diff options
author | 2025-02-19 17:31:41 -0800 | |
---|---|---|
committer | 2025-02-27 15:29:35 -0400 | |
commit | 40f5175d0eb77f902ba8e2a5df2a8f3a218c8843 (patch) | |
tree | 2d7386d385c3f5c4ad40fd75527ea1acced1639c /scripts/gdb/linux/utils.py | |
parent | iommu: Turn fault_data to iommufd private pointer (diff) | |
download | wireguard-linux-40f5175d0eb77f902ba8e2a5df2a8f3a218c8843.tar.xz wireguard-linux-40f5175d0eb77f902ba8e2a5df2a8f3a218c8843.zip |
iommufd: Implement sw_msi support natively
iommufd has a model where the iommu_domain can be changed while the VFIO
device is attached. In this case, the MSI should continue to work. This
corner case has not worked because the dma-iommu implementation of sw_msi
is tied to a single domain.
Implement the sw_msi mapping directly and use a global per-fd table to
associate assigned IOVA to the MSI pages. This allows the MSI pages to
be loaded into a domain before it is attached ensuring that MSI is not
disrupted.
Link: https://patch.msgid.link/r/e13d23eeacd67c0a692fc468c85b483f4dd51c57.1740014950.git.nicolinc@nvidia.com
Signed-off-by: Nicolin Chen <nicolinc@nvidia.com>
Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
Diffstat (limited to 'scripts/gdb/linux/utils.py')
0 files changed, 0 insertions, 0 deletions