The pull request you sent on Sun, 19 Jul 2020 09:39:27 +0200: > git://git.infradead.org/users/hch/dma-mapping.git tags/dma-mapping-5.8-6 has been merged into torvalds/linux.git: https://git.kernel.org/torvalds/c/8c18fc6344568bdc131436be0345d82da512bfef Thank you! -- Deet-doot-dot, I am a bot.
Hi Yi, On 7/12/20 1:21 PM, Liu Yi L wrote: > When an IOMMU domain with nesting attribute is used for guest SVA, a > system-wide PASID is allocated for binding with the device and the domain. > For security reason, we need to check the PASID passsed from user-space. passed > e.g. page table
Yi, On 7/12/20 1:21 PM, Liu Yi L wrote: > This patch allows user space to request PASID allocation/free, e.g. when > serving the request from the guest. > > PASIDs that are not freed by userspace are automatically freed when the > IOASID set is destroyed when process exits. > > Cc: Kevin Tian
Yi, On 7/12/20 1:21 PM, Liu Yi L wrote: > Shared Virtual Addressing (a.k.a Shared Virtual Memory) allows sharing > multiple process virtual address spaces with the device for simplified > programming model. PASID is used to tag an virtual address space in DMA > requests and to identify the
Yi, On 7/12/20 1:21 PM, Liu Yi L wrote: > From IOMMU p.o.v., PASIDs allocated and managed by external components > (e.g. VFIO) will be passed in for gpasid_bind/unbind operation. IOMMU > needs some knowledge to check the PASID ownership, hence add an interface > for those components to tell the
Yi, On 7/12/20 1:21 PM, Liu Yi L wrote: > From: Yi Sun > > Current interface is good enough for SVA virtualization on an assigned > physical PCI device, but when it comes to mediated devices, a physical > device may attached with multiple aux-domains. Also, for guest unbind, > the PASID to be
The following changes since commit 0dc589da873b58b70f4caf4b070fb0cf70fdd1dc: Merge tag 'iommu-fixes-v5.8-rc5' of git://git.kernel.org/pub/scm/linux/kernel/git/joro/iommu (2020-07-13 12:34:05 -0700) are available in the Git repository at: git://git.infradead.org/users/hch/dma-mapping.git