public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Samiullah Khawaja <skhawaja@google.com>
To: Pranjal Shrivastava <praan@google.com>
Cc: David Woodhouse <dwmw2@infradead.org>,
	 Lu Baolu <baolu.lu@linux.intel.com>,
	Joerg Roedel <joro@8bytes.org>, Will Deacon <will@kernel.org>,
	 Jason Gunthorpe <jgg@ziepe.ca>,
	Robin Murphy <robin.murphy@arm.com>,
	 Kevin Tian <kevin.tian@intel.com>,
	Alex Williamson <alex@shazbot.org>,
	 Shuah Khan <shuah@kernel.org>,
	iommu@lists.linux.dev, linux-kernel@vger.kernel.org,
	 kvm@vger.kernel.org, Saeed Mahameed <saeedm@nvidia.com>,
	 Adithya Jayachandran <ajayachandra@nvidia.com>,
	Parav Pandit <parav@nvidia.com>,
	 Leon Romanovsky <leonro@nvidia.com>,
	William Tu <witu@nvidia.com>,
	 Pratyush Yadav <pratyush@kernel.org>,
	Pasha Tatashin <pasha.tatashin@soleen.com>,
	 David Matlack <dmatlack@google.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	 Chris Li <chrisl@kernel.org>, Vipin Sharma <vipinsh@google.com>,
	 YiFei Zhu <zhuyifei@google.com>
Subject: Re: [PATCH 01/14] iommu: Implement IOMMU LU FLB callbacks
Date: Thu, 12 Mar 2026 16:43:00 +0000	[thread overview]
Message-ID: <abLi5giBpi05_CLn@google.com> (raw)
In-Reply-To: <abHZdOKyLmmmHADz@google.com>

On Wed, Mar 11, 2026 at 09:07:00PM +0000, Pranjal Shrivastava wrote:
>On Tue, Feb 03, 2026 at 10:09:35PM +0000, Samiullah Khawaja wrote:
>> Add liveupdate FLB for IOMMU state preservation. Use KHO preserve memory
>> alloc/free helper functions to allocate memory for the IOMMU LU FLB
>> object and the serialization structs for device, domain and iommu.
>>
>> During retrieve, walk through the preserved objs nodes and restore each
>> folio. Also recreate the FLB obj.
>>
>> Signed-off-by: Samiullah Khawaja <skhawaja@google.com>
>> ---
>>  drivers/iommu/Kconfig         |  11 +++
>>  drivers/iommu/Makefile        |   1 +
>>  drivers/iommu/liveupdate.c    | 177 ++++++++++++++++++++++++++++++++++
>>  include/linux/iommu-lu.h      |  17 ++++
>>  include/linux/kho/abi/iommu.h | 119 +++++++++++++++++++++++
>>  5 files changed, 325 insertions(+)
>>  create mode 100644 drivers/iommu/liveupdate.c
>>  create mode 100644 include/linux/iommu-lu.h
>>  create mode 100644 include/linux/kho/abi/iommu.h
>>
>> diff --git a/drivers/iommu/Kconfig b/drivers/iommu/Kconfig
>> index f86262b11416..fdcfbedee5ed 100644
>> --- a/drivers/iommu/Kconfig
>> +++ b/drivers/iommu/Kconfig
>> @@ -11,6 +11,17 @@ config IOMMUFD_DRIVER
>>  	bool
>>  	default n
>>
>> +config IOMMU_LIVEUPDATE
>> +	bool "IOMMU live update state preservation support"
>> +	depends on LIVEUPDATE && IOMMUFD
>> +	help
>> +	  Enable support for preserving IOMMU state across a kexec live update.
>> +
>> +	  This allows devices managed by iommufd to maintain their DMA mappings
>> +	  during kexec base kernel update.
>> +
>> +	  If unsure, say N.
>> +
>
>I'm wondering if this should be under the if IOMMU_SUPPORT below? I
>believe this was added here because IOMMUFD isn't under IOMMU_SUPPORT,
>but it wouldn't make sense to "preserve" IOMMU across a liveupdate if
>IOMMU_SUPPORT is disabled? Should we probably be move it inside the
>if IOMMU_SUPPORT block for better organization, or at least have a depends
>on IOMMU_SUPPORT added to it? The IOMMU_LUO still depends on the
>IOMMU_SUPPORT infrastructure to actually function.. as we add calls
>within core functions like dev_iommu_get etc.

