All of lore.kernel.org
 help / color / mirror / Atom feed
From: Joerg Roedel <joro@8bytes.org>
To: Joerg Roedel <joro@8bytes.org>, Will Deacon <will@kernel.org>,
	Robin Murphy <robin.murphy@arm.com>,
	Marek Szyprowski <m.szyprowski@samsung.com>,
	Kukjin Kim <kgene@kernel.org>,
	Krzysztof Kozlowski <krzk@kernel.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Andy Gross <agross@kernel.org>,
	Bjorn Andersson <bjorn.andersson@linaro.org>,
	Matthias Brugger <matthias.bgg@gmail.com>,
	Rob Clark <robdclark@gmail.com>, Heiko Stuebner <heiko@sntech.de>,
	Gerald Schaefer <gerald.schaefer@de.ibm.com>,
	Thierry Reding <thierry.reding@gmail.com>,
	Jonathan Hunter <jonathanh@nvidia.com>,
	Jean-Philippe Brucker <jean-philippe@linaro.org>
Cc: iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org,
	linux-samsung-soc@vger.kernel.org, linux-arm-msm@vger.kernel.org,
	linux-mediatek@lists.infradead.org,
	linux-rockchip@lists.infradead.org, linux-s390@vger.kernel.org,
	linux-tegra@vger.kernel.org,
	virtualization@lists.linux-foundation.org,
	Sai Praneeth Prakhya <sai.praneeth.prakhya@intel.com>,
	Joerg Roedel <jroedel@suse.de>
Subject: [PATCH v2 02/33] iommu: Add def_domain_type() callback in iommu_ops
Date: Tue, 14 Apr 2020 15:15:11 +0200	[thread overview]
Message-ID: <20200414131542.25608-3-joro@8bytes.org> (raw)
In-Reply-To: <20200414131542.25608-1-joro@8bytes.org>

From: Sai Praneeth Prakhya <sai.praneeth.prakhya@intel.com>

Some devices are reqired to use a specific type (identity or dma)
of default domain when they are used with a vendor iommu. When the
system level default domain type is different from it, the vendor
iommu driver has to request a new default domain with
iommu_request_dma_domain_for_dev() and iommu_request_dm_for_dev()
in the add_dev() callback. Unfortunately, these two helpers only
work when the group hasn't been assigned to any other devices,
hence, some vendor iommu driver has to use a private domain if
it fails to request a new default one.

This adds def_domain_type() callback in the iommu_ops, so that
any special requirement of default domain for a device could be
aware by the iommu generic layer.

Signed-off-by: Sai Praneeth Prakhya <sai.praneeth.prakhya@intel.com>
Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com>
[ jroedel@suse.de: Added iommu_get_def_domain_type() function and use
                   it to allocate the default domain ]
Co-developed-by: Joerg Roedel <jroedel@suse.de>
Signed-off-by: Joerg Roedel <jroedel@suse.de>
---
 drivers/iommu/iommu.c | 20 +++++++++++++++++---
 include/linux/iommu.h |  6 ++++++
 2 files changed, 23 insertions(+), 3 deletions(-)

diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
index bfe011760ed1..5877abd9b693 100644
--- a/drivers/iommu/iommu.c
+++ b/drivers/iommu/iommu.c
@@ -1361,21 +1361,35 @@ struct iommu_group *fsl_mc_device_group(struct device *dev)
 }
 EXPORT_SYMBOL_GPL(fsl_mc_device_group);
 
+static int iommu_get_def_domain_type(struct device *dev)
+{
+	const struct iommu_ops *ops = dev->bus->iommu_ops;
+	unsigned int type = 0;
+
+	if (ops->def_domain_type)
+		type = ops->def_domain_type(dev);
+
+	return (type == 0) ? iommu_def_domain_type : type;
+}
+
 static int iommu_alloc_default_domain(struct device *dev,
 				      struct iommu_group *group)
 {
 	struct iommu_domain *dom;
+	unsigned int type;
 
 	if (group->default_domain)
 		return 0;
 
