Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp765179ybt; Mon, 6 Jul 2020 23:04:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzX22Y7mP1CE99DvGAp9GQewDbsTMLfdG1f4LmXP0aDK/erSjxM9Jx4iPkVfq4z4U+dvke2 X-Received: by 2002:a17:906:2c53:: with SMTP id f19mr45147511ejh.523.1594101878342; Mon, 06 Jul 2020 23:04:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594101878; cv=none; d=google.com; s=arc-20160816; b=wjb3+dn97LUZECRwIyt6ACuHuxCrYUhKU381Y8FNoQ4TjMmUCA2R+pigCUkSQkn94h Ky+fphpZXr8SgAF42obYW2zFSkNmvTdpMWozwiMgkBLA/4WuDMLWztZtDlPUysfCLXp6 /NzGcNo9A7Zu7RXVKhhO0969SdcXWFMWJuIKVxZLsZPop+4j1zXTH/HCq799LfVQh8Et AQYf+Z+KuoNi3uTEskuq4RPqXFPcCzVmA08hCcJAIXEk/BISktdpKbtb5lrxAbXP1Xxf ECOYukrfBHXhVH/uF8bRZYMO87Lfye8V1GWyHPFZkLlio0HgwwonbNTeWRgwkcYRJDfH /NxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=At7frkuP//m2C4wO/t68JtiKfwGrxfIjgNhoGFPjuqY=; b=BQMUhV9ffa76zSoKnfZkI8u1AdQnWAkCQLZBasRXqyurx/QGqXLmCWET88rYwYiQkg HFzq6D8tOsbA1KdBOXNIonPm9CMqVZibEf/1B4xVrOhxrNlM1aIE3QjDisVePrx8metR dM6EyuQtXnBytgidqDfJwVAljBwrdLgjobZrD5LY68d1FM9pvSIKdkamxbrgvGyM3Ktf 8iEmdD2pHpUl8boWC5bVXSwDSdR4fTVEAhFcxAvmQEwy4MeVdnm1gpqzDnZSWpBDCgMv n6nvJJl8nkzHosvlWgyF/v7kE2yZcJinY/mH7cjc3QruMCml5xv3p/g6nkNwuz4iVrfH llAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=GgPOPzZV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f11si13928211edr.42.2020.07.06.23.04.14; Mon, 06 Jul 2020 23:04:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=GgPOPzZV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728133AbgGGGDq (ORCPT + 99 others); Tue, 7 Jul 2020 02:03:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58848 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726889AbgGGGDq (ORCPT ); Tue, 7 Jul 2020 02:03:46 -0400 Received: from mail-lf1-x142.google.com (mail-lf1-x142.google.com [IPv6:2a00:1450:4864:20::142]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DDC52C061755 for ; Mon, 6 Jul 2020 23:03:45 -0700 (PDT) Received: by mail-lf1-x142.google.com with SMTP id t9so24047383lfl.5 for ; Mon, 06 Jul 2020 23:03:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=At7frkuP//m2C4wO/t68JtiKfwGrxfIjgNhoGFPjuqY=; b=GgPOPzZVB9QG+V16ArbLi5HbSt8wmX/XmnUem6yWxPjNtsObAzq4Iu9cmw7ZSWeDyB mGodJ1zI8Trej+99LGaRcwwPrnC2CWw3fkde9h2CLvAz5Oq2GNg3GBNDXWkVTJwk499z va0qiN0auLDXpURyHcMx0O5f4twmGjWZNUlUiMzUumLZ5+GiAvfINFNk4jNgVcUUX+CS sGy8XHr63Pt36UrDUeceTJD7/K2ZMK9XduWN2tVc0+VRly4yh1fpYbXReeJy5XPtPm+1 B+kWAKlt3lJDmUnPS5Hd/kKzs2DRBiPrHxZXT2uKd6TTthaAtnaHNt+/94D/CAWaGUQW ipdg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=At7frkuP//m2C4wO/t68JtiKfwGrxfIjgNhoGFPjuqY=; b=GWECWPJ17OYKcfIc+sEwS3gt2iXfIBM4E36KzQlWYceQOPxFA5duHkxhb8JNoC5wH7 W2go3gaWCfWzc7MzeY6xQjhWSqMU//Oce/LNaWmEMz8rK4csCUugm5VwBRPxOKk57nb+ re6nUhC6OGjZAutXQUdFw2xRCrx6NfNu6A6EF07SbYm38lRZ1r8YvER3aHOUYBsJzfub tHGnqxsSbx6EjR64JvfJzL2O/ON6JPHWeHjcsG4u3EOeNlFqsJOKIH/1kwFKEoHtzVrS ZufJX8787Qtb7HKWwIdPp0Sa4pLAXMy1Pgxk0E2FlSeE5KUdyUIwI4YzGIhtJN1NOH2c cj2w== X-Gm-Message-State: AOAM530y4M8teKcXJ51PpmxTS3rLdoQMPN1ndfJyM5AXKS+TNGMIugic ODkeAVg/YLfm8ovnc/98m7yKrlznwEdgqWJIo23VyQ== X-Received: by 2002:a05:6512:34c3:: with SMTP id w3mr15837701lfr.122.1594101823881; Mon, 06 Jul 2020 23:03:43 -0700 (PDT) MIME-Version: 1.0 References: <20200630044943.3425049-1-rajatja@google.com> <20200630044943.3425049-6-rajatja@google.com> <20200630104948.GC856968@kuha.fi.intel.com> <20200630125216.GA1109228@kroah.com> <20200630153816.GD1785141@kroah.com> <20200630170012.GB1894898@kroah.com> In-Reply-To: From: Rajat Jain Date: Mon, 6 Jul 2020 23:03:07 -0700 Message-ID: Subject: Re: [PATCH v2 5/7] driver core: Add device location to "struct device" and expose it in sysfs To: "Oliver O'Halloran" Cc: Greg Kroah-Hartman , "Rafael J. Wysocki" , Heikki Krogerus , David Woodhouse , Lu Baolu , Joerg Roedel , Bjorn Helgaas , "Rafael J. Wysocki" , Len Brown , "open list:AMD IOMMU (AMD-VI)" , Linux Kernel Mailing List , Linux PCI , ACPI Devel Maling List , Raj Ashok , "Krishnakumar, Lalithambika" , Mika Westerberg , Jean-Philippe Brucker , Prashant Malani , Benson Leung , Todd Broch , Alex Levin , Mattias Nissler , Rajat Jain , Bernie Keany , Aaron Durbin , Diego Rivas , Duncan Laurie , Furquan Shaikh , Jesse Barnes , Christian Kellner , Alex Williamson , Saravana Kannan , Suzuki K Poulose , Arnd Bergmann Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 1, 2020 at 10:23 PM Oliver O'Halloran wrote: > > On Thu, Jul 2, 2020 at 4:07 AM Rajat Jain wrote: > > > > *snip* > > > > > > I guess it would make sense to have an attribute for user space to > > > > write to in order to make the kernel reject device plug-in events > > > > coming from a given port or connector, but the kernel has no reliable > > > > means to determine *which* ports or