Agreed. I will move it under IOMMU_SUPPORT and sort out any other
dependencies.
>
>>  menuconfig IOMMU_SUPPORT
>>  	bool "IOMMU Hardware Support"
>>  	depends on MMU
>> diff --git a/drivers/iommu/Makefile b/drivers/iommu/Makefile
>> index 0275821f4ef9..b3715c5a6b97 100644
>> --- a/drivers/iommu/Makefile
>> +++ b/drivers/iommu/Makefile
>> @@ -15,6 +15,7 @@ obj-$(CONFIG_IOMMU_IO_PGTABLE_ARMV7S) += io-pgtable-arm-v7s.o
>>  obj-$(CONFIG_IOMMU_IO_PGTABLE_LPAE) += io-pgtable-arm.o
>>  obj-$(CONFIG_IOMMU_IO_PGTABLE_LPAE_KUNIT_TEST) += io-pgtable-arm-selftests.o
>>  obj-$(CONFIG_IOMMU_IO_PGTABLE_DART) += io-pgtable-dart.o
>> +obj-$(CONFIG_IOMMU_LIVEUPDATE) += liveupdate.o
>>  obj-$(CONFIG_IOMMU_IOVA) += iova.o
>>  obj-$(CONFIG_OF_IOMMU)	+= of_iommu.o
>>  obj-$(CONFIG_MSM_IOMMU) += msm_iommu.o
>> diff --git a/drivers/iommu/liveupdate.c b/drivers/iommu/liveupdate.c
>> new file mode 100644
>> index 000000000000..6189ba32ff2c
>> --- /dev/null
>> +++ b/drivers/iommu/liveupdate.c
>> @@ -0,0 +1,177 @@
>> +// SPDX-License-Identifier: GPL-2.0-only
>> +
>> +/*
>> + * Copyright (C) 2025, Google LLC
>
>Minor nit: 2026 OR 2025-26, here and everywhere else

Will fix in next revision.
>
>> + * Author: Samiullah Khawaja <skhawaja@google.com>
>> + */
>> +
>> +#define pr_fmt(fmt)    "iommu: liveupdate: " fmt
>> +
>> +#include <linux/kexec_handover.h>
>> +#include <linux/liveupdate.h>
>> +#include <linux/iommu-lu.h>
>> +#include <linux/iommu.h>
>> +#include <linux/errno.h>
>> +
>> +static void iommu_liveupdate_restore_objs(u64 next)
>> +{
>> +	struct iommu_objs_ser *objs;
>> +
>> +	while (next) {
>> +		BUG_ON(!kho_restore_folio(next));
>
>Same thing about BUG_ON [1] as mentioned below in the
>iommu_liveupdate_flb_retrieve() function, can we consider returning an
>error which can be checked in the caller and the error can be bubbled up
>as -ENODATA?

Please see the explanation below on the BUG_ON.
>
>> +		objs = __va(next);
>> +		next = objs->next_objs;
>> +	}
>> +}
>> +
>> +static void iommu_liveupdate_free_objs(u64 next, bool incoming)
>> +{
>> +	struct iommu_objs_ser *objs;
>> +
>> +	while (next) {
>> +		objs = __va(next);
>> +		next = objs->next_objs;
>> +
>> +		if (!incoming)
>> +			kho_unpreserve_free(objs);
>> +		else
>> +			folio_put(virt_to_folio(objs));
>
>Interesting! kho_restore_folio already adjusts the refcount via
>adjust_managed_page_count which is why folio_put() is needed for a valid
>refcount. Sweet :)
>
>> +	}
>> +}
>> +
>> +static void iommu_liveupdate_flb_free(struct iommu_lu_flb_obj *obj)
>> +{
>> +	if (obj->iommu_domains)
>> +		iommu_liveupdate_free_objs(obj->ser->iommu_domains_phys, false);
>> +
>> +	if (obj->devices)
>> +		iommu_liveupdate_free_objs(obj->ser->devices_phys, false);
>> +
>> +	if (obj->iommus)
>> +		iommu_liveupdate_free_objs(obj->ser->iommus_phys, false);
>> +
>> +	kho_unpreserve_free(obj->ser);
>> +	kfree(obj);
>> +}
>> +
>> +static int iommu_liveupdate_flb_preserve(struct liveupdate_flb_op_args *argp)
>> +{
>> +	struct iommu_lu_flb_obj *obj;
>> +	struct iommu_lu_flb_ser *ser;
>> +	void *mem;
>> +
>> +	obj = kzalloc(sizeof(*obj), GFP_KERNEL);
>
>I know this is obvious but let's add a comment that obj just exists in
>the "current" kernel whereas mem is supposed to survive the KHO..

