| .. SPDX-License-Identifier: GPL-2.0 |
| |
| ====================== |
| USB4 and Thunderbolt |
| ====================== |
| USB4 is the public specification based on Thunderbolt 3 protocol with |
| some differences at the register level among other things. Connection |
| manager is an entity running on the host router (host controller) |
| responsible for enumerating routers and establishing tunnels. A |
| connection manager can be implemented either in firmware or software. |
| Typically PCs come with a firmware connection manager for Thunderbolt 3 |
| and early USB4 capable systems. Apple systems on the other hand use |
| software connection manager and the later USB4 compliant devices follow |
| the suit. |
| |
| The Linux Thunderbolt driver supports both and can detect at runtime which |
| connection manager implementation is to be used. To be on the safe side the |
| software connection manager in Linux also advertises security level |
| ``user`` which means PCIe tunneling is disabled by default. The |
| documentation below applies to both implementations with the exception that |
| the software connection manager only supports ``user`` security level and |
| is expected to be accompanied with an IOMMU based DMA protection. |
| |
| Security levels and how to use them |
| ----------------------------------- |
| The interface presented here is not meant for end users. Instead there |
| should be a userspace tool that handles all the low-level details, keeps |
| a database of the authorized devices and prompts users for new connections. |
| |
| More details about the sysfs interface for Thunderbolt devices can be |
| found in ``Documentation/ABI/testing/sysfs-bus-thunderbolt``. |
| |
| Those users who just want to connect any device without any sort of |
| manual work can add following line to |
| ``/etc/udev/rules.d/99-local.rules``:: |
| |
| ACTION=="add", SUBSYSTEM=="thunderbolt", ATTR{authorized}=="0", ATTR{authorized}="1" |
| |
| This will authorize all devices automatically when they appear. However, |
| keep in mind that this bypasses the security levels and makes the system |
| vulnerable to DMA attacks. |
| |
| Starting with Intel Falcon Ridge Thunderbolt controller there are 4 |
| security levels available. Intel Titan Ridge added one more security level |
| (usbonly). The reason for these is the fact that the connected devices can |
| be DMA masters and thus read contents of the host memory without CPU and OS |
| knowing about it. There are ways to prevent this by setting up an IOMMU but |
| it is not always available for various reasons. |
| |
| Some USB4 systems have a BIOS setting to disable PCIe tunneling. This is |
| treated as another security level (nopcie). |
| |
| The security levels are as follows: |
| |
| none |
| All devices are automatically connected by the firmware. No user |
| approval is needed. In BIOS settings this is typically called |
| *Legacy mode*. |
| |
| user |
| User is asked whether the device is allowed to be connected. |
| Based on the device identification information available through |
| ``/sys/bus/thunderbolt/devices``, the user then can make the decision. |
| In BIOS settings this is typically called *Unique ID*. |
| |
| secure |
| User is asked whether the device is allowed to be connected. In |
| addition to UUID the device (if it supports secure connect) is sent |
| a challenge that should match the expected one based on a random key |
| written to the ``key`` sysfs attribute. In BIOS settings this is |
| typically called *One time saved key*. |
| |
| dponly |
| The firmware automatically creates tunnels for Display Port and |
| USB. No PCIe tunneling is done. In BIOS settings this is |
| typically called *Display Port Only*. |
| |
| usbonly |
| The firmware automatically creates tunnels for the USB controller and |
| Display Port in a dock. All PCIe links downstream of the dock are |
| removed. |
| |
| nopcie |
| PCIe tunneling is disabled/forbidden from the BIOS. Available in some |
| USB4 systems. |
| |
