Commit aba2d9a6 authored by Tom Lendacky's avatar Tom Lendacky Committed by Joerg Roedel

iommu/amd: Do not disable SWIOTLB if SME is active

When SME memory encryption is active it will rely on SWIOTLB to handle
DMA for devices that cannot support the addressing requirements of
having the encryption mask set in the physical address.  The IOMMU
currently disables SWIOTLB if it is not running in passthrough mode.
This is not desired as non-PCI devices attempting DMA may fail. Update
the code to check if SME is active and not disable SWIOTLB.

Fixes: 2543a786 ("iommu/amd: Allow the AMD IOMMU to work with memory encryption")
Signed-off-by: default avatarTom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: default avatarJoerg Roedel <jroedel@suse.de>
parent 8a5776a5
...@@ -2773,14 +2773,16 @@ int __init amd_iommu_init_api(void) ...@@ -2773,14 +2773,16 @@ int __init amd_iommu_init_api(void)
int __init amd_iommu_init_dma_ops(void) int __init amd_iommu_init_dma_ops(void)
{ {
swiotlb = iommu_pass_through ? 1 : 0; swiotlb = (iommu_pass_through || sme_me_mask) ? 1 : 0;
iommu_detected = 1; iommu_detected = 1;
/* /*
* In case we don't initialize SWIOTLB (actually the common case * In case we don't initialize SWIOTLB (actually the common case
* when AMD IOMMU is enabled), make sure there are global * when AMD IOMMU is enabled and SME is not active), make sure there
* dma_ops set as a fall-back for devices not handled by this * are global dma_ops set as a fall-back for devices not handled by
* driver (for example non-PCI devices). * this driver (for example non-PCI devices). When SME is active,
* make sure that swiotlb variable remains set so the global dma_ops
* continue to be SWIOTLB.
*/ */
if (!swiotlb) if (!swiotlb)
dma_ops = &nommu_dma_ops; dma_ops = &nommu_dma_ops;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment