From: Jacob Pan <jacob.jun.pan@linux.intel.com> To: Joerg Roedel <joro@8bytes.org>, Alex Williamson <alex.williamson@redhat.com>, "Lu Baolu" <baolu.lu@linux.intel.com>, iommu@lists.linux-foundation.org, LKML <linux-kernel@vger.kernel.org>, David Woodhouse <dwmw2@infradead.org>, Jean-Philippe Brucker <jean-philippe@linaro.com> Cc: "Yi Liu" <yi.l.liu@intel.com>, "Tian, Kevin" <kevin.tian@intel.com>, Raj Ashok <ashok.raj@intel.com>, "Christoph Hellwig" <hch@infradead.org>, Jonathan Cameron <jic23@kernel.org>, Eric Auger <eric.auger@redhat.com>, Jacob Pan <jacob.jun.pan@linux.intel.com> Subject: [PATCH 04/10] iommu/ioasid: Rename ioasid_set_data to avoid confusion with ioasid_set Date: Wed, 25 Mar 2020 10:55:25 -0700 [thread overview] Message-ID: <1585158931-1825-5-git-send-email-jacob.jun.pan@linux.intel.com> (raw) In-Reply-To: <1585158931-1825-1-git-send-email-jacob.jun.pan@linux.intel.com> IOASID set refers to a group of IOASIDs that shares the same token. ioasid_set_data() function is used to attach a private data to an IOASID, rename it to ioasid_attach_data() avoid being confused with the group/set concept. Signed-off-by: Jacob Pan <jacob.jun.pan@linux.intel.com> --- drivers/iommu/intel-svm.c | 11 ++++++----- drivers/iommu/ioasid.c | 6 +++--- include/linux/ioasid.h | 4 ++-- 3 files changed, 11 insertions(+), 10 deletions(-) diff --git a/drivers/iommu/intel-svm.c b/drivers/iommu/intel-svm.c index b6405df6cfb5..1991587fd3fd 100644 --- a/drivers/iommu/intel-svm.c +++ b/drivers/iommu/intel-svm.c @@ -319,14 +319,15 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, svm->gpasid = data->gpasid; svm->flags |= SVM_FLAG_GUEST_PASID; } - ioasid_set_data(data->hpasid, svm); + + ioasid_attach_data(data->hpasid, svm); INIT_LIST_HEAD_RCU(&svm->devs); mmput(svm->mm); } sdev = kzalloc(sizeof(*sdev), GFP_KERNEL); if (!sdev) { if (list_empty(&svm->devs)) { - ioasid_set_data(data->hpasid, NULL); + ioasid_attach_data(data->hpasid, NULL); kfree(svm); } ret = -ENOMEM; @@ -346,7 +347,7 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, * was allocated in this function. */ if (list_empty(&svm->devs)) { - ioasid_set_data(data->hpasid, NULL); + ioasid_attach_data(data->hpasid, NULL); kfree(svm); } goto out; @@ -375,7 +376,7 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, */ kfree(sdev); if (list_empty(&svm->devs)) { - ioasid_set_data(data->hpasid, NULL); + ioasid_attach_data(data->hpasid, NULL); kfree(svm); } goto out; @@ -438,7 +439,7 @@ int intel_svm_unbind_gpasid(struct device *dev, int pasid) * that PASID allocated by one guest cannot be * used by another. */ - ioasid_set_data(pasid, NULL); + ioasid_attach_data(pasid, NULL); kfree(svm); } } diff --git a/drivers/iommu/ioasid.c b/drivers/iommu/ioasid.c index 27ee57f7079b..6265d2dbbced 100644 --- a/drivers/iommu/ioasid.c +++ b/drivers/iommu/ioasid.c @@ -292,14 +292,14 @@ void ioasid_unregister_allocator(struct ioasid_allocator_ops *ops) EXPORT_SYMBOL_GPL(ioasid_unregister_allocator); /** - * ioasid_set_data - Set private data for an allocated ioasid + * ioasid_attach_data - Set private data for an allocated ioasid * @ioasid: the ID to set data * @data: the private data * * For IOASID that is already allocated, private data can be set * via this API. Future lookup can be done via ioasid_find. */ -int ioasid_set_data(ioasid_t ioasid, void *data) +int ioasid_attach_data(ioasid_t ioasid, void *data) { struct ioasid_data *ioasid_data; int ret = 0; @@ -321,7 +321,7 @@ int ioasid_set_data(ioasid_t ioasid, void *data) return ret; } -EXPORT_SYMBOL_GPL(ioasid_set_data); +EXPORT_SYMBOL_GPL(ioasid_attach_data); /** * ioasid_alloc - Allocate an IOASID diff --git a/include/linux/ioasid.h b/include/linux/ioasid.h index be158e03c034..8c82d2625671 100644 --- a/include/linux/ioasid.h +++ b/include/linux/ioasid.h @@ -39,7 +39,7 @@ void *ioasid_find(struct ioasid_set *set, ioasid_t ioasid, bool (*getter)(void *)); int ioasid_register_allocator(struct ioasid_allocator_ops *allocator); void ioasid_unregister_allocator(struct ioasid_allocator_ops *allocator); -int ioasid_set_data(ioasid_t ioasid, void *data); +int ioasid_attach_data(ioasid_t ioasid, void *data); void ioasid_install_capacity(ioasid_t total); int ioasid_alloc_set(struct ioasid_set *token, ioasid_t quota, int *sid); void ioasid_free_set(int sid, bool destroy_set); @@ -79,7 +79,7 @@ static inline void ioasid_unregister_allocator(struct ioasid_allocator_ops *allo { } -static inline int ioasid_set_data(ioasid_t ioasid, void *data) +static inline int ioasid_attach_data(ioasid_t ioasid, void *data) { return -ENOTSUPP; } -- 2.7.4
WARNING: multiple messages have this Message-ID (diff)
From: Jacob Pan <jacob.jun.pan@linux.intel.com> To: Joerg Roedel <joro@8bytes.org>, Alex Williamson <alex.williamson@redhat.com>, "Lu Baolu" <baolu.lu@linux.intel.com>, iommu@lists.linux-foundation.org, LKML <linux-kernel@vger.kernel.org>, David Woodhouse <dwmw2@infradead.org>, Jean-Philippe Brucker <jean-philippe@linaro.com> Cc: "Tian, Kevin" <kevin.tian@intel.com>, Raj Ashok <ashok.raj@intel.com>, Jonathan Cameron <jic23@kernel.org> Subject: [PATCH 04/10] iommu/ioasid: Rename ioasid_set_data to avoid confusion with ioasid_set Date: Wed, 25 Mar 2020 10:55:25 -0700 [thread overview] Message-ID: <1585158931-1825-5-git-send-email-jacob.jun.pan@linux.intel.com> (raw) In-Reply-To: <1585158931-1825-1-git-send-email-jacob.jun.pan@linux.intel.com> IOASID set refers to a group of IOASIDs that shares the same token. ioasid_set_data() function is used to attach a private data to an IOASID, rename it to ioasid_attach_data() avoid being confused with the group/set concept. Signed-off-by: Jacob Pan <jacob.jun.pan@linux.intel.com> --- drivers/iommu/intel-svm.c | 11 ++++++----- drivers/iommu/ioasid.c | 6 +++--- include/linux/ioasid.h | 4 ++-- 3 files changed, 11 insertions(+), 10 deletions(-) diff --git a/drivers/iommu/intel-svm.c b/drivers/iommu/intel-svm.c index b6405df6cfb5..1991587fd3fd 100644 --- a/drivers/iommu/intel-svm.c +++ b/drivers/iommu/intel-svm.c @@ -319,14 +319,15 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, svm->gpasid = data->gpasid; svm->flags |= SVM_FLAG_GUEST_PASID; } - ioasid_set_data(data->hpasid, svm); + + ioasid_attach_data(data->hpasid, svm); INIT_LIST_HEAD_RCU(&svm->devs); mmput(svm->mm); } sdev = kzalloc(sizeof(*sdev), GFP_KERNEL); if (!sdev) { if (list_empty(&svm->devs)) { - ioasid_set_data(data->hpasid, NULL); + ioasid_attach_data(data->hpasid, NULL); kfree(svm); } ret = -ENOMEM; @@ -346,7 +347,7 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, * was allocated in this function. */ if (list_empty(&svm->devs)) { - ioasid_set_data(data->hpasid, NULL); + ioasid_attach_data(data->hpasid, NULL); kfree(svm); } goto out; @@ -375,7 +376,7 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, */ kfree(sdev); if (list_empty(&svm->devs)) { - ioasid_set_data(data->hpasid, NULL); + ioasid_attach_data(data->hpasid, NULL); kfree(svm); } goto out; @@ -438,7 +439,7 @@ int intel_svm_unbind_gpasid(struct device *dev, int pasid) * that PASID allocated by one guest cannot be * used by another. */ - ioasid_set_data(pasid, NULL); + ioasid_attach_data(pasid, NULL); kfree(svm); } } diff --git a/drivers/iommu/ioasid.c b/drivers/iommu/ioasid.c index 27ee57f7079b..6265d2dbbced 100644 --- a/drivers/iommu/ioasid.c +++ b/drivers/iommu/ioasid.c @@ -292,14 +292,14 @@ void ioasid_unregister_allocator(struct ioasid_allocator_ops *ops) EXPORT_SYMBOL_GPL(ioasid_unregister_allocator); /** - * ioasid_set_data - Set private data for an allocated ioasid + * ioasid_attach_data - Set private data for an allocated ioasid * @ioasid: the ID to set data * @data: the private data * * For IOASID that is already allocated, private data can be set * via this API. Future lookup can be done via ioasid_find. */ -int ioasid_set_data(ioasid_t ioasid, void *data) +int ioasid_attach_data(ioasid_t ioasid, void *data) { struct ioasid_data *ioasid_data; int ret = 0; @@ -321,7 +321,7 @@ int ioasid_set_data(ioasid_t ioasid, void *data) return ret; } -EXPORT_SYMBOL_GPL(ioasid_set_data); +EXPORT_SYMBOL_GPL(ioasid_attach_data); /** * ioasid_alloc - Allocate an IOASID diff --git a/include/linux/ioasid.h b/include/linux/ioasid.h index be158e03c034..8c82d2625671 100644 --- a/include/linux/ioasid.h +++ b/include/linux/ioasid.h @@ -39,7 +39,7 @@ void *ioasid_find(struct ioasid_set *set, ioasid_t ioasid, bool (*getter)(void *)); int ioasid_register_allocator(struct ioasid_allocator_ops *allocator); void ioasid_unregister_allocator(struct ioasid_allocator_ops *allocator); -int ioasid_set_data(ioasid_t ioasid, void *data); +int ioasid_attach_data(ioasid_t ioasid, void *data); void ioasid_install_capacity(ioasid_t total); int ioasid_alloc_set(struct ioasid_set *token, ioasid_t quota, int *sid); void ioasid_free_set(int sid, bool destroy_set); @@ -79,7 +79,7 @@ static inline void ioasid_unregister_allocator(struct ioasid_allocator_ops *allo { } -static inline int ioasid_set_data(ioasid_t ioasid, void *data) +static inline int ioasid_attach_data(ioasid_t ioasid, void *data) { return -ENOTSUPP; } -- 2.7.4 _______________________________________________ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/iommu
next prev parent reply other threads:[~2020-03-25 17:50 UTC|newest] Thread overview: 114+ messages / expand[flat|nested] mbox.gz Atom feed top 2020-03-25 17:55 [PATCH 00/10] IOASID extensions for guest SVA Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-25 17:55 ` [PATCH 01/10] iommu/ioasid: Introduce system-wide capacity Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-27 8:07 ` Tian, Kevin 2020-03-27 8:07 ` Tian, Kevin 2020-03-27 16:08 ` Jacob Pan 2020-03-27 16:08 ` Jacob Pan 2020-04-01 13:45 ` Jean-Philippe Brucker 2020-04-01 13:45 ` Jean-Philippe Brucker 2020-04-01 22:50 ` Jacob Pan 2020-04-01 22:50 ` Jacob Pan 2020-03-25 17:55 ` [PATCH 02/10] iommu/vt-d: Set IOASID capacity when SVM is enabled Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-27 8:08 ` Tian, Kevin 2020-03-27 8:08 ` Tian, Kevin 2020-03-25 17:55 ` [PATCH 03/10] iommu/ioasid: Introduce per set allocation APIs Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-26 2:12 ` Lu Baolu 2020-03-26 2:12 ` Lu Baolu 2020-03-26 21:30 ` Jacob Pan 2020-03-26 21:30 ` Jacob Pan 2020-03-27 8:38 ` Tian, Kevin 2020-03-27 8:38 ` Tian, Kevin 2020-03-27 16:59 ` Jacob Pan 2020-03-27 16:59 ` Jacob Pan 2020-03-28 6:32 ` Tian, Kevin 2020-03-28 6:32 ` Tian, Kevin 2020-04-01 13:47 ` Jean-Philippe Brucker 2020-04-01 13:47 ` Jean-Philippe Brucker 2020-04-06 20:02 ` Jacob Pan 2020-04-06 20:02 ` Jacob Pan 2020-04-07 11:01 ` Jean-Philippe Brucker 2020-04-07 11:01 ` Jean-Philippe Brucker 2020-04-21 21:51 ` Jacob Pan 2020-04-21 21:51 ` Jacob Pan 2020-03-25 17:55 ` Jacob Pan [this