Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp449057ybl; Fri, 9 Aug 2019 08:23:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqxgb8t4DHwF21Is1mMTAaDDuS7kJd/LRM1VCpmF0eqjsX+1Rm49DH+Fv1/IHyma7PjOfJ7o X-Received: by 2002:a17:902:20e3:: with SMTP id v32mr8856305plg.142.1565364214173; Fri, 09 Aug 2019 08:23:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565364214; cv=none; d=google.com; s=arc-20160816; b=bSDrURLAPnDu7pKiso4bRl4JePuVQzVSlTreg2MQivd5vc63KUgwlL35F4kIVC04nA XVNqQzeswLzQCtMfV2JPdZJhTUyj11IaJTA/rGK7VsmMK/x99AXS58so1vhL2qlHXYxD 3Jw0uvP4PTmtJxLE4bh+jqyzp+QCr+FPhZzuDix1m16aaefwTHWcdzcRZdyCXO5d4E2E Fye523PKbwajat1OOwqz4Tcihapskl5/D7sj+v7xJZaaZN6zXupclDnjNwbJg6zZYbRv y54h2mdvr7bfodJ+SpXAVp5l6X9uNd79iqloD/QvzQ+zyI0m06GMvNtRmGgWgLAC2XtD emZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=zUIQz7R0VG/5Fihjc9V7gRXSm7HhwJccDQ2eJnuCexU=; b=YF7UJtRzflEo3OITnJ0nm+KpCv7FTfTrSHV5pJOdplHDTDcavAA8rP9drLNCCAxJDL xfi6OmEi9Po5FHa7SAkyFXxZXTwpzkaQDl9Qlw0JOJ1RwCXcnBes0oe69xNgkAXmWD1e hKSWQw23eWIGm4y/l5gOBsEkynic/hkNEKzwOZe0egtpUQpppjuMJXZxijU74470jvRj SYJfmkrZiCBvRvbxFuUiXkPG8xs5gS2RCss9X0tgESA4Qt8Xd73/Ihlhaob083cSZPFE vyDR2IYnaTS5pLh/SOWxz0Lkae+P53iEtEc8NEkbCSLzhfpT3DB6HFi05Q5fYFAc6UV6 iMrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r200si51630559pgr.518.2019.08.09.08.23.18; Fri, 09 Aug 2019 08:23:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2407360AbfHIPWm (ORCPT + 99 others); Fri, 9 Aug 2019 11:22:42 -0400 Received: from 8bytes.org ([81.169.241.247]:48534 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2407220AbfHIPWi (ORCPT ); Fri, 9 Aug 2019 11:22:38 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id 5E8DB45B; Fri, 9 Aug 2019 17:22:36 +0200 (CEST) From: Joerg Roedel To: Joerg Roedel Cc: iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Thomas.Lendacky@amd.com, Suravee.Suthikulpanit@amd.com, bp@alien8.de, Joerg Roedel Subject: [PATCH 3/3] iommu: Disable passthrough mode when SME is active Date: Fri, 9 Aug 2019 17:22:33 +0200 Message-Id: <20190809152233.2829-4-joro@8bytes.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190809152233.2829-1-joro@8bytes.org> References: <20190809152233.2829-1-joro@8bytes.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Using Passthrough mode when SME is active causes certain devices to use the SWIOTLB bounce buffer. The bounce buffer code has an upper limit of 256kb for the size of DMA allocations, which is too small for certain devices and causes them to fail. With this patch we enable IOMMU by default when SME is active in the system, making the default configuration work for more systems than it does now. Users that don't want IOMMUs to be enabled still can disable them with kernel parameters. Signed-off-by: Joerg Roedel --- drivers/iommu/iommu.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 62cae6db0970..fbe1aa51bce9 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -104,6 +104,12 @@ static int __init iommu_subsys_init(void) else iommu_def_domain_type = IOMMU_DOMAIN_DMA; + if ((iommu_def_domain_type == IOMMU_DOMAIN_IDENTITY) && + sme_active()) { + pr_info("SME detected - Disabling default IOMMU passthrough\n"); + iommu_def_domain_type = IOMMU_DOMAIN_DMA; + } + pr_info("Default domain type: %s\n", iommu_domain_type_str(iommu_def_domain_type)); -- 2.17.1