-	dom = __iommu_domain_alloc(dev->bus, iommu_def_domain_type);
-	if (!dom && iommu_def_domain_type != IOMMU_DOMAIN_DMA) {
+	type = iommu_get_def_domain_type(dev);
+
+	dom = __iommu_domain_alloc(dev->bus, type);
+	if (!dom && type != IOMMU_DOMAIN_DMA) {
 		dom = __iommu_domain_alloc(dev->bus, IOMMU_DOMAIN_DMA);
 		if (dom) {
 			dev_warn(dev,
 				 "failed to allocate default IOMMU domain of type %u; falling back to IOMMU_DOMAIN_DMA",
-				 iommu_def_domain_type);
+				 type);
 		}
 	}
 
diff --git a/include/linux/iommu.h b/include/linux/iommu.h
index 7ef8b0bda695..1f027b07e499 100644
--- a/include/linux/iommu.h
+++ b/include/linux/iommu.h
@@ -248,6 +248,10 @@ struct iommu_iotlb_gather {
  * @cache_invalidate: invalidate translation caches
  * @sva_bind_gpasid: bind guest pasid and mm
  * @sva_unbind_gpasid: unbind guest pasid and mm
+ * @def_domain_type: device default domain type, return value:
+ *		- IOMMU_DOMAIN_IDENTITY: must use an identity domain
+ *		- IOMMU_DOMAIN_DMA: must use a dma domain
+ *		- 0: use the default setting
  * @pgsize_bitmap: bitmap of all possible supported page sizes
  * @owner: Driver module providing these ops
  */
@@ -318,6 +322,8 @@ struct iommu_ops {
 
 	int (*sva_unbind_gpasid)(struct device *dev, int pasid);
 
+	int (*def_domain_type)(struct device *dev);
+
 	unsigned long pgsize_bitmap;
 	struct module *owner;
 };
-- 
2.17.1

WARNING: multiple messages have this Message-ID (diff)
From: Joerg Roedel <joro@8bytes.org>
To: Joerg Roedel <joro@8bytes.org>, Will Deacon <will@kernel.org>,
	Robin Murphy <robin.murphy@arm.com>,
	Marek Szyprowski <m.szyprowski@samsung.com>,
	Kukjin Kim <kgene@kernel.org>,
	Krzysztof Kozlowski <krzk@kernel.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Andy Gross <agross@kernel.org>,
	Bjorn Andersson <bjorn.andersson@linaro.org>,
	Matthias Brugger <matthias.bgg@gmail.com>,
	Rob Clark <robdclark@gmail.com>, Heiko Stuebner <heiko@sntech.de>,
	Gerald Schaefer <gerald.schaefer@de.ibm.com>,
	Thierry Reding <thierry.reding@gmail.com>,
	Jonathan Hunter <jonathanh@nvidia.com>,
	Jean-Philippe Brucker <jean-philippe@linaro.org>
Cc: linux-s390@vger.kernel.org, linux-samsung-soc@vger.kernel.org,
	linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org,
	virtualization@lists.linux-foundation.org,
	linux-rockchip@lists.infradead.org,
	iommu@lists.linux-foundation.org, Joerg Roedel <jroedel@suse.de>,
	linux-mediatek@lists.infradead.org, linux-tegra@vger.kernel.org
Subject: [PATCH v2 02/33] iommu: Add def_domain_type() callback in iommu_ops
Date: Tue, 14 Apr 2020 15:15:11 +0200	[thread overview]
Message-ID: <20200414131542.25608-3-joro@8bytes.org> (raw)
In-Reply-To: <20200414131542.25608-1-joro@8bytes.org>

From: Sai Praneeth Prakhya <sai.praneeth.prakhya@intel.com>

Some devices are reqired to use a specific type (identity or dma)
of default domain when they are used with a vendor iommu. When the
system level default domain type is different from it, the vendor
iommu driver has to request a new default domain with
iommu_request_dma_domain_for_dev() and iommu_request_dm_for_dev()
in the add_dev() callback. Unfortunately, these two helpers only
work when the group hasn't been assigned to any other devices,
hence, some vendor iommu driver has to use a private domain if
it fails to request a new default one.

This adds def_domain_type() callback in the iommu_ops, so that
any special requirement of default domain for a device could be
aware by the iommu generic layer.

Signed-off-by: Sai Praneeth Prakhya <sai.praneeth.prakhya@intel.com>
Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com>
[ jroedel@suse.de: Added iommu_get_def_domain_type() function and use
                   it to allocate the default domain ]
Co-developed-by: Joerg Roedel <jroedel@suse.de>
Signed-off-by: Joerg Roedel <jroedel@suse.de>
---
 drivers/iommu/iommu.c | 20 +++++++++++++++++---
 include/linux/iommu.h |  6 ++++++
 2 files changed, 23 insertions(+), 3 deletions(-)

diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
index bfe011760ed1..5877abd9b693 100644
--- a/drivers/iommu/iommu.c
+++ b/drivers/iommu/iommu.c
@@ -1361,21 +1361,35 @@ struct iommu_group *fsl_mc_device_group(struct device *dev)
 }
 EXPORT_SYMBOL_GPL(fsl_mc_device_group);
 
+static int iommu_get_def_domain_type(struct device *dev)
+{
+	const struct iommu_ops *ops = dev->bus->iommu_ops;
+	unsigned int type = 0;
+
+	if (ops->def_domain_type)
+		type = ops->def_domain_type(dev);
+
+	return (type == 0) ? iommu_def_domain_type : type;
+}
+
 static int iommu_alloc_default_domain(struct device *dev,
 				      struct iommu_group *group)
 {
 	struct iommu_domain *dom;
+	unsigned int type;
 
 	if (group->default_domain)
 		return 0;
 
-	dom = __iommu_domain_alloc(dev->bus, iommu_def_domain_type);
-	if (!dom && iommu_def_domain_type != IOMMU_DOMAIN_DMA) {
+	type = iommu_get_def_domain_type(dev);
+
+	dom = __iommu_domain_alloc(dev->bus, type);
+	if (!dom && type != IOMMU_DOMAIN_DMA) {
 		dom = __iommu_domain_alloc(dev->bus, IOMMU_DOMAIN_DMA);
 		if (dom) {
 			dev_warn(dev,
 				 "failed to allocate default IOMMU domain of type %u; falling back to IOMMU_DOMAIN_DMA",
-				 iommu_def_domain_type);
+				 type);
 		}
 	}
 
diff --git a/include/linux/iommu.h b/include/linux/iommu.h
index 7ef8b0bda695..1f027b07e499 100644
--- a/include/linux/iommu.h
+++ b/include/linux/iommu.h
@@ -248,6 +248,10 @@ struct iommu_iotlb_gather {
  * @cache_invalidate: invalidate translation caches
  * @sva_bind_gpasid: bind guest pasid and mm
  * @sva_unbind_gpasid: unbind guest pasid and mm
+ * @def_domain_type: device default domain type, return value:
+ *		- IOMMU_DOMAIN_IDENTITY: must use an identity domain
+ *		- IOMMU_DOMAIN_DMA: must use a dma domain
+ *		- 0: use the default setting
  * @pgsize_bitmap: bitmap of all possible supported page sizes
  * @owner: Driver module providing these ops
  */
@@ -318,6 +322,8 @@ struct iommu_ops {
 
 	int (*sva_unbind_gpasid)(struct device *dev, int pasid);
 
+	int (*def_domain_type)(struct device *dev);
+
 	unsigned long pgsize_bitmap;
 	struct module *owner;
 };
-- 
2.17.1