Agreed. Will add in the next revision.
>
>> +	if (!obj)
>> +		return -ENOMEM;
>> +
>> +	mutex_init(&obj->lock);
>> +	mem = kho_alloc_preserve(sizeof(*ser));
>> +	if (IS_ERR(mem))
>> +		goto err_free;
>> +
>> +	ser = mem;
>> +	obj->ser = ser;
>> +
>> +	mem = kho_alloc_preserve(PAGE_SIZE);
>> +	if (IS_ERR(mem))
>> +		goto err_free;
>> +
>> +	obj->iommu_domains = mem;
>> +	ser->iommu_domains_phys = virt_to_phys(obj->iommu_domains);
>> +
>> +	mem = kho_alloc_preserve(PAGE_SIZE);
>> +	if (IS_ERR(mem))
>> +		goto err_free;
>> +
>> +	obj->devices = mem;
>> +	ser->devices_phys = virt_to_phys(obj->devices);
>> +
>> +	mem = kho_alloc_preserve(PAGE_SIZE);
>> +	if (IS_ERR(mem))
>> +		goto err_free;
>> +
>> +	obj->iommus = mem;
>> +	ser->iommus_phys = virt_to_phys(obj->iommus);
>> +
>> +	argp->obj = obj;
>> +	argp->data = virt_to_phys(ser);
>> +	return 0;
>> +
>> +err_free:
>> +	iommu_liveupdate_flb_free(obj);
>> +	return PTR_ERR(mem);
>> +}
>> +
>> +static void iommu_liveupdate_flb_unpreserve(struct liveupdate_flb_op_args *argp)
>> +{
>> +	iommu_liveupdate_flb_free(argp->obj);
>> +}
>> +
>> +static void iommu_liveupdate_flb_finish(struct liveupdate_flb_op_args *argp)
>> +{
>> +	struct iommu_lu_flb_obj *obj = argp->obj;
>> +
>> +	if (obj->iommu_domains)
>> +		iommu_liveupdate_free_objs(obj->ser->iommu_domains_phys, true);
>> +
>> +	if (obj->devices)
>> +		iommu_liveupdate_free_objs(obj->ser->devices_phys, true);
>> +
>> +	if (obj->iommus)
>> +		iommu_liveupdate_free_objs(obj->ser->iommus_phys, true);
>> +
>> +	folio_put(virt_to_folio(obj->ser));
>> +	kfree(obj);
>> +}
>> +
>> +static int iommu_liveupdate_flb_retrieve(struct liveupdate_flb_op_args *argp)
>> +{
>> +	struct iommu_lu_flb_obj *obj;
>> +	struct iommu_lu_flb_ser *ser;
>> +
>> +	obj = kzalloc(sizeof(*obj), GFP_ATOMIC);
>
>Why does this have to be GFP_ATOMIC? IIUC, the retrieve path is
>triggered by a userspace IOCTL in the new kernel. The system should be
>able to sleep here? (unless we have a use-case to call this in IRQ-ctx?)
>AFAICT, we call this under mutexes already, hence there's no situation
>where we could sleep in a spinlock context?
>
>GFP_ATOMIC creates a point of failure if the system is under memory
>pressure. I believe we should be allowed to sleep for this allocation
>because the "preserved" mappings still allow DMAs to go on and we're in
>no hurry to restore the IOMMU state? I believe this could be GFP_KERNEL.
>
>> +	if (!obj)
>> +		return -ENOMEM;
>> +
>> +	mutex_init(&obj->lock);
>> +	BUG_ON(!kho_restore_folio(argp->data));
>
>The use of BUG_ON in new code is heavily discouraged [1].
>If KHO can't restore the folio for whatever reason, we can be treat it
>as a corruption of the handover data. I believe crashing the kernel for
>it would be an overkill?

