summaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/event_analyzing_sample.py
diff options
context:
space:
mode:
authorSteven Price <steven.price@arm.com>2024-10-17 16:14:30 +0300
committerCatalin Marinas <catalin.marinas@arm.com>2024-10-23 12:19:32 +0300
commitfbf979a01375704fa87c559763209c658593b6f8 (patch)
treee0f248e0622e8ee5cc32bf38079dea4a3d609393 /tools/perf/scripts/python/event_analyzing_sample.py
parent491db21d8256992ab9fe11c42744eb3044315d14 (diff)
downloadlinux-fbf979a01375704fa87c559763209c658593b6f8.tar.xz
arm64: Enforce bounce buffers for realm DMA
Within a realm guest it's not possible for a device emulated by the VMM to access arbitrary guest memory. So force the use of bounce buffers to ensure that the memory the emulated devices are accessing is in memory which is explicitly shared with the host. This adds a call to swiotlb_update_mem_attributes() which calls set_memory_decrypted() to ensure the bounce buffer memory is shared with the host. For non-realm guests or hosts this is a no-op. Reviewed-by: Catalin Marinas <catalin.marinas@arm.com> Reviewed-by: Gavin Shan <gshan@redhat.com> Co-developed-by: Suzuki K Poulose <suzuki.poulose@arm.com> Signed-off-by: Suzuki K Poulose <suzuki.poulose@arm.com> Signed-off-by: Steven Price <steven.price@arm.com> Link: https://lore.kernel.org/r/20241017131434.40935-8-steven.price@arm.com Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions