mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-09-27 12:57:53 +00:00
drm/vmwgfx: Enable DMA mappings with SEV
Enable DMA mappings in vmwgfx after TTM has been fixed in commit3bf3710e37
("drm/ttm: Add a generic TTM memcpy move for page-based iomem") This enables full guest-backed memory support and in particular allows usage of screen targets as the presentation mechanism. Signed-off-by: Zack Rusin <zack.rusin@broadcom.com> Reported-by: Ye Li <ye.li@broadcom.com> Tested-by: Ye Li <ye.li@broadcom.com> Fixes:3b0d6458c7
("drm/vmwgfx: Refuse DMA operation when SEV encryption is active") Cc: Broadcom internal kernel review list <bcm-kernel-feedback-list@broadcom.com> Cc: dri-devel@lists.freedesktop.org Cc: <stable@vger.kernel.org> # v6.6+ Reviewed-by: Martin Krastev <martin.krastev@broadcom.com> Link: https://patchwork.freedesktop.org/patch/msgid/20240408022802.358641-1-zack.rusin@broadcom.com
This commit is contained in:
parent
3eadd887db
commit
4c08f01934
1 changed files with 6 additions and 5 deletions
|
@ -666,11 +666,12 @@ static int vmw_dma_select_mode(struct vmw_private *dev_priv)
|
|||
[vmw_dma_map_populate] = "Caching DMA mappings.",
|
||||
[vmw_dma_map_bind] = "Giving up DMA mappings early."};
|
||||
|
||||
/* TTM currently doesn't fully support SEV encryption. */
|
||||
if (cc_platform_has(CC_ATTR_MEM_ENCRYPT))
|
||||
return -EINVAL;
|
||||
|
||||
if (vmw_force_coherent)
|
||||
/*
|
||||
* When running with SEV we always want dma mappings, because
|
||||
* otherwise ttm tt pool pages will bounce through swiotlb running
|
||||
* out of available space.
|
||||
*/
|
||||
if (vmw_force_coherent || cc_platform_has(CC_ATTR_MEM_ENCRYPT))
|
||||
dev_priv->map_mode = vmw_dma_alloc_coherent;
|
||||
else if (vmw_restrict_iommu)
|
||||
dev_priv->map_mode = vmw_dma_map_bind;
|
||||
|
|
Loading…
Reference in a new issue