The FLB restore is done during early boot and this has been discussed in
past in KHO/LUO and IOMMU context also. But basically if this fails, the
restoration of IOMMU state cannot be done, preserved devices would
already have corrupted memory due to ongoing DMA as we didn't disable
translation in the previous kernel. So logging an error and a BUG_ON at
this point would be most appropriate.

Please see discussion here on this topic:
https://lore.kernel.org/all/20251118153631.GB90703@nvidia.com/
>
>Can we consider returning a graceful failure like -ENODATA or something?
>BUG_ON would instantly cause a kernel panic without providing no
>opportunity for the system to log the failure or attempt a graceful
>teardown of the 'preserved' mapping.

I will update this by adding a comment and also log an error.
>
>> +	ser = phys_to_virt(argp->data);
>> +	obj->ser = ser;
>> +
>> +	iommu_liveupdate_restore_objs(ser->iommu_domains_phys);
>> +	obj->iommu_domains = phys_to_virt(ser->iommu_domains_phys);
>> +
>> +	iommu_liveupdate_restore_objs(ser->devices_phys);
>> +	obj->devices = phys_to_virt(ser->devices_phys);
>> +
>> +	iommu_liveupdate_restore_objs(ser->iommus_phys);
>> +	obj->iommus = phys_to_virt(ser->iommus_phys);
>> +
>> +	argp->obj = obj;
>> +
>> +	return 0;
>> +}
>> +
>> +static struct liveupdate_flb_ops iommu_flb_ops = {
>> +	.preserve = iommu_liveupdate_flb_preserve,
>> +	.unpreserve = iommu_liveupdate_flb_unpreserve,
>> +	.finish = iommu_liveupdate_flb_finish,
>> +	.retrieve = iommu_liveupdate_flb_retrieve,
>> +};
>> +
>> +static struct liveupdate_flb iommu_flb = {
>> +	.compatible = IOMMU_LUO_FLB_COMPATIBLE,
>> +	.ops = &iommu_flb_ops,
>> +};
>> +
>> +int iommu_liveupdate_register_flb(struct liveupdate_file_handler *handler)
>> +{
>> +	return liveupdate_register_flb(handler, &iommu_flb);
>> +}
>> +EXPORT_SYMBOL(iommu_liveupdate_register_flb);
>> +
>> +int iommu_liveupdate_unregister_flb(struct liveupdate_file_handler *handler)
>> +{
>> +	return liveupdate_unregister_flb(handler, &iommu_flb);
>> +}
>> +EXPORT_SYMBOL(iommu_liveupdate_unregister_flb);
>> diff --git a/include/linux/iommu-lu.h b/include/linux/iommu-lu.h
>> new file mode 100644
>> index 000000000000..59095d2f1bb2
>> --- /dev/null
>> +++ b/include/linux/iommu-lu.h
>> @@ -0,0 +1,17 @@
>> +/* SPDX-License-Identifier: GPL-2.0 */
>> +
>> +/*
>> + * Copyright (C) 2025, Google LLC
>> + * Author: Samiullah Khawaja <skhawaja@google.com>
>> + */
>> +
>> +#ifndef _LINUX_IOMMU_LU_H
>> +#define _LINUX_IOMMU_LU_H
>> +
>> +#include <linux/liveupdate.h>
>> +#include <linux/kho/abi/iommu.h>
>> +
>> +int iommu_liveupdate_register_flb(struct liveupdate_file_handler *handler);
>> +int iommu_liveupdate_unregister_flb(struct liveupdate_file_handler *handler);
>> +
>> +#endif /* _LINUX_IOMMU_LU_H */
>> diff --git a/include/linux/kho/abi/iommu.h b/include/linux/kho/abi/iommu.h
>> new file mode 100644
>> index 000000000000..8e1c05cfe7bb
>> --- /dev/null
>> +++ b/include/linux/kho/abi/iommu.h
>> @@ -0,0 +1,119 @@
>> +/* SPDX-License-Identifier: GPL-2.0 */
>> +
>> +/*
>> + * Copyright (C) 2025, Google LLC
>> + * Author: Samiullah Khawaja <skhawaja@google.com>
>> + */
>> +
>> +#ifndef _LINUX_KHO_ABI_IOMMU_H
>> +#define _LINUX_KHO_ABI_IOMMU_H
>> +
>> +#include <linux/mutex_types.h>
>> +#include <linux/compiler.h>
>> +#include <linux/types.h>
>> +
>> +/**
>> + * DOC: IOMMU File-Lifecycle Bound (FLB) Live Update ABI
>> + *
>> + * This header defines the ABI for preserving IOMMU state across kexec using
>> + * Live Update File-Lifecycle Bound (FLB) data.
>> + *
>> + * This interface is a contract. Any modification to any of the serialization
>> + * structs defined here constitutes a breaking change. Such changes require
>> + * incrementing the version number in the IOMMU_LUO_FLB_COMPATIBLE string.
>> + */
>> +
>> +#define IOMMU_LUO_FLB_COMPATIBLE "iommu-v1"
>> +
>
>Let's call this "iommu-liveupdate-v1" or "iommu-lu-v1" instead?

