Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp76513ybt; Tue, 30 Jun 2020 15:10:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz/gN5QWQCfrh3WSGnK7jujsDfrV14himmI8Cg3X4RivC+aKUXd6N93rqtMl3J7ziOz6Gpq X-Received: by 2002:a17:906:454d:: with SMTP id s13mr19652832ejq.319.1593554579496; Tue, 30 Jun 2020 15:02:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593554579; cv=none; d=google.com; s=arc-20160816; b=lFQtM2VR4CAPv/MB0yYqH4LLzRWCOpsgQ/FbOR0eoqHcd5bZCjzgs6814ZGnMFsbxo AR3L8aN/AwTMvhbo0wk6IBCYelJvfWc7z9BsoWCWPFyjBaU6KjFLWYQOF41Rfw8SvFc7 HMngpyPZXASqmTSZQ2WWUvFCJusW3/UidVD53U5M9VJCZ/vTd97JrGEbVYLZ6n4hNnOk 1Q9PVKgh+VpyALtQS99X8LwW2PfUcpEgG/kdOzZuM7MWkKb6nszQ9gkQyXijHgYuB69e 36U+2n2NKxlmN4jwRR25AOl02SSuySZ96dXJT//tXdF2FeaUo/ean4hlsDpqh/r9Z33p z2iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=iehLzo9Nfq5Ljr8eTFxknPD7USeggHbZHzQ+lGq/H+8=; b=Uzs8t9U02A7O4CQLdZGExqcKIB3byGD3rjLIRQutMAMK3xBcDaIZfhtkV1XamNpUBE D4OO8nk6VWm0jnHGmEn7DqXsKQkDwY4v8RjT6yyRrIiRhtVdHojtFrQyU4VC0h726xm/ F0W3N+W7/rQXjLsw9Bz3yST8EGVWLfySJ4jIAYQaFp8HbtHuyR9kHjyBY/bbRqEKr5i9 tHldbmZXxNFB3gpW2FOCLwoh/zgba42cEFl/q27KELHeL3PRMONdu1FxGznQaaniLxst 8OsIRHHCGx7aSO1HEe/rdcaGQlx99L1I22RV9XSfIOkhCsMzIGbVL/l3WcrsASVQVcYl H9YA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t24si2544727ejr.733.2020.06.30.15.02.34; Tue, 30 Jun 2020 15:02:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729278AbgF3VqO (ORCPT + 99 others); Tue, 30 Jun 2020 17:46:14 -0400 Received: from jabberwock.ucw.cz ([46.255.230.98]:53630 "EHLO jabberwock.ucw.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728109AbgF3VqN (ORCPT ); Tue, 30 Jun 2020 17:46:13 -0400 Received: by jabberwock.ucw.cz (Postfix, from userid 1017) id 548E51C0C0F; Tue, 30 Jun 2020 23:46:10 +0200 (CEST) Date: Tue, 30 Jun 2020 23:46:09 +0200 From: Pavel Machek To: Greg Kroah-Hartman Cc: Rajat Jain , Jesse Barnes , Rajat Jain , Bjorn Helgaas , "Raj, Ashok" , "Krishnakumar, Lalithambika" , Bjorn Helgaas , linux-pci , Mika Westerberg , Jean-Philippe Brucker , Prashant Malani , Benson Leung , Todd Broch , Alex Levin , Mattias Nissler , Zubin Mithra , Bernie Keany , Aaron Durbin , Diego Rivas , Duncan Laurie , Furquan Shaikh , Christian Kellner , Alex Williamson , Joerg Roedel , Linux Kernel Mailing List Subject: Re: [RFC] Restrict the untrusted devices, to bind to only a set of "whitelisted" drivers Message-ID: <20200630214609.GB7113@duo.ucw.cz> References: <20200603121613.GA1488883@kroah.com> <20200605080229.GC2209311@kroah.com> <20200607113632.GA49147@kroah.com> <20200608175015.GA457685@kroah.com> <20200609095444.GA533843@kroah.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="i0/AhcQY5QxfSsSZ" Content-Disposition: inline In-Reply-To: <20200609095444.GA533843@kroah.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --i0/AhcQY5QxfSsSZ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! > > > I think that's inherently platform specific to some extent. We can do > > > it with our coreboot based firmware, but there's no guarantee other > > > vendors will adopt the same approach. But I think at least for the > > > ChromeOS ecosystem we can come up with something that'll work, and > > > allow us to dtrt in userspace wrt driver binding. > >=20 > > Agree, we can work with our firmware teams to get that right, and then > > expose it from kernel to userspace to help it implement the policy we > > want. >=20 > This is already in the spec for USB, I suggest working to get this added > to the other bus type specs that you care about as well (UEFI, PCI, > etc.) Note that "you can only use authorized SSD and authorized WIFI card in this notebook" was done before, but is considered antisocial. Best regards, Pavel --=20 (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blo= g.html --i0/AhcQY5QxfSsSZ Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQRPfPO7r0eAhk010v0w5/Bqldv68gUCXvuyoQAKCRAw5/Bqldv6 8j0rAKC4LyPWWRgo5jJUMBzipeCr9oLP5ACgryNN8BQa2ntWgS4kMWPf54Ue+Os= =cD1f -----END PGP SIGNATURE----- --i0/AhcQY5QxfSsSZ--