[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <YjLVcnl1qfdoDf48@lahna>
Date: Thu, 17 Mar 2022 08:30:10 +0200
From: Mika Westerberg <mika.westerberg@...ux.intel.com>
To: "Limonciello, Mario" <Mario.Limonciello@....com>
Cc: Robin Murphy <robin.murphy@....com>,
"michael.jamet@...el.com" <michael.jamet@...el.com>,
"linux-usb@...r.kernel.org" <linux-usb@...r.kernel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"YehezkelShB@...il.com" <YehezkelShB@...il.com>,
"iommu@...ts.linux-foundation.org" <iommu@...ts.linux-foundation.org>,
"andreas.noever@...il.com" <andreas.noever@...il.com>,
"hch@....de" <hch@....de>
Subject: Re: [PATCH] thunderbolt: Stop using iommu_present()
Hi Mario,
On Wed, Mar 16, 2022 at 06:34:51PM +0000, Limonciello, Mario wrote:
> > Might it be reasonable for the Thunderbolt core to check early on if any
> > tunnelled ports are not marked as external facing, and if so just tell
> > the user that iommu_dma_protection is off the table and anything they
> > authorise is at their own risk?
> >
> > Robin.
>
> How about in iommu_dma_protection_show to just check that all the device
> links to the NHI are marked as untrusted?
Actually this does not work either because we have pre-USB4 systems out
there that are using firmware based connection manager and do not set
the "device links" (as it is only needed for USB4 software based
connection manager systems).
So only thing we can use is the ->external_facing (and ->untrusted) as
those exists in all these systems (well assuming the BIOS provided them
but this is Microsoft requirement in the same way with the DMAR bit).
[For those who are not familiar with the connection manager, it is the
software or firmware that actually creates the tunnels over the
Thunderbolt/USB4 fabric. In Intel systems up to Alder Lake it used to be
firmware based, and from Alder Lake and beyond it is software based
meaning that the Linux Thunderbolt driver creates the tunnels. Apple
systems have been software based from the beginnning.]
Powered by blists - more mailing lists