1 What: /sys/bus/thunderbolt/devices/.../domainX/security
4 Contact: thunderbolt-software@lists.01.org
5 Description: This attribute holds current Thunderbolt security level
6 set by the system BIOS. Possible values are:
8 none: All devices are automatically authorized
9 user: Devices are only authorized based on writing
10 appropriate value to the authorized attribute
11 secure: Require devices that support secure connect at
12 minimum. User needs to authorize each device.
13 dponly: Automatically tunnel Display port (and USB). No
14 PCIe tunnels are created.
16 What: /sys/bus/thunderbolt/devices/.../authorized
19 Contact: thunderbolt-software@lists.01.org
20 Description: This attribute is used to authorize Thunderbolt devices
21 after they have been connected. If the device is not
22 authorized, no devices such as PCIe and Display port are
23 available to the system.
25 Contents of this attribute will be 0 when the device is not
28 Possible values are supported:
29 1: The device will be authorized and connected
31 When key attribute contains 32 byte hex string the possible
33 1: The 32 byte hex string is added to the device NVM and
34 the device is authorized.
35 2: Send a challenge based on the 32 byte hex string. If the
36 challenge response from device is valid, the device is
37 authorized. In case of failure errno will be ENOKEY if
38 the device did not contain a key at all, and
39 EKEYREJECTED if the challenge response did not match.
41 What: /sys/bus/thunderbolt/devices/.../key
44 Contact: thunderbolt-software@lists.01.org
45 Description: When a devices supports Thunderbolt secure connect it will
46 have this attribute. Writing 32 byte hex string changes
47 authorization to use the secure connection method instead.
48 Writing an empty string clears the key and regular connection
49 method can be used again.
51 What: /sys/bus/thunderbolt/devices/.../device
54 Contact: thunderbolt-software@lists.01.org
55 Description: This attribute contains id of this device extracted from
58 What: /sys/bus/thunderbolt/devices/.../device_name
61 Contact: thunderbolt-software@lists.01.org
62 Description: This attribute contains name of this device extracted from
65 What: /sys/bus/thunderbolt/devices/.../vendor
68 Contact: thunderbolt-software@lists.01.org
69 Description: This attribute contains vendor id of this device extracted
72 What: /sys/bus/thunderbolt/devices/.../vendor_name
75 Contact: thunderbolt-software@lists.01.org
76 Description: This attribute contains vendor name of this device extracted
79 What: /sys/bus/thunderbolt/devices/.../unique_id
82 Contact: thunderbolt-software@lists.01.org
83 Description: This attribute contains unique_id string of this device.
84 This is either read from hardware registers (UUID on
85 newer hardware) or based on UID from the device DROM.
86 Can be used to uniquely identify particular device.
88 What: /sys/bus/thunderbolt/devices/.../nvm_version
91 Contact: thunderbolt-software@lists.01.org
92 Description: If the device has upgradeable firmware the version
93 number is available here. Format: %x.%x, major.minor.
94 If the device is in safe mode reading the file returns
95 -ENODATA instead as the NVM version is not available.
97 What: /sys/bus/thunderbolt/devices/.../nvm_authenticate
100 Contact: thunderbolt-software@lists.01.org
101 Description: When new NVM image is written to the non-active NVM
102 area (through non_activeX NVMem device), the
103 authentication procedure is started by writing 1 to
104 this file. If everything goes well, the device is
105 restarted with the new NVM firmware. If the image
106 verification fails an error code is returned instead.
108 When read holds status of the last authentication
109 operation if an error occurred during the process. This
110 is directly the status value from the DMA configuration
111 based mailbox before the device is power cycled. Writing
112 0 here clears the status.
114 What: /sys/bus/thunderbolt/devices/<xdomain>.<service>/key
117 Contact: thunderbolt-software@lists.01.org
118 Description: This contains name of the property directory the XDomain
119 service exposes. This entry describes the protocol in
120 question. Following directories are already reserved by
121 the Apple XDomain specification:
123 network: IP/ethernet over Thunderbolt
124 targetdm: Target disk mode protocol over Thunderbolt
125 extdisp: External display mode protocol over Thunderbolt
127 What: /sys/bus/thunderbolt/devices/<xdomain>.<service>/modalias
130 Contact: thunderbolt-software@lists.01.org
131 Description: Stores the same MODALIAS value emitted by uevent for
132 the XDomain service. Format: tbtsvc:kSpNvNrN
134 What: /sys/bus/thunderbolt/devices/<xdomain>.<service>/prtcid
137 Contact: thunderbolt-software@lists.01.org
138 Description: This contains XDomain protocol identifier the XDomain
141 What: /sys/bus/thunderbolt/devices/<xdomain>.<service>/prtcvers
144 Contact: thunderbolt-software@lists.01.org
145 Description: This contains XDomain protocol version the XDomain
148 What: /sys/bus/thunderbolt/devices/<xdomain>.<service>/prtcrevs
151 Contact: thunderbolt-software@lists.01.org
152 Description: This contains XDomain software version the XDomain
155 What: /sys/bus/thunderbolt/devices/<xdomain>.<service>/prtcstns
158 Contact: thunderbolt-software@lists.01.org
159 Description: This contains XDomain service specific settings as