_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

WARNING: multiple messages have this Message-ID (diff)
From: Joerg Roedel <joro@8bytes.org>
To: Joerg Roedel <joro@8bytes.org>, Will Deacon <will@kernel.org>,
	Robin Murphy <robin.murphy@arm.com>,
	Marek Szyprowski <m.szyprowski@samsung.com>,
	Kukjin Kim <kgene@kernel.org>,
	Krzysztof Kozlowski <krzk@kernel.org>,
	David Woodhouse <dwmw2@infradead.org>,
	Lu Baolu <baolu.lu@linux.intel.com>,
	Andy Gross <agross@kernel.org>,
	Bjorn Andersson <bjorn.andersson@linaro.org>,
	Matthias Brugger <matthias.bgg@gmail.com>,
	Rob Clark <robdclark@gmail.com>, Heiko Stuebner <heiko@sntech.de>,
	Gerald Schaefer <gerald.schaefer@de.ibm.com>,
	Thierry Reding <thierry.reding@gmail.com>,
	Jonathan Hunter <jonathanh@nvidia.com>,
	Jean-Philippe Brucker <jean-philippe@linaro.org>
Cc: linux-s390@vger.kernel.org, linux-samsung-soc@vger.kernel.org,
	Sai Praneeth Prakhya <sai.praneeth.prakhya@intel.com>,
	linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org,
	virtualization@lists.linux-foundation.org,
	linux-rockchip@lists.infradead.org,
	iommu@lists.linux-foundation.org, Joerg Roedel <jroedel@suse.de>,
	linux-mediatek@lists.infradead.org, linux-tegra@vger.kernel.org
Subject: [PATCH v2 02/33] iommu: Add def_domain_type() callback in iommu_ops
Date: Tue, 14 Apr 2020 15:15:11 +0200	[thread overview]
Message-ID: <20200414131542.25608-3-joro@8bytes.org> (raw)
In-Reply-To: <20200414131542.25608-1-joro@8bytes.org>

From: Sai Praneeth Prakhya <sai.praneeth.prakhya@intel.com>

Some devices are reqired to use a specific type (identity or dma)
of default domain when they are used with a vendor iommu. When the
system level default domain type is different from it, the vendor
iommu driver has to request a new default domain with
iommu_request_dma_domain_for_dev() and iommu_request_dm_for_dev()
in the add_dev() callback. Unfortunately, these two helpers only
work when the group hasn't been assigned to any other devices,
hence, some vendor iommu driver has to use a private domain if
it fails to request a new default one.

This adds def_domain_type() callback in the iommu_ops, so that
any special requirement of default domain for a device could be
aware by the iommu generic layer.

Signed-off-by: Sai Praneeth Prakhya <sai.praneeth.prakhya@intel.com>
Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com>
[ jroedel@suse.de: Added iommu_get_def_domain_type() function and use
                   it to allocate the default domain ]
Co-developed-by: Joerg Roedel <jroedel@suse.de>
Signed-off-by: Joerg Roedel <jroedel@suse.de>
---
 drivers/iommu/iommu.c | 20 +++++++++++++++++---
 include/linux/iommu.h |  6 ++++++
 2 files changed, 23 insertions(+), 3 deletions(-)

diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
index bfe011760ed1..5877abd9b693 100644
--- a/drivers/iommu/iommu.c
+++ b/drivers/iommu/iommu.c
@@ -1361,21 +1361,35 @@ struct iommu_group *fsl_mc_device_group(struct device *dev)
 }
 EXPORT_SYMBOL_GPL(fsl_mc_device_group);
 
+static int iommu_get_def_domain_type(struct device *dev)
+{
+	const struct iommu_ops *ops = dev->bus->iommu_ops;
+	unsigned int type = 0;
+
+	if (ops->def_domain_type)
+		type = ops->def_domain_type(dev);
+
+	return (type == 0) ? iommu_def_domain_type : type;
+}
+
 static int iommu_alloc_default_domain(struct device *dev,
 				      struct iommu_group *group)
 {
 	struct iommu_domain *dom;
+	unsigned int type;
 
 	if (group->default_domain)
 		return 0;
 
