Skip to content

Commit 0d647b3

Browse files
LuBaolujoergroedel
authored andcommitted
iommu/vt-d: Remove hard coding PGSNP bit in PASID entries
As enforce_cache_coherency has been introduced into the iommu_domain_ops, the kernel component which owns the iommu domain is able to opt-in its requirement for force snooping support. The iommu driver has no need to hard code the page snoop control bit in the PASID table entries anymore. Signed-off-by: Lu Baolu <[email protected]> Reviewed-by: Kevin Tian <[email protected]> Link: https://lore.kernel.org/r/[email protected] Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Joerg Roedel <[email protected]>
1 parent e805522 commit 0d647b3

File tree

1 file changed

+0
-3
lines changed

1 file changed

+0
-3
lines changed

drivers/iommu/intel/pasid.c

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -710,9 +710,6 @@ int intel_pasid_setup_second_level(struct intel_iommu *iommu,
710710
pasid_set_fault_enable(pte);
711711
pasid_set_page_snoop(pte, !!ecap_smpwc(iommu->ecap));
712712

713-
if (domain->domain.type == IOMMU_DOMAIN_UNMANAGED)
714-
pasid_set_pgsnp(pte);
715-
716713
/*
717714
* Since it is a second level only translation setup, we should
718715
* set SRE bit as well (addresses are expected to be GPAs).

0 commit comments

Comments
 (0)