connectors are "safe", and even if > > > > there was a way for it to do that, it still may not agree with user > > > > space on which ports or connectors should be regarded as "safe". > > > > > > Again, we have been doing this for USB devices for a very long time, PCI > > > shouldn't be any different. Why people keep ignoring working solutions > > > is beyond me, there's nothing "special" about PCI devices here for this > > > type of "worry" or reasoning to try to create new solutions. > > > > > > So, again, I ask, go do what USB does, and to do that, take the logic > > > out of the USB core, make it bus-agnositic, and _THEN_ add it to the PCI > > > code. Why the original submitter keeps ignoring my request to do this > > > is beyond me, I guess they like making patches that will get rejected :( > > > > IMHO I'm actually trying to precisely do what I think was the > > conclusion of our discussion, and then some changes because of the > > further feedback I received on those patches. Let's take a step back > > and please allow me to explain how I got here (my apologies but this > > spans a couple of threads, and I"m trying to tie them all together > > here): > > The previous thread had some suggestions, but no real conclusions. > That's probably why we're still arguing about it... > > > GOAL: To allow user space to control what (PCI) drivers he wants to > > allow on external (thunderbolt) ports. There was a lot of debate about > > the need for such a policy at > > https://lore.kernel.org/linux-pci/CACK8Z6GR7-wseug=TtVyRarVZX_ao2geoLDNBwjtB+5Y7VWNEQ@mail.gmail.com/ > > with the final conclusion that it should be OK to implement such a > > policy in userspace, as long as the policy is not implemented in the > > kernel. The kernel only needs to expose bits & info that is needed by > > the userspace to implement such a policy, and it can be used in > > conjunction with "drivers_autoprobe" to implement this policy: > > -------------------------------------------------------------------- > > .... > > That's an odd thing, but sure, if you want to write up such a policy for > > your systems, great. But that policy does not belong in the kernel, it > > belongs in userspace. > > .... > > -------------------------------------------------------------------- > > 1) The post https://lore.kernel.org/linux-pci/20200609210400.GA1461839@bjorn-Precision-5520/ > > lists out the approach that was agreed on. Replicating it here: > > ----------------------------------------------------------------------- > > - Expose the PCI pdev->untrusted bit in sysfs. We don't expose this > > today, but doing so would be trivial. I think I would prefer a > > sysfs name like "external" so it's more descriptive and less of a > > judgment. > > > > This comes from either the DT "external-facing" property or the > > ACPI "ExternalFacingPort" property. > > > > - All devices present at boot are enumerated. Any statically built > > drivers will bind to them before any userspace code runs. > > > > If you want to keep statically built drivers from binding, you'd > > need to invent some mechanism so pci_driver_init() could clear > > drivers_autoprobe after registering pci_bus_type. > > > > - Early userspace code prevents modular drivers from automatically > > binding to PCI devices: > > > > echo 0 > /sys/bus/pci/drivers_autoprobe > > > > This prevents modular drivers from binding to all devices, whether > > present at boot or hot-added. > > > > - Userspace code uses the sysfs "bind" file to control which drivers > > are loaded and can bind to each device, e.g., > > > > echo 0000:02:00.0 > /sys/bus/pci/drivers/nvme/bind > > I think this is a reasonable suggestion. However, as Greg pointed out > it's gratuitously different to what USB does for no real reason. > > > ----------------------------------------------------------------------- > > 2) As part of implementing the above agreed approach, when I exposed > > PCI "untrusted" attribute to userspace, it ran into discussion that > > concluded that instead of this, the device core should be enhanced > > with a location attribute. > > https://lore.kernel.org/linux-pci/20200618184621.GA446639@kroah.com/ > > ----------------------------------------------------------------------- > > ... > > The attribute should be called something like "location" or something > > like that (naming is hard), as you don't always know if something is > > external or not (it could be internal, it could be unknown, it could be > > internal to an external device that you trust (think PCI drawers for > > "super" computers that are hot pluggable but yet really part of the > > internal bus). > > .... > > "trust" has no direct relation to the location, except in a policy