Agreed.
>
>> +enum iommu_lu_type {
>> +	IOMMU_INVALID,
>> +	IOMMU_INTEL,
>> +};
>> +
>> +struct iommu_obj_ser {
>> +	u32 idx;
>> +	u32 ref_count;
>> +	u32 deleted:1;
>> +	u32 incoming:1;
>> +} __packed;
>> +
>> +struct iommu_domain_ser {
>> +	struct iommu_obj_ser obj;
>> +	u64 top_table;
>> +	u64 top_level;
>> +	struct iommu_domain *restored_domain;
>> +} __packed;
>> +
>> +struct device_domain_iommu_ser {
>> +	u32 did;
>> +	u64 domain_phys;
>> +	u64 iommu_phys;
>> +} __packed;
>> +
>> +struct device_ser {
>> +	struct iommu_obj_ser obj;
>> +	u64 token;
>> +	u32 devid;
>> +	u32 pci_domain;
>> +	struct device_domain_iommu_ser domain_iommu_ser;
>> +	enum iommu_lu_type type;
>> +} __packed;
>> +
>> +struct iommu_intel_ser {
>> +	u64 phys_addr;
>> +	u64 root_table;
>> +} __packed;
>> +
>> +struct iommu_ser {
>> +	struct iommu_obj_ser obj;
>> +	u64 token;
>> +	enum iommu_lu_type type;
>> +	union {
>> +		struct iommu_intel_ser intel;
>> +	};
>> +} __packed;
>> +
>> +struct iommu_objs_ser {
>> +	u64 next_objs;
>> +	u64 nr_objs;
>> +} __packed;
>> +
>> +struct iommus_ser {
>> +	struct iommu_objs_ser objs;
>> +	struct iommu_ser iommus[];
>> +} __packed;
>> +
>> +struct iommu_domains_ser {
>> +	struct iommu_objs_ser objs;
>> +	struct iommu_domain_ser iommu_domains[];
>> +} __packed;
>> +
>> +struct devices_ser {
>> +	struct iommu_objs_ser objs;
>> +	struct device_ser devices[];
>> +} __packed;
>> +
>> +#define MAX_IOMMU_SERS ((PAGE_SIZE - sizeof(struct iommus_ser)) / sizeof(struct iommu_ser))
>> +#define MAX_IOMMU_DOMAIN_SERS \
>> +		((PAGE_SIZE - sizeof(struct iommu_domains_ser)) / sizeof(struct iommu_domain_ser))
>> +#define MAX_DEVICE_SERS ((PAGE_SIZE - sizeof(struct devices_ser)) / sizeof(struct device_ser))
>> +
>> +struct iommu_lu_flb_ser {
>> +	u64 iommus_phys;
>> +	u64 nr_iommus;
>> +	u64 iommu_domains_phys;
>> +	u64 nr_domains;
>> +	u64 devices_phys;
>> +	u64 nr_devices;
>> +} __packed;
>> +
>> +struct iommu_lu_flb_obj {
>> +	struct mutex lock;
>> +	struct iommu_lu_flb_ser *ser;
>> +
>> +	struct iommu_domains_ser *iommu_domains;
>> +	struct iommus_ser *iommus;
>> +	struct devices_ser *devices;
>> +} __packed;
>> +
>
>Please let's add some comments describing the structs & their members
>here like we have in memfd [2]. This should be descriptive for the user.
>For example:

