Skip to content

Commit a7050fb

Browse files
Jacob Panjoergroedel
authored andcommitted
iommu/vt-d: Use non-privileged mode for all PASIDs
Supervisor Request Enable (SRE) bit in a PASID entry is for permission checking on DMA requests. When SRE = 0, DMA with supervisor privilege will be blocked. However, for in-kernel DMA this is not necessary in that we are targeting kernel memory anyway. There's no need to differentiate user and kernel for in-kernel DMA. Let's use non-privileged (user) permission for all PASIDs used in kernel, it will be consistent with DMA without PASID (RID_PASID) as well. Signed-off-by: Jacob Pan <jacob.jun.pan@linux.intel.com> Link: https://lore.kernel.org/r/20230331231137.1947675-2-jacob.jun.pan@linux.intel.com Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Signed-off-by: Joerg Roedel <jroedel@suse.de>
1 parent a06c2ec commit a7050fb

1 file changed

Lines changed: 0 additions & 2 deletions

File tree

drivers/iommu/intel/iommu.c

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2316,8 +2316,6 @@ static int domain_setup_first_level(struct intel_iommu *iommu,
23162316
if (level != 4 && level != 5)
23172317
return -EINVAL;
23182318

2319-
if (pasid != PASID_RID2PASID)
2320-
flags |= PASID_FLAG_SUPERVISOR_MODE;
23212319
if (level == 5)
23222320
flags |= PASID_FLAG_FL5LP;
23232321

0 commit comments

Comments
 (0)