diff options
author | Christoph Hellwig <[email protected]> | 2018-03-19 11:38:25 +0100 |
---|---|---|
committer | Ingo Molnar <[email protected]> | 2018-03-20 10:01:59 +0100 |
commit | c10f07aa27dadf5ab5b3d58c48c91a467f80db49 (patch) | |
tree | d5cae52525387ecf0de4a2ad043d2b433307b2b4 /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | b6e05477c10c12e36141558fc14f04b00ea634d4 (diff) |
dma/direct: Handle force decryption for DMA coherent buffers in common code
With that in place the generic DMA-direct routines can be used to
allocate non-encrypted bounce buffers, and the x86 SEV case can use
the generic swiotlb ops including nice features such as using CMA
allocations.
Note that I'm not too happy about using sev_active() in DMA-direct, but
I couldn't come up with a good enough name for a wrapper to make it
worth adding.
Tested-by: Tom Lendacky <[email protected]>
Signed-off-by: Christoph Hellwig <[email protected]>
Reviewed-by: Thomas Gleixner <[email protected]>
Cc: David Woodhouse <[email protected]>
Cc: Joerg Roedel <[email protected]>
Cc: Jon Mason <[email protected]>
Cc: Konrad Rzeszutek Wilk <[email protected]>
Cc: Linus Torvalds <[email protected]>
Cc: Muli Ben-Yehuda <[email protected]>
Cc: Peter Zijlstra <[email protected]>
Cc: [email protected]
Link: http://lkml.kernel.org/r/[email protected]
Signed-off-by: Ingo Molnar <[email protected]>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions