Re: [PATCH 0/2] Fix issues with untrusted devices and AMD IOMMU
From: Christoph Hellwig
Date: Mon Apr 04 2022 - 18:08:24 EST
On Mon, Apr 04, 2022 at 05:05:00PM +0000, Limonciello, Mario wrote:
> I do expect that solves it as well. The reason I submitted the way I
> did is that there seemed to be a strong affinity for having swiotlb
> disabled when IOMMU is enabled on AMD IOMMU. The original code that
> disabled SWIOTLB in AMD IOMMU dates all the way back to 2.6.33 (commit
> 75f1cdf1dda92cae037ec848ae63690d91913eac) and it has ping ponged around
> since then to add more criteria that it would be or wouldn't be
> disabled, but was never actually dropped until your suggestion.
Well, that was before we started bounce buffering for untrusted devices.
We can't just have a less secure path for them because some conditions
are not met. Especially given that most AMD systems right now probably
don't have that swiotlb buffer if the IOMMU is enabled. So not freeing
the buffer in this case is a bug fix that is needed to properly
support the bounce buffering for unaligned I/O to untrusted devices.
> I do think that my messaging patch (1/2) may still be useful for
> debugging in the future if for another reason SWIOTLB is disabled.
I think the warning is useful. For dma-direct we have it in the caller
so I'd be tempted todo the same for dma-iommu.