I agree. Will add comments for these and others.
>
>+/**
>+ * struct iommu_lu_flb_ser - Main serialization header for IOMMU state.
>+ * @iommus_phys:        Physical address of the first page in the IOMMU unit chain.
>+ * @nr_iommus:          Total number of hardware IOMMU units preserved.
>+ * @iommu_domains_phys: [...]
>+ * @nr_domains:         [...]
>+ * @devices_phys:       [...]
>+ * @nr_devices:         [...]
>+ *
>+ * This structure acts as the root of the IOMMU state tree. It is hitching a ride
>+ * on the iommufd file descriptor's preservation flow.
>+ */
>+struct iommu_lu_flb_ser {
>+	u64 iommus_phys;
>+	u64 nr_iommus;
>+	u64 iommu_domains_phys;
>+	u64 nr_domains;
>+	u64 devices_phys;
>+	u64 nr_devices;
>+} __packed;
>
>> +#endif /* _LINUX_KHO_ABI_IOMMU_H */
>
>Thanks,
>Praan
>
>[1] https://docs.kernel.org/process/coding-style.html#use-warn-rather-than-bug
>[2] https://elixir.bootlin.com/linux/v7.0-rc3/source/include/linux/kho/abi/memfd.h
>

Thanks for the review.

Sami

  reply	other threads:[~2026-03-12 16:43 UTC|newest]