of > > what you wish to do with that device, so as long as you keep them > > separate that way, I am fine with it. > > ... > > ----------------------------------------------------------------------- > > > > And hence this patch. I don't see an attribute in USB comparable to > > this new attribute, except for the boolean "removable" may be. Are you > > suggesting to pull that into the device core instead of adding this > > "physical_location" attribute? > > He's suggesting you pull the "authorized" attribute into the driver > core. That's the mechanism USB uses to block drivers binding unless > userspace authorizes them. I don't see any reason why we can't re-use > that sysfs interface for PCI devices since the problem being solved is > fundamentally the same. The main question is what we should do as a > default policy in the kernel. For USB the default comes from the > "authorized_default" module param of usbcore: > > > /* authorized_default behaviour: > > * -1 is authorized for all devices except wireless (old behaviour) > > * 0 is unauthorized for all devices > > * 1 is authorized for all devices > > * 2 is authorized for internal devices > > */ > > #define USB_AUTHORIZE_WIRED -1 > > #define USB_AUTHORIZE_NONE 0 > > #define USB_AUTHORIZE_ALL 1 > > #define USB_AUTHORIZE_INTERNAL 2 > > > > static int authorized_default = USB_AUTHORIZE_WIRED; > > module_param(authorized_default, int, S_IRUGO|S_IWUSR); > > So the default policy for USB is to authorize any wired USB device and > we can optionally restrict that to just integrated devices. Sounding > familiar? Thank you for explaining! It is a lot more clear now :-) I have separated out the PCI portions of this patchset (patches 1-4 i.e. ones not related to this controversial change) into its own patchset. W.r.t patches 5-7, I think I'd like to collect my thoughts and send out a fresh RFC once I am ready (I'm running out of time on my deliverables so may have to carry some patches internally for the time being). But 2 quick points: 1) Currently there are already at least 2 existing buses with their own versions of "authorized": usb and thunderbolt, and the UAPI / semantics of "authorized" is different amongst these. Documentation/ABI/testing/sysfs-bus-thunderbolt - "authorized" is boolean Documentation/usb/authorization.rst - "authorized" is 0/1/2 (Side note: In addition to that, usb also has additional "authorized" related attributes e.g. interface_authorized_default etc which might not have an easy corresponding sensible meaning in other buses, so we may have to still leave it in USB.) So my question is, assuming we do not want to change or break existing UAPI, if I move the "authorized" attribute to the device core, who defines the semantics of the values it can take? It seems to me like individual buses should define that. And if so, then device core cannot use "authorized" value to decide to prevent drivers from binding to it? 2) It seemed to me (https://lore.kernel.org/linux-acpi/20200618184621.GA446639@kroah.com/) that we had at least somewhat agreement that the location of a device is a useful piece of info to have for userspace to have. The point I'm trying to make is that "exporting the location of device in sysfs" seems independent of "move untrusted attribute to the device core". LIke you said below, location of device is still useful (may not be sufficient, BMC case you mention) for the userspace to have, in order to decide whether to allow a device. So why object to this patch? Thanks, Rajat > > The internal / external status is still useful to know so we might > want to make a sysfs attribute for that too. However, I'd like to > point out that internal / external isn't the whole story. As I > mentioned in the last thread if I have a BMC device I *really* don't > want it to be authorized by default even though it's an internal > device. Similarly, if I know all my internal cards support PCIe > Component Authentication then I might choose not to trust any PCI > devices unless they authenticate successfully. > > > 3) The one deviation from the agreed approach in (1) is > > https://patchwork.kernel.org/patch/11633095/ . The reason is I > > realized that contrary to what I earlier believed, we might not be > > able to disable the PCI link to all external PCI devices at boot. So > > external PCI devices may actually bind to drivers before userspace > > comes up and does "echo 0 > /sys/bus/pci/drivers_autoprobe"). > > Yep, that's a problem. If we want to provide a useful mechanism to > userspace then the default behaviour of the kernel can't undermine > that mechanism. If that means we need another kernel command line > parameter then I guess we just have to live with it. > > Oliver