> > The present value shows the existing type of default domain. > > If user wants to change it (Eg: from DMA to IDENTITY or vice versa), he > attempts to write the new value. > > Kernel performs checks to make sure that the driver in unbinded and it's > > safe > to change the default domain type. > > After successfully changing the default_domain type internally, kernel > > reflects > the new value in the file. > > Ay errors in the process will be reported in dmesg. > > I prefer this way. Writing to the file should fail with -EBUSY when it is not > safe to > change the default domain-type. Writing should only succeed when no device in > the group is assigned to a device driver.
Thanks a lot! Joerg for the reply. I have just sent out an RFC of this patch set to the IOMMU mailing list. Could you please take a look at it and let me know your feedback? Regards, Sai _______________________________________________ iommu mailing list [email protected] https://lists.linuxfoundation.org/mailman/listinfo/iommu
