) id B64A917E50; Mon, 1 Apr 2019 06:31:11 +0200 (CEST) Date: Mon, 1 Apr 2019 06:31:11 +0200 From: Lukas Wunner To: Mika Westerberg Cc: Mario.Limonciello@dell.com, linux-kernel@vger.kernel.org, michael.jamet@intel.com, YehezkelShB@gmail.com, andreas.noever@gmail.com, andriy.shevchenko@linux.intel.com, ckellner@redhat.com Subject: Re: [PATCH v3 00/36] thunderbolt: Software connection manager improvements Message-ID: <20190401043111.smpqjn3dhgitmh3e@wunner.de> References: <20190328123633.42882-1-mika.westerberg@linux.intel.com> <1aaab9baea4f46b481b5601dfb060104@ausx13mpc120.AMER.DELL.COM> <20190328165621.GB3622@lahna.fi.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190328165621.GB3622@lahna.fi.intel.com> User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 28, 2019 at 06:56:21PM +0200, Mika Westerberg wrote: > On Thu, Mar 28, 2019 at 03:17:57PM +0000, Mario.Limonciello@dell.com wrote: > > > From: Mika Westerberg > > > Sent: Thursday, March 28, 2019 7:36 AM > > > * Do not automatically create PCIe tunnels. Instead we implement "user" > > > security level in the software connection manager as well taking > > > advantage of the existing sysfs interfaces. This allows user to disable > > > PCIe tunneling completely or implement different white listing > > > policies. Major distros include bolt system daemon that takes care of > > > this. > > > > This is a bit unfortunate. Is this because of IOMMU limitations in working > > with devices down the chain? > > No, it just makes it possible to do things such as "disable all PCIe > tunneling", like the master switch we have in GNOME UI. It appears to be a change in behavior though as PCIe tunnels are currently established automatically on Macs which don't use ICM. The change might be considered breaking userspace, not sure. Also on macOS it's just plug and play without any need to configure whitelists or anything. Thanks, Lukas