Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1152397ybt; Thu, 18 Jun 2020 01:39:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw060XyP4FysNs3xeDnVhBbOzcZ8EtAbazhFAbzh8g4LrEYxOhEKTrqLAQknFVSzf/FBKoZ X-Received: by 2002:a17:906:768e:: with SMTP id o14mr3046237ejm.497.1592469565082; Thu, 18 Jun 2020 01:39:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592469565; cv=none; d=google.com; s=arc-20160816; b=i65wphknWCDNplgTGuVPupTK+4d7O7WpNkpskOk2DpjnbXP77Z/r+Dl+vxkH61ZvtB VpsoCgHURsuFKMiPRZZsNGYQu/tF1OwTB59BNvo5LjOeSgCWyJJPITgQLT4AnWxXVVwu B8iIYf3kDujv4eEMPPKI/prQWHZhqGgKWiu3S3h7nUJ3RuThEV4q5Bq3LOqIQ9kGoYLt UyTAVjbWGlnOiFesq1r0dXFQ9onMtxyU+8s362RLSGcF5j0QlVmA4+gNUzmouIy3kKaL 8fGW8lEHryvRVNaxP+DtkoWgo6bcbQqCmmrxrFg26oo1sRmAI1enLrecudsYlE0+KrFy 1qmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=s6EO4qiYYOyFB13tZo/jbZEZABH+nM33s5wO1OEBDvA=; b=J+iGwU+cf7XdTJo6ozqpk34+26/MLf74IFF3UhHTefY1oc3Ahri68WlamdfRWbxRYK k0bWCl+vhYPbq+adDTtPDRrllWVL1pI7fvAUi1Ke8udkgJNO3nY8KQu+cvTUDzVvrt2U cLklebiAOXrz7EtPiuCpXsuSyBaXGzkl7JpPA0iD4p6HBIQUdw+sKAqK0yjaf7TeDeiJ ZWNyKLFNNGdWOVOLFLulsKvLCE9w0a2grNlt/nuCdlzjvE4JvKefIgqvj0sP4EEk5e2A DS0USbeNy1XVzRdMOrSh1mO6W4kObDtMs6ZgRBGwuvpSGcvelw6WkJqLuzSE4RaPiK18 bwMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fhmVqgBm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dr10si1654620ejc.204.2020.06.18.01.39.02; Thu, 18 Jun 2020 01:39:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fhmVqgBm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728633AbgFRIg6 (ORCPT + 99 others); Thu, 18 Jun 2020 04:36:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:54142 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728585AbgFRIgy (ORCPT ); Thu, 18 Jun 2020 04:36:54 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EBE5F214DB; Thu, 18 Jun 2020 08:36:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592469413; bh=ceL/T8t0nvr/U3tOjodwMKknS/aAxNJ8RojCHrLF1ok=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=fhmVqgBm4oYl3kaigyXF+fjYbAtWBnSCDQ01zfS0JLYK3gukCSKFX5/7FuhT1Rddg G+/nRvmR+h/ih67DEse6ah3ZJOIHmQNa/IrfpIzNqOgVLauwcJ4gL8gLuByIeLnTZe XbWo06NX2QYRQYvzI3OU8jnZRnrWl3CjgdK+X07A= Date: Thu, 18 Jun 2020 10:36:46 +0200 From: Greg Kroah-Hartman To: Andy Shevchenko Cc: Rajat Jain , Christoph Hellwig , David Woodhouse , Lu Baolu , Joerg Roedel , Bjorn Helgaas , "Rafael J. Wysocki" , Len Brown , iommu@lists.linux-foundation.org, Linux Kernel Mailing List , linux-pci , ACPI Devel Maling List , Raj Ashok , "Krishnakumar, Lalithambika" , Mika Westerberg , Jean-Philippe Brucker , Prashant Malani , Benson Leung , Todd Broch , Alex Levin , Mattias Nissler , Rajat Jain , Bernie Keany , Aaron Durbin , Diego Rivas , Duncan Laurie , Furquan Shaikh , Jesse Barnes , Christian Kellner , Alex Williamson , Oliver O'Halloran Subject: Re: [PATCH 4/4] pci: export untrusted attribute in sysfs Message-ID: <20200618083646.GA1066967@kroah.com> References: <20200616011742.138975-1-rajatja@google.com> <20200616011742.138975-4-rajatja@google.com> <20200616073249.GB30385@infradead.org> <20200617073100.GA14424@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 18, 2020 at 11:12:56AM +0300, Andy Shevchenko wrote: > On Wed, Jun 17, 2020 at 10:56 PM Rajat Jain wrote: > > On Wed, Jun 17, 2020 at 12:31 AM Christoph Hellwig wrote: > > ... > > > (and likely call it "external" instead of "untrusted". > > Which is not okay. 'External' to what? 'untrusted' has been carefully > chosen by the meaning of it. > What external does mean for M.2. WWAN card in my laptop? It's in ACPI > tables, but I can replace it. Then your ACPI tables should show this, there is an attribute for it, right? > This is only one example. Or if firmware of some device is altered, > and it's internal (whatever it means) is it trusted or not? That is what people are using policy for today, if you object to this, please bring it up to those developers :) > So, please leave it as is (I mean name). firmware today exports this attribute, why do you not want userspace to also know it? Trust is different, yes, don't get the two mixed up please. That should be a different sysfs attribute for obvious reasons. thanks, greg k-h