Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp27671yba; Mon, 1 Apr 2019 00:46:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqzF2hc0v1Ca8IBedZA/AmdnKUfL9sH8chxzlzLQo21EwxSheLDke3f6UWtooGQ5kIAHMmUD X-Received: by 2002:a65:6259:: with SMTP id q25mr31653103pgv.103.1554104791394; Mon, 01 Apr 2019 00:46:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554104791; cv=none; d=google.com; s=arc-20160816; b=LYAFXjj/xyZy3nW6hP8WPqIBIueRxBqzzXxBPCHeyFxm7XZLpeBA8j0kk9BsnWbX/m P8vx+Ka6aUhpoq5MvJ5KeWpyHkEQ8guHVWOByePlPjFbUa8v9PNByt263GVtnmLLxx2H QoIdNLOiyk4DzcptwcQ7whn5ZFtZwxFUOMSTcjX+KopgssedXEp+XE2SGXga/CXWYe65 0kOlijUc0QwCTOzJeskmUr3QcD/jQYJOsMgs8EXgIY24u0gfo0Newy4skSd4vEwA2OrU Zs9FbdEgkzgOiC8S/D0TKTMpjTATB7kCW6EAOEG+qw4o3Ib3M64y3ZRjAzQ7TmocHbjW CobA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:organization:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=I0YCEiCXyeFBaVIDvgDpfPonVwn4nOZdN46KGJ7Lpyc=; b=U6TEwMbUrQV7ibwr8Fi0fkg+36sicXBFl0Il5jPoPHXwYqBZwI662z76L4X9O6p12K MkX8sqd648pL46vmc7kn2Pv/ohtSCn9mS0WfGQuycw1JkzvA/1vFKACquvAH4GVU3nk6 1X/mXAf3XNPRxdWnRVu8QJUlpK75afqzZ9Q5mwgqefG3IjRRIwolL8QowBNTCerFI2+t CjJKWoyzkAN8dsWIKtvfIioP04lHEjhQlilvqiD+PYK60bwxlJPyOYgrycsXaSpzF3S5 luHEC89ecVzv5PHzRjpkaC3+Sgk0MPh9F4azQ9nj8RA10gjaxBDdkXxbTdYNRC7LfosH r7rA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y17si8099980plr.204.2019.04.01.00.46.14; Mon, 01 Apr 2019 00:46:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731979AbfDAHoG (ORCPT + 99 others); Mon, 1 Apr 2019 03:44:06 -0400 Received: from mga17.intel.com ([192.55.52.151]:26672 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731833AbfDAHoG (ORCPT ); Mon, 1 Apr 2019 03:44:06 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga107.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 01 Apr 2019 00:44:05 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.60,295,1549958400"; d="scan'208";a="312083617" Received: from lahna.fi.intel.com (HELO lahna) ([10.237.72.157]) by orsmga005.jf.intel.com with SMTP; 01 Apr 2019 00:44:02 -0700 Received: by lahna (sSMTP sendmail emulation); Mon, 01 Apr 2019 10:44:01 +0300 Date: Mon, 1 Apr 2019 10:44:01 +0300 From: Mika Westerberg To: Lukas Wunner Cc: Mario.Limonciello@dell.com, linux-kernel@vger.kernel.org, michael.jamet@intel.com, YehezkelShB@gmail.com, andreas.noever@gmail.com, andriy.shevchenko@linux.intel.com, ckellner@redhat.com Subject: Re: [PATCH v3 00/36] thunderbolt: Software connection manager improvements Message-ID: <20190401074401.GO3622@lahna.fi.intel.com> References: <20190328123633.42882-1-mika.westerberg@linux.intel.com> <1aaab9baea4f46b481b5601dfb060104@ausx13mpc120.AMER.DELL.COM> <20190328165621.GB3622@lahna.fi.intel.com> <20190401043111.smpqjn3dhgitmh3e@wunner.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190401043111.smpqjn3dhgitmh3e@wunner.de> Organization: Intel Finland Oy - BIC 0357606-4 - Westendinkatu 7, 02160 Espoo User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 01, 2019 at 06:31:11AM +0200, Lukas Wunner wrote: > On Thu, Mar 28, 2019 at 06:56:21PM +0200, Mika Westerberg wrote: > > On Thu, Mar 28, 2019 at 03:17:57PM +0000, Mario.Limonciello@dell.com wrote: > > > > From: Mika Westerberg > > > > Sent: Thursday, March 28, 2019 7:36 AM > > > > * Do not automatically create PCIe tunnels. Instead we implement "user" > > > > security level in the software connection manager as well taking > > > > advantage of the existing sysfs interfaces. This allows user to disable > > > > PCIe tunneling completely or implement different white listing > > > > policies. Major distros include bolt system daemon that takes care of > > > > this. > > > > > > This is a bit unfortunate. Is this because of IOMMU limitations in working > > > with devices down the chain? > > > > No, it just makes it possible to do things such as "disable all PCIe > > tunneling", like the master switch we have in GNOME UI. > > It appears to be a change in behavior though as PCIe tunnels are > currently established automatically on Macs which don't use ICM. > The change might be considered breaking userspace, not sure. I don't think userspace is breaking here. The userspace interface we provide is through sysfs and only change we do in this series that could affect is in the patch 05. I Cc'd Mario and Christian just to make sure fwupd and bolt still keep working (these are the two userspace applications using the interface AFAIK). I think you mean user experience instead. It should not affect because if you run any major distro all the components including GNOME UI are prepared to handle this. > Also on macOS it's just plug and play without any need to configure > whitelists or anything. macOS does have whitelist too. If you plug in unsupported device you don't get to use it and it is listed as "unsupported" in the system report. I'm not sure if end users can tune the list. In Linux side I would really like to make it possible to implement whitelisting and disabling PCIe tunneling, and since we already have the interface for that (the sysfs ABI) it only makes sense to use it. That interface allows userspace to implement different kinds of policies from disabling all PCIe tunneling to allowing everything (it can be done using simple udev rule).