-	dom = __iommu_domain_alloc(dev->bus, iommu_def_domain_type);
-	if (!dom && iommu_def_domain_type != IOMMU_DOMAIN_DMA) {
+	type = iommu_get_def_domain_type(dev);
+
+	dom = __iommu_domain_alloc(dev->bus, type);
+	if (!dom && type != IOMMU_DOMAIN_DMA) {
 		dom = __iommu_domain_alloc(dev->bus, IOMMU_DOMAIN_DMA);
 		if (dom) {
 			dev_warn(dev,
 				 "failed to allocate default IOMMU domain of type %u; falling back to IOMMU_DOMAIN_DMA",
-				 iommu_def_domain_type);
+				 type);
 		}
 	}
 
diff --git a/include/linux/iommu.h b/include/linux/iommu.h
index 7ef8b0bda695..1f027b07e499 100644
--- a/include/linux/iommu.h
+++ b/include/linux/iommu.h
@@ -248,6 +248,10 @@ struct iommu_iotlb_gather {
  * @cache_invalidate: invalidate translation caches
  * @sva_bind_gpasid: bind guest pasid and mm
  * @sva_unbind_gpasid: unbind guest pasid and mm
+ * @def_domain_type: device default domain type, return value:
+ *		- IOMMU_DOMAIN_IDENTITY: must use an identity domain
+ *		- IOMMU_DOMAIN_DMA: must use a dma domain
+ *		- 0: use the default setting
  * @pgsize_bitmap: bitmap of all possible supported page sizes
  * @owner: Driver module providing these ops
  */
@@ -318,6 +322,8 @@ struct iommu_ops {
 
 	int (*sva_unbind_gpasid)(struct device *dev, int pasid);
 
+	int (*def_domain_type)(struct device *dev);
+
 	unsigned long pgsize_bitmap;
 	struct module *owner;
 };
-- 
2.17.1


_______________________________________________
Linux-mediatek mailing list
Linux-mediatek@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-mediatek

  parent reply	other threads:[~2020-04-14 13:15 UTC|newest]