Thread overview: 98+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-02-03 22:09 [PATCH 00/14] iommu: Add live update state preservation Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 01/14] iommu: Implement IOMMU LU FLB callbacks Samiullah Khawaja
2026-03-11 21:07   ` Pranjal Shrivastava
2026-03-12 16:43     ` Samiullah Khawaja [this message]
2026-03-12 23:43       ` Pranjal Shrivastava
2026-03-13 16:47         ` Samiullah Khawaja
2026-03-13 15:36       ` Pranjal Shrivastava
2026-03-13 16:58         ` Samiullah Khawaja
2026-03-16 22:54   ` Vipin Sharma
2026-03-17  1:06     ` Samiullah Khawaja
2026-03-23 23:27       ` Vipin Sharma
2026-02-03 22:09 ` [PATCH 02/14] iommu: Implement IOMMU core liveupdate skeleton Samiullah Khawaja
2026-03-12 23:10   ` Pranjal Shrivastava
2026-03-13 18:42     ` Samiullah Khawaja
2026-03-17 20:09       ` Pranjal Shrivastava
2026-03-17 20:13         ` Samiullah Khawaja
2026-03-17 20:23           ` Pranjal Shrivastava
2026-03-17 21:03             ` Vipin Sharma
2026-03-18 18:51               ` Pranjal Shrivastava
2026-03-18 17:49             ` Samiullah Khawaja
2026-03-17 19:58   ` Vipin Sharma
2026-03-17 20:33     ` Samiullah Khawaja
2026-03-24 19:06       ` Vipin Sharma
2026-03-24 19:45         ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 03/14] liveupdate: luo_file: Add internal APIs for file preservation Samiullah Khawaja
2026-03-18 10:00   ` Pranjal Shrivastava
2026-03-18 16:54     ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 04/14] iommu/pages: Add APIs to preserve/unpreserve/restore iommu pages Samiullah Khawaja
2026-03-03 16:42   ` Ankit Soni
2026-03-03 18:41     ` Samiullah Khawaja
2026-03-20 17:27       ` Pranjal Shrivastava
2026-03-20 18:12         ` Samiullah Khawaja
2026-03-17 20:59   ` Vipin Sharma
2026-03-20  9:28     ` Pranjal Shrivastava
2026-03-20 18:27       ` Samiullah Khawaja
2026-03-20 11:01     ` Pranjal Shrivastava
2026-03-20 18:56       ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 05/14] iommupt: Implement preserve/unpreserve/restore callbacks Samiullah Khawaja
2026-03-20 21:57   ` Pranjal Shrivastava
2026-03-23 16:41     ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 06/14] iommu/vt-d: Implement device and iommu preserve/unpreserve ops Samiullah Khawaja
2026-03-19 16:04   ` Vipin Sharma
2026-03-19 16:27     ` Samiullah Khawaja
2026-03-20 23:01   ` Pranjal Shrivastava
2026-03-21 13:27     ` Pranjal Shrivastava
2026-03-23 18:32     ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 07/14] iommu/vt-d: Restore IOMMU state and reclaimed domain ids Samiullah Khawaja
2026-03-19 20:54   ` Vipin Sharma
2026-03-20  1:05     ` Samiullah Khawaja
2026-03-22 19:51   ` Pranjal Shrivastava
2026-03-23 19:33     ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 08/14] iommu: Restore and reattach preserved domains to devices Samiullah Khawaja
2026-03-10  5:16   ` Ankit Soni
2026-03-10 21:47     ` Samiullah Khawaja
2026-03-22 21:59   ` Pranjal Shrivastava
2026-03-23 18:02     ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 09/14] iommu/vt-d: preserve PASID table of preserved device Samiullah Khawaja
2026-03-23 18:19   ` Pranjal Shrivastava
2026-03-23 18:51     ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 10/14] iommufd-lu: Implement ioctl to let userspace mark an HWPT to be preserved Samiullah Khawaja
2026-03-19 23:35   ` Vipin Sharma
2026-03-20  0:40     ` Samiullah Khawaja
2026-03-20 23:34       ` Vipin Sharma
2026-03-23 16:24         ` Samiullah Khawaja
2026-03-25 14:37   ` Pranjal Shrivastava
2026-03-25 17:31     ` Samiullah Khawaja
2026-03-25 18:55       ` Pranjal Shrivastava
2026-03-25 20:19         ` Samiullah Khawaja
2026-03-25 20:36           ` Pranjal Shrivastava
2026-03-25 20:46             ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 11/14] iommufd-lu: Persist iommu hardware pagetables for live update Samiullah Khawaja
2026-02-25 23:47   ` Samiullah Khawaja
2026-03-03  5:56   ` Ankit Soni
2026-03-03 18:51     ` Samiullah Khawaja
2026-03-23 20:28   ` Vipin Sharma
2026-03-23 21:34     ` Samiullah Khawaja
2026-03-25 20:08   ` Pranjal Shrivastava
2026-03-25 20:32     ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 12/14] iommufd: Add APIs to preserve/unpreserve a vfio cdev Samiullah Khawaja
2026-03-23 20:59   ` Vipin Sharma
2026-03-23 21:38     ` Samiullah Khawaja
2026-03-25 20:24   ` Pranjal Shrivastava
2026-03-25 20:41     ` Samiullah Khawaja
2026-03-25 21:23       ` Pranjal Shrivastava
2026-03-26  0:16         ` Samiullah Khawaja
2026-02-03 22:09 ` [PATCH 13/14] vfio/pci: Preserve the iommufd state of the " Samiullah Khawaja
2026-02-17  4:18   ` Ankit Soni
2026-03-03 18:35     ` Samiullah Khawaja
2026-03-23 21:17   ` Vipin Sharma
2026-03-23 22:07     ` Samiullah Khawaja
2026-03-24 20:30       ` Vipin Sharma
2026-03-25 20:55   ` Pranjal Shrivastava
2026-02-03 22:09 ` [PATCH 14/14] iommufd/selftest: Add test to verify iommufd preservation Samiullah Khawaja
2026-03-23 22:18   ` Vipin Sharma
2026-03-27 18:32     ` Samiullah Khawaja
2026-03-25 21:05   ` Pranjal Shrivastava
2026-03-27 18:25     ` Samiullah Khawaja
2026-03-27 18:40       ` Samiullah Khawaja

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=abLi5giBpi05_CLn@google.com \
    --to=skhawaja@google.com \
    --cc=ajayachandra@nvidia.com \
    --cc=akpm@linux-foundation.org \
    --cc=alex@shazbot.org \
    --cc=baolu.lu@linux.intel.com \
    --cc=chrisl@kernel.org \
    --cc=dmatlack@google.com \
    --cc=dwmw2@infradead.org \
    --cc=iommu@lists.linux.dev \
    --cc=jgg@ziepe.ca \
    --cc=joro@8bytes.org \
    --cc=kevin.tian@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=leonro@nvidia.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=parav@nvidia.com \
    --cc=pasha.tatashin@soleen.com \
    --cc=praan@google.com \
    --cc=pratyush@kernel.org \
    --cc=robin.murphy@arm.com \
    --cc=saeedm@nvidia.com \
    --cc=shuah@kernel.org \
    --cc=vipinsh@google.com \
    --cc=will@kernel.org \
    --cc=witu@nvidia.com \
    --cc=zhuyifei@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox