diff options
Diffstat (limited to 'include/linux/pci.h')
-rw-r--r-- | include/linux/pci.h | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/include/linux/pci.h b/include/linux/pci.h index 51a5a5217667..1ab78a23ae08 100644 --- a/include/linux/pci.h +++ b/include/linux/pci.h | |||
@@ -396,6 +396,14 @@ struct pci_dev { | |||
396 | unsigned int is_hotplug_bridge:1; | 396 | unsigned int is_hotplug_bridge:1; |
397 | unsigned int shpc_managed:1; /* SHPC owned by shpchp */ | 397 | unsigned int shpc_managed:1; /* SHPC owned by shpchp */ |
398 | unsigned int is_thunderbolt:1; /* Thunderbolt controller */ | 398 | unsigned int is_thunderbolt:1; /* Thunderbolt controller */ |
399 | /* | ||
400 | * Devices marked being untrusted are the ones that can potentially | ||
401 | * execute DMA attacks and similar. They are typically connected | ||
402 | * through external ports such as Thunderbolt but not limited to | ||
403 | * that. When an IOMMU is enabled they should be getting full | ||
404 | * mappings to make sure they cannot access arbitrary memory. | ||
405 | */ | ||
406 | unsigned int untrusted:1; | ||
399 | unsigned int __aer_firmware_first_valid:1; | 407 | unsigned int __aer_firmware_first_valid:1; |
400 | unsigned int __aer_firmware_first:1; | 408 | unsigned int __aer_firmware_first:1; |
401 | unsigned int broken_intx_masking:1; /* INTx masking can't be used */ | 409 | unsigned int broken_intx_masking:1; /* INTx masking can't be used */ |