[PATCH 4/4] iommu/vt-d: Hooks to invalidate iotlb/devtlb when using supervisor PASID's.

2017-08-08 Thread Ashok Raj
When a kernel client uses intel_svm_bind_mm() and requests a supervisor PASID, IOMMU needs to track changes to these addresses. Otherwise the device tlb will be stale compared to what's on the cpu for kernel mappings. This is similar to what's done for user space registrations via

[PATCH 4/4] iommu/vt-d: Hooks to invalidate iotlb/devtlb when using supervisor PASID's.

2017-08-08 Thread Ashok Raj
When a kernel client uses intel_svm_bind_mm() and requests a supervisor PASID, IOMMU needs to track changes to these addresses. Otherwise the device tlb will be stale compared to what's on the cpu for kernel mappings. This is similar to what's done for user space registrations via

[PATCH 4/4] iommu/vt-d: Hooks to invalidate iotlb/devtlb when using supervisor PASID's.

2017-08-08 Thread Ashok Raj
When a kernel client uses intel_svm_bind_mm() and requests a supervisor PASID, IOMMU needs to track changes to these addresses. Otherwise the device tlb will be stale compared to what's on the cpu for kernel mappings. This is similar to what's done for user space registrations via

[PATCH 4/4] iommu/vt-d: Hooks to invalidate iotlb/devtlb when using supervisor PASID's.

2017-08-08 Thread Ashok Raj
When a kernel client uses intel_svm_bind_mm() and requests a supervisor PASID, IOMMU needs to track changes to these addresses. Otherwise the device tlb will be stale compared to what's on the cpu for kernel mappings. This is similar to what's done for user space registrations via