Thread overview: 233+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <CGME20200414131600eucas1p16f1ff6aedb780eb795a770dc08e5dec5@eucas1p1.samsung.com>
2020-04-14 13:15 ` [PATCH v2 00/33] iommu: Move iommu_group setup to IOMMU core code Joerg Roedel
2020-04-14 13:15   ` Joerg Roedel
2020-04-14 13:15   ` Joerg Roedel
2020-04-14 13:15   ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 01/33] iommu: Move default domain allocation to separate function Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` Joerg Roedel [this message]
2020-04-14 13:15     ` [PATCH v2 02/33] iommu: Add def_domain_type() callback in iommu_ops Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 04/33] iommu/vt-d: Wire up iommu_ops->def_domain_type Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 05/33] iommu/amd: Remove dma_mask check from check_device() Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 07/33] iommu: Add probe_device() and remove_device() call-backs Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
     [not found]     ` <20200414131542.25608-8-joro-zLv9SwRftAIdnm+yROfE0A@public.gmane.org>
2020-04-15  6:36       ` Lu Baolu
2020-04-15  6:36         ` Lu Baolu
2020-04-15  6:36         ` Lu Baolu
2020-04-15  6:36         ` Lu Baolu
     [not found]         ` <0ad37581-b464-30ac-c503-4c0daaf43867-VuQAYsv1563Yd54FQh9/CA@public.gmane.org>
2020-04-15 12:31           ` Joerg Roedel
2020-04-15 12:31             ` Joerg Roedel
2020-04-15 12:31             ` Joerg Roedel
2020-04-15 12:31             ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 13/33] iommu: Export bus_iommu_probe() and make is safe for re-probing Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
     [not found]     ` <20200414131542.25608-14-joro-zLv9SwRftAIdnm+yROfE0A@public.gmane.org>
2020-04-15  6:10       ` Lu Baolu
2020-04-15  6:10         ` Lu Baolu
2020-04-15  6:10         ` Lu Baolu
2020-04-15  6:10         ` Lu Baolu
     [not found]         ` <1853992c-47a6-3724-812c-a52558c13732-VuQAYsv1563Yd54FQh9/CA@public.gmane.org>
2020-04-15 12:29           ` Joerg Roedel
2020-04-15 12:29             ` Joerg Roedel
2020-04-15 12:29             ` Joerg Roedel
2020-04-15 12:29             ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 14/33] iommu/amd: Remove dev_data->passthrough Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 16/33] iommu/vt-d: Convert to probe/release_device() call-backs Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 17/33] iommu/arm-smmu: " Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 18/33] iommu/pamu: " Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 19/33] iommu/s390: " Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 21/33] iommu/msm: " Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 24/33] iommu/qcom: " Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
     [not found]   ` <20200414131542.25608-1-joro-zLv9SwRftAIdnm+yROfE0A@public.gmane.org>
2020-04-14 13:15     ` [PATCH v2 03/33] iommu/amd: Implement iommu_ops->def_domain_type call-back Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 06/33] iommu/amd: Return -ENODEV in add_device when device is not handled by IOMMU Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 08/33] iommu: Move default domain allocation to iommu_probe_device() Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 09/33] iommu: Keep a list of allocated groups in __iommu_probe_device() Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 10/33] iommu: Move new probe_device path to separate function Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 11/33] iommu: Split off default domain allocation from group assignment Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 12/33] iommu: Move iommu_group_create_direct_mappings() out of iommu_group_add_device() Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 15/33] iommu/amd: Convert to probe/release_device() call-backs Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 20/33] iommu/virtio: " Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 22/33] iommu/mediatek: " Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 23/33] iommu/mediatek-v1 " Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-05-15  7:44       ` Yong Wu
2020-05-15  7:44         ` Yong Wu
2020-05-15  7:44         ` Yong Wu
2020-05-15  7:44         ` Yong Wu
2020-05-15 10:07         ` Joerg Roedel
2020-05-15 10:07           ` Joerg Roedel
2020-05-15 10:07           ` Joerg Roedel
2020-05-18  6:51           ` Yong Wu
2020-05-18  6:51             ` Yong Wu
2020-05-18  6:51             ` Yong Wu
2020-05-18  6:51             ` Yong Wu
2020-05-18 13:55             ` Joerg Roedel
2020-05-18 13:55               ` Joerg Roedel
2020-05-18 13:55               ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 25/33] iommu/rockchip: " Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 28/33] iommu/omap: Remove orphan_dev tracking Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 30/33] iommu/exynos: Use first SYSMMU in controllers list for IOMMU core Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 31/33] iommu/exynos: Convert to probe/release_device() call-backs Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 32/33] iommu: Remove add_device()/remove_device() code-paths Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15     ` [PATCH v2 33/33] iommu: Unexport iommu_group_get_for_dev() Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-14 13:15       ` Joerg Roedel
2020-04-16 11:48     ` [PATCH v2 00/33] iommu: Move iommu_group setup to IOMMU core code Marek Szyprowski
2020-04-16 11:48       ` Marek Szyprowski
2020-04-16 11:48       ` Marek Szyprowski
2020-04-16 11:48       ` Marek Szyprowski
2020-04-17  1:03     ` Daniel Drake
2020-04-17  1:03       ` Daniel Drake
2020-04-17  1:03       ` Daniel Drake
2020-04-17  1:03       ` Daniel Drake
     [not found]       ` <20200417010335.31739-1-drake-6IF/jdPJHihWk0Htik3J/w@public.gmane.org>
2020-04-17  1:14         ` Derrick, Jonathan
2020-04-17  1:14           ` Derrick, Jonathan
2020-04-17  1:14           ` Derrick, Jonathan
2020-04-17  1:14           ` Derrick, Jonathan
2020-04-17  1:14           ` Derrick, Jonathan
     [not found]           ` <aafed865c0254934986528b3ce9c4d34ff2fccad.camel-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>
2020-04-18 12:44             ` joro-zLv9SwRftAIdnm+yROfE0A
2020-04-18 12:44               ` joro
2020-04-18 12:44               ` joro
2020-04-18 12:44               ` joro
2020-04-18 12:44               ` joro
2020-05-29 22:16     ` Jerry Snitselaar
2020-05-29 22:16       ` Jerry Snitselaar
2020-05-29 22:16       ` Jerry Snitselaar
2020-05-29 22:16       ` Jerry Snitselaar
2020-06-01 10:42       ` Jerry Snitselaar
2020-06-01 10:42         ` Jerry Snitselaar
2020-06-01 10:42         ` Jerry Snitselaar
2020-06-01 10:42         ` Jerry Snitselaar
2020-06-01 13:17         ` Jerry Snitselaar
2020-06-01 13:17         ` Jerry Snitselaar
2020-06-01 13:17         ` Jerry Snitselaar
2020-06-01 13:17         ` Jerry Snitselaar
2020-06-01 13:17           ` Jerry Snitselaar
2020-06-01 13:17           ` Jerry Snitselaar
2020-06-01 13:17           ` Jerry Snitselaar
2020-06-01 23:20           ` Lu Baolu
2020-06-01 23:20             ` Lu Baolu
2020-06-01 23:20             ` Lu Baolu
2020-06-01 23:20             ` Lu Baolu
2020-06-01 23:20           ` Lu Baolu
2020-06-01 23:20           ` Lu Baolu
2020-06-01 23:20           ` Lu Baolu
2020-06-01 23:16         ` Lu Baolu
2020-06-01 23:16           ` Lu Baolu
2020-06-01 23:16           ` Lu Baolu
2020-06-01 23:16           ` Lu Baolu
2020-06-02  0:02           ` Jerry Snitselaar
2020-06-02  0:02             ` Jerry Snitselaar
2020-06-02  0:02             ` Jerry Snitselaar
2020-06-02  0:02             ` Jerry Snitselaar
2020-06-02 14:23             ` Joerg Roedel
2020-06-02 14:23               ` Joerg Roedel
2020-06-02 14:23               ` Joerg Roedel
2020-06-02 14:23               ` Joerg Roedel
2020-06-02 16:38               ` Jerry Snitselaar
2020-06-02 16:38                 ` Jerry Snitselaar
2020-06-02 16:38                 ` Jerry Snitselaar
2020-06-02 16:38                 ` Jerry Snitselaar
2020-06-02 21:17                 ` Jerry Snitselaar
2020-06-02 21:17                   ` Jerry Snitselaar
2020-06-02 21:17                   ` Jerry Snitselaar
2020-06-02 21:17                   ` Jerry Snitselaar
2020-06-02 21:17                 ` Jerry Snitselaar
2020-06-02 21:17                 ` Jerry Snitselaar
2020-06-02 21:17                 ` Jerry Snitselaar
2020-06-02 21:17                 ` Jerry Snitselaar
2020-06-02 14:23             ` Joerg Roedel
2020-06-02 14:23             ` Joerg Roedel
2020-06-02 14:23             ` Joerg Roedel
2020-06-01 10:42       ` Jerry Snitselaar
2020-06-01 10:42       ` Jerry Snitselaar
2020-06-01 10:42       ` Jerry Snitselaar
2020-06-01 10:42       ` Jerry Snitselaar
2020-04-14 13:15   ` [PATCH v2 26/33] iommu/tegra: Convert to probe/release_device() call-backs Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 27/33] iommu/renesas: " Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15   ` [PATCH v2 29/33] iommu/omap: " Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel
2020-04-14 13:15     ` Joerg Roedel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20200414131542.25608-3-joro@8bytes.org \
    --to=joro@8bytes.org \
    --cc=agross@kernel.org \
    --cc=baolu.lu@linux.intel.com \
    --cc=bjorn.andersson@linaro.org \
    --cc=dwmw2@infradead.org \
    --cc=gerald.schaefer@de.ibm.com \
    --cc=heiko@sntech.de \
    --cc=iommu@lists.linux-foundation.org \
    --cc=jean-philippe@linaro.org \
    --cc=jonathanh@nvidia.com \
    --cc=jroedel@suse.de \
    --cc=kgene@kernel.org \
    --cc=krzk@kernel.org \
    --cc=linux-arm-msm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mediatek@lists.infradead.org \
    --cc=linux-rockchip@lists.infradead.org \
    --cc=linux-s390@vger.kernel.org \
    --cc=linux-samsung-soc@vger.kernel.org \
    --cc=linux-tegra@vger.kernel.org \
    --cc=m.szyprowski@samsung.com \
    --cc=matthias.bgg@gmail.com \
    --cc=robdclark@gmail.com \
    --cc=robin.murphy@arm.com \
    --cc=sai.praneeth.prakhya@intel.com \
    --cc=thierry.reding@gmail.com \
    --cc=virtualization@lists.linux-foundation.org \
    --cc=will@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.