message] 2020-03-25 17:55 ` [PATCH 04/10] iommu/ioasid: Rename ioasid_set_data to avoid confusion with ioasid_set Jacob Pan 2020-03-27 9:35 ` Tian, Kevin 2020-03-27 9:35 ` Tian, Kevin 2020-03-25 17:55 ` [PATCH 05/10] iommu/ioasid: Create an IOASID set for host SVA use Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-27 9:41 ` Tian, Kevin 2020-03-27 9:41 ` Tian, Kevin 2020-03-27 17:28 ` Jacob Pan 2020-03-27 17:28 ` Jacob Pan 2020-03-28 6:33 ` Tian, Kevin 2020-03-28 6:33 ` Tian, Kevin 2020-04-01 13:53 ` Jean-Philippe Brucker 2020-04-01 13:53 ` Jean-Philippe Brucker 2020-04-06 15:33 ` Jacob Pan 2020-04-06 15:33 ` Jacob Pan 2020-04-07 11:01 ` Jean-Philippe Brucker 2020-04-07 11:01 ` Jean-Philippe Brucker 2020-04-13 22:06 ` Jacob Pan 2020-04-13 22:06 ` Jacob Pan 2020-04-15 15:10 ` Jean-Philippe Brucker 2020-04-15 15:10 ` Jean-Philippe Brucker 2020-03-25 17:55 ` [PATCH 06/10] iommu/ioasid: Convert to set aware allocations Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-27 9:54 ` Tian, Kevin 2020-03-27 9:54 ` Tian, Kevin 2020-03-27 17:41 ` Jacob Pan 2020-03-27 17:41 ` Jacob Pan 2020-03-28 6:40 ` Tian, Kevin 2020-03-28 6:40 ` Tian, Kevin 2020-04-06 20:07 ` Jacob Pan 2020-04-06 20:07 ` Jacob Pan 2020-04-01 13:55 ` Jean-Philippe Brucker 2020-04-01 13:55 ` Jean-Philippe Brucker 2020-04-01 22:45 ` Jacob Pan 2020-04-01 22:45 ` Jacob Pan 2020-03-25 17:55 ` [PATCH 07/10] iommu/ioasid: Use mutex instead of spinlock Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-27 9:55 ` Tian, Kevin 2020-03-27 9:55 ` Tian, Kevin 2020-04-01 13:58 ` Jean-Philippe Brucker 2020-04-01 13:58 ` Jean-Philippe Brucker 2020-03-25 17:55 ` [PATCH 08/10] iommu/ioasid: Introduce notifier APIs Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-27 10:03 ` Tian, Kevin 2020-03-27 10:03 ` Tian, Kevin 2020-03-27 18:36 ` Jacob Pan 2020-03-27 18:36 ` Jacob Pan 2020-03-28 6:43 ` Tian, Kevin 2020-03-28 6:43 ` Tian, Kevin 2020-03-31 15:13 ` Jacob Pan 2020-03-31 15:13 ` Jacob Pan 2020-04-01 14:00 ` Jean-Philippe Brucker 2020-04-01 14:00 ` Jean-Philippe Brucker 2020-04-10 15:43 ` Jacob Pan 2020-04-10 15:43 ` Jacob Pan 2020-03-25 17:55 ` [PATCH 09/10] iommu/ioasid: Support ioasid_set quota adjustment Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-27 10:09 ` Tian, Kevin 2020-03-27 10:09 ` Tian, Kevin 2020-03-27 23:30 ` Jacob Pan 2020-03-27 23:30 ` Jacob Pan 2020-03-28 6:44 ` Tian, Kevin 2020-03-28 6:44 ` Tian, Kevin 2020-03-25 17:55 ` [PATCH 10/10] iommu/vt-d: Register PASID notifier for status change Jacob Pan 2020-03-25 17:55 ` Jacob Pan 2020-03-27 10:22 ` Tian, Kevin 2020-03-27 10:22 ` Tian, Kevin 2020-03-27 23:47 ` Jacob Pan 2020-03-27 23:47 ` Jacob Pan 2020-04-01 14:03 ` [PATCH 00/10] IOASID extensions for guest SVA Jean-Philippe Brucker 2020-04-01 14:03 ` Jean-Philippe Brucker 2020-04-01 23:38 ` Jacob Pan 2020-04-01 23:38 ` Jacob Pan 2020-04-02 12:26 ` Jean-Philippe Brucker 2020-04-02 12:26 ` Jean-Philippe Brucker 2020-04-02 16:09 ` Jacob Pan 2020-04-02 16:09 ` Jacob Pan
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=1585158931-1825-5-git-send-email-jacob.jun.pan@linux.intel.com \ --to=jacob.jun.pan@linux.intel.com \ --cc=alex.williamson@redhat.com \ --cc=ashok.raj@intel.com \ --cc=baolu.lu@linux.intel.com \ --cc=dwmw2@infradead.org \ --cc=eric.auger@redhat.com \ --cc=hch@infradead.org \ --cc=iommu@lists.linux-foundation.org \ --cc=jean-philippe@linaro.com \ --cc=jic23@kernel.org \ --cc=joro@8bytes.org \ --cc=kevin.tian@intel.com \ --cc=linux-kernel@vger.kernel.org \ --cc=yi.l.liu@intel.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.