| The current security level can be read from |
| ``/sys/bus/thunderbolt/devices/domainX/security`` where ``domainX`` is |
| the Thunderbolt domain the host controller manages. There is typically |
| one domain per Thunderbolt host controller. |
| |
| If the security level reads as ``user`` or ``secure`` the connected |
| device must be authorized by the user before PCIe tunnels are created |
| (e.g the PCIe device appears). |
| |
| Each Thunderbolt device plugged in will appear in sysfs under |
| ``/sys/bus/thunderbolt/devices``. The device directory carries |
| information that can be used to identify the particular device, |
| including its name and UUID. |
| |
| Authorizing devices when security level is ``user`` or ``secure`` |
| ----------------------------------------------------------------- |
| When a device is plugged in it will appear in sysfs as follows:: |
| |
| /sys/bus/thunderbolt/devices/0-1/authorized - 0 |
| /sys/bus/thunderbolt/devices/0-1/device - 0x8004 |
| /sys/bus/thunderbolt/devices/0-1/device_name - Thunderbolt to FireWire Adapter |
| /sys/bus/thunderbolt/devices/0-1/vendor - 0x1 |
| /sys/bus/thunderbolt/devices/0-1/vendor_name - Apple, Inc. |
| /sys/bus/thunderbolt/devices/0-1/unique_id - e0376f00-0300-0100-ffff-ffffffffffff |
| |
| The ``authorized`` attribute reads 0 which means no PCIe tunnels are |
| created yet. The user can authorize the device by simply entering:: |
| |
| # echo 1 > /sys/bus/thunderbolt/devices/0-1/authorized |
| |
| This will create the PCIe tunnels and the device is now connected. |
| |
| If the device supports secure connect, and the domain security level is |
| set to ``secure``, it has an additional attribute ``key`` which can hold |
| a random 32-byte value used for authorization and challenging the device in |
| future connects:: |
| |
| /sys/bus/thunderbolt/devices/0-3/authorized - 0 |
| /sys/bus/thunderbolt/devices/0-3/device - 0x305 |
| /sys/bus/thunderbolt/devices/0-3/device_name - AKiTiO Thunder3 PCIe Box |
| /sys/bus/thunderbolt/devices/0-3/key - |
| /sys/bus/thunderbolt/devices/0-3/vendor - 0x41 |
| /sys/bus/thunderbolt/devices/0-3/vendor_name - inXtron |
| /sys/bus/thunderbolt/devices/0-3/unique_id - dc010000-0000-8508-a22d-32ca6421cb16 |
| |
| Notice the key is empty by default. |
| |
| If the user does not want to use secure connect they can just ``echo 1`` |
| to the ``authorized`` attribute and the PCIe tunnels will be created in |
| the same way as in the ``user`` security level. |
| |
| If the user wants to use secure connect, the first time the device is |
| plugged a key needs to be created and sent to the device:: |
| |
| # key=$(openssl rand -hex 32) |
| # echo $key > /sys/bus/thunderbolt/devices/0-3/key |
| # echo 1 > /sys/bus/thunderbolt/devices/0-3/authorized |
| |
| Now the device is connected (PCIe tunnels are created) and in addition |
| the key is stored on the device NVM. |
| |
| Next time the device is plugged in the user can verify (challenge) the |
| device using the same key:: |
| |
| # echo $key > /sys/bus/thunderbolt/devices/0-3/key |
| # echo 2 > /sys/bus/thunderbolt/devices/0-3/authorized |
| |
| If the challenge the device returns back matches the one we expect based |
| on the key, the device is connected and the PCIe tunnels are created. |
| However, if the challenge fails no tunnels are created and error is |
| returned to the user. |
| |
| If the user still wants to connect the device they can either approve |
| the device without a key or write a new key and write 1 to the |
| ``authorized`` file to get the new key stored on the device NVM. |
| |
| De-authorizing devices |
| ---------------------- |
| It is possible to de-authorize devices by writing ``0`` to their |
| ``authorized`` attribute. This requires support from the connection |
| manager implementation and can be checked by reading domain |
| ``deauthorization`` attribute. If it reads ``1`` then the feature is |
| supported. |
| |
| When a device is de-authorized the PCIe tunnel from the parent device |
| PCIe downstream (or root) port to the device PCIe upstream port is torn |
| down. This is essentially the same thing as PCIe hot-remove and the PCIe |
| toplogy in question will not be accessible anymore until the device is |
| authorized again. If there is storage such as NVMe or similar involved, |
| there is a risk for data loss if the filesystem on that storage is not |
| properly shut down. You have been warned! |
| |
| DMA protection utilizing IOMMU |
| ------------------------------ |
| Recent systems from 2018 and forward with Thunderbolt ports may natively |
| support IOMMU. This means that Thunderbolt security is handled by an IOMMU |
| so connected devices cannot access memory regions outside of what is |
| allocated for them by drivers. When Linux is running on such system it |
| automatically enables IOMMU if not enabled by the user already. These |
| systems can be identified by reading ``1`` from |
| ``/sys/bus/thunderbolt/devices/domainX/iommu_dma_protection`` attribute. |
| |
| The driver does not do anything special in this case but because DMA |
| protection is handled by the IOMMU, security levels (if set) are |
| redundant. For this reason some systems ship with security level set to |
| ``none``. Other systems have security level set to ``user`` in order to |
| support downgrade to older OS, so users who want to automatically |
| authorize devices when IOMMU DMA protection is enabled can use the |
| following ``udev`` rule:: |
| |
| ACTION=="add", SUBSYSTEM=="thunderbolt", ATTRS{iommu_dma_protection}=="1", ATTR{authorized}=="0", ATTR{authorized}="1" |
| |
| Upgrading NVM on Thunderbolt device, host or retimer |
| ---------------------------------------------------- |
| Since most of the functionality is handled in firmware running on a |
| host controller or a device, it is important that the firmware can be |
| upgraded to the latest where possible bugs in it have been fixed. |
| Typically OEMs provide this firmware from their support site. |
| |
| There is also a central site which has links where to download firmware |
| for some machines: |
| |
| `Thunderbolt Updates <https://thunderbolttechnology.net/updates>`_ |
| |
| Before you upgrade firmware on a device, host or retimer, please make |
| sure it is a suitable upgrade. Failing to do that may render the device |
| in a state where it cannot be used properly anymore without special |
| tools! |
| |
| Host NVM upgrade on Apple Macs is not supported. |
| |
| Once the NVM image has been downloaded, you need to plug in a |
| Thunderbolt device so that the host controller appears. It does not |
| matter which device is connected (unless you are upgrading NVM on a |
| device - then you need to connect that particular device). |
| |
| Note an OEM-specific method to power the controller up ("force power") may |
| be available for your system in which case there is no need to plug in a |
| Thunderbolt device. |
| |
| After that we can write the firmware to the non-active parts of the NVM |
| of the host or device. As an example here is how Intel NUC6i7KYK (Skull |
| Canyon) Thunderbolt controller NVM is upgraded:: |
| |
| # dd if=KYK_TBT_FW_0018.bin of=/sys/bus/thunderbolt/devices/0-0/nvm_non_active0/nvmem |
| |
| Once the operation completes we can trigger NVM authentication and |
| upgrade process as follows:: |
| |
| # echo 1 > /sys/bus/thunderbolt/devices/0-0/nvm_authenticate |
| |
| If no errors are returned, the host controller shortly disappears. Once |
| it comes back the driver notices it and initiates a full power cycle. |
| After a while the host controller appears again and this time it should |
| be fully functional. |
| |
| We can verify that the new NVM firmware is active by running the following |
| commands:: |
| |
| # cat /sys/bus/thunderbolt/devices/0-0/nvm_authenticate |
| 0x0 |
| # cat /sys/bus/thunderbolt/devices/0-0/nvm_version |
| 18.0 |
| |
| If ``nvm_authenticate`` contains anything other than 0x0 it is the error |
| code from the last authentication cycle, which means the authentication |
