iommu/amd: Do not use IOMMUv2 functionality when SME is active
[ Upstream commit 2822e58250
]
When memory encryption is active the device is likely not in a direct
mapped domain. Forbid using IOMMUv2 functionality for now until finer
grained checks for this have been implemented.
Signed-off-by: Joerg Roedel <jroedel@suse.de>
Link: https://lore.kernel.org/r/20200824105415.21000-3-joro@8bytes.org
Signed-off-by: Joerg Roedel <jroedel@suse.de>
Signed-off-by: Sasha Levin <sashal@kernel.org>
5.4-rM2-2.2.x-imx-squashed
parent
cab731c6c8
commit
104bc6027b
|
@ -741,6 +741,13 @@ int amd_iommu_init_device(struct pci_dev *pdev, int pasids)
|
||||||
|
|
||||||
might_sleep();
|
might_sleep();
|
||||||
|
|
||||||
|
/*
|
||||||
|
* When memory encryption is active the device is likely not in a
|
||||||
|
* direct-mapped domain. Forbid using IOMMUv2 functionality for now.
|
||||||
|
*/
|
||||||
|
if (mem_encrypt_active())
|
||||||
|
return -ENODEV;
|
||||||
|
|
||||||
if (!amd_iommu_v2_supported())
|
if (!amd_iommu_v2_supported())
|
||||||
return -ENODEV;
|
return -ENODEV;
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue