diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2024-01-18 15:28:15 -0800 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2024-01-18 15:28:15 -0800 |
commit | 86c4d58a99ab1ccfa03860d4dead157be51eb2b6 (patch) | |
tree | eba89e86aae53b99fca9088de71632a68df1431f /security | |
parent | 0dde2bf67bcf37f54c829c6c42fa8c4fca78a224 (diff) | |
parent | 47f2bd2ff382e5fe766b1322e354558a8da4a470 (diff) | |
download | lwn-86c4d58a99ab1ccfa03860d4dead157be51eb2b6.tar.gz lwn-86c4d58a99ab1ccfa03860d4dead157be51eb2b6.zip |
Merge tag 'for-linus-iommufd' of git://git.kernel.org/pub/scm/linux/kernel/git/jgg/iommufd
Pull iommufd updates from Jason Gunthorpe:
"This brings the first of three planned user IO page table invalidation
operations:
- IOMMU_HWPT_INVALIDATE allows invalidating the IOTLB integrated into
the iommu itself. The Intel implementation will also generate an
ATC invalidation to flush the device IOTLB as it unambiguously
knows the device, but other HW will not.
It goes along with the prior PR to implement userspace IO page tables
(aka nested translation for VMs) to allow Intel to have full
functionality for simple cases. An Intel implementation of the
operation is provided.
Also fix a small bug in the selftest mock iommu driver probe"
* tag 'for-linus-iommufd' of git://git.kernel.org/pub/scm/linux/kernel/git/jgg/iommufd:
iommufd/selftest: Check the bus type during probe
iommu/vt-d: Add iotlb flush for nested domain
iommufd: Add data structure for Intel VT-d stage-1 cache invalidation
iommufd/selftest: Add coverage for IOMMU_HWPT_INVALIDATE ioctl
iommufd/selftest: Add IOMMU_TEST_OP_MD_CHECK_IOTLB test op
iommufd/selftest: Add mock_domain_cache_invalidate_user support
iommu: Add iommu_copy_struct_from_user_array helper
iommufd: Add IOMMU_HWPT_INVALIDATE
iommu: Add cache_invalidate_user op
Diffstat (limited to 'security')
0 files changed, 0 insertions, 0 deletions