| of the NVM image failed. |
| |
| Note names of the NVMem devices ``nvm_activeN`` and ``nvm_non_activeN`` |
| depend on the order they are registered in the NVMem subsystem. N in |
| the name is the identifier added by the NVMem subsystem. |
| |
| Upgrading on-board retimer NVM when there is no cable connected |
| --------------------------------------------------------------- |
| If the platform supports, it may be possible to upgrade the retimer NVM |
| firmware even when there is nothing connected to the USB4 |
| ports. When this is the case the ``usb4_portX`` devices have two special |
| attributes: ``offline`` and ``rescan``. The way to upgrade the firmware |
| is to first put the USB4 port into offline mode:: |
| |
| # echo 1 > /sys/bus/thunderbolt/devices/0-0/usb4_port1/offline |
| |
| This step makes sure the port does not respond to any hotplug events, |
| and also ensures the retimers are powered on. The next step is to scan |
| for the retimers:: |
| |
| # echo 1 > /sys/bus/thunderbolt/devices/0-0/usb4_port1/rescan |
| |
| This enumerates and adds the on-board retimers. Now retimer NVM can be |
| upgraded in the same way than with cable connected (see previous |
| section). However, the retimer is not disconnected as we are offline |
| mode) so after writing ``1`` to ``nvm_authenticate`` one should wait for |
| 5 or more seconds before running rescan again:: |
| |
| # echo 1 > /sys/bus/thunderbolt/devices/0-0/usb4_port1/rescan |
| |
| This point if everything went fine, the port can be put back to |
| functional state again:: |
| |
| # echo 0 > /sys/bus/thunderbolt/devices/0-0/usb4_port1/offline |
| |
| Upgrading NVM when host controller is in safe mode |
| -------------------------------------------------- |
| If the existing NVM is not properly authenticated (or is missing) the |
| host controller goes into safe mode which means that the only available |
| functionality is flashing a new NVM image. When in this mode, reading |
| ``nvm_version`` fails with ``ENODATA`` and the device identification |
| information is missing. |
| |
| To recover from this mode, one needs to flash a valid NVM image to the |
| host controller in the same way it is done in the previous chapter. |
| |
| Networking over Thunderbolt cable |
| --------------------------------- |
| Thunderbolt technology allows software communication between two hosts |
| connected by a Thunderbolt cable. |
| |
| It is possible to tunnel any kind of traffic over a Thunderbolt link but |
| currently we only support Apple ThunderboltIP protocol. |
| |
| If the other host is running Windows or macOS, the only thing you need to |
| do is to connect a Thunderbolt cable between the two hosts; the |
| ``thunderbolt-net`` driver is loaded automatically. If the other host is |
| also Linux you should load ``thunderbolt-net`` manually on one host (it |
| does not matter which one):: |
| |
| # modprobe thunderbolt-net |
| |
| This triggers module load on the other host automatically. If the driver |
| is built-in to the kernel image, there is no need to do anything. |
| |
| The driver will create one virtual ethernet interface per Thunderbolt |
| port which are named like ``thunderbolt0`` and so on. From this point |
| you can either use standard userspace tools like ``ifconfig`` to |
| configure the interface or let your GUI handle it automatically. |
| |
| Forcing power |
| ------------- |
| Many OEMs include a method that can be used to force the power of a |
| Thunderbolt controller to an "On" state even if nothing is connected. |
| If supported by your machine this will be exposed by the WMI bus with |
| a sysfs attribute called "force_power". |
| |
| For example the intel-wmi-thunderbolt driver exposes this attribute in: |
| /sys/bus/wmi/devices/86CCFD48-205E-4A77-9C48-2021CBEDE341/force_power |
| |
| To force the power to on, write 1 to this attribute file. |
| To disable force power, write 0 to this attribute file. |
| |
| Note: it's currently not possible to query the force power state of a platform. |