From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753685AbbHCObc (ORCPT ); Mon, 3 Aug 2015 10:31:32 -0400 Received: from 8bytes.org ([81.169.241.247]:53849 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752832AbbHCObb (ORCPT ); Mon, 3 Aug 2015 10:31:31 -0400 Date: Mon, 3 Aug 2015 16:31:29 +0200 From: Joerg Roedel To: Alex Williamson Cc: iommu@lists.linux-foundation.org, dwmw2@infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/2] iommu/vt-d: Report domain usage in sysfs Message-ID: <20150803143128.GE20968@8bytes.org> References: <20150714211624.11515.25204.stgit@gimli.home> <20150714212448.11515.38240.stgit@gimli.home> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20150714212448.11515.38240.stgit@gimli.home> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 14, 2015 at 03:24:53PM -0600, Alex Williamson wrote: > Debugging domain ID leakage typically requires long running tests in > order to exhaust the domain ID space or kernel instrumentation to > track the setting and clearing of bits. A couple trivial intel-iommu > specific sysfs extensions make it much easier to expose the IOMMU > capabilities and current usage. > > Signed-off-by: Alex Williamson > --- > drivers/iommu/intel-iommu.c | 21 +++++++++++++++++++++ > 1 file changed, 21 insertions(+) Applied, thanks Alex.