From: Auger Eric <eric.auger@redhat.com> To: Jacob Pan <jacob.jun.pan@linux.intel.com>, iommu@lists.linux-foundation.org, LKML <linux-kernel@vger.kernel.org>, Joerg Roedel <joro@8bytes.org>, David Woodhouse <dwmw2@infradead.org>, Alex Williamson <alex.williamson@redhat.com>, Jean-Philippe Brucker <jean-philippe.brucker@arm.com> Cc: Yi Liu <yi.l.liu@intel.com>, "Tian, Kevin" <kevin.tian@intel.com>, Raj Ashok <ashok.raj@intel.com>, Christoph Hellwig <hch@infradead.org>, Lu Baolu <baolu.lu@linux.intel.com>, Andriy Shevchenko <andriy.shevchenko@linux.intel.com> Subject: Re: [PATCH v2 11/19] iommu/vt-d: Replace Intel specific PASID allocator with IOASID Date: Thu, 25 Apr 2019 12:04:01 +0200 [thread overview] Message-ID: <e542fd95-acbe-05e9-e441-27dff752c21a@redhat.com> (raw) In-Reply-To: <1556062279-64135-12-git-send-email-jacob.jun.pan@linux.intel.com> Hi Jacob, On 4/24/19 1:31 AM, Jacob Pan wrote: > Make use of generic IOASID code to manage PASID allocation, > free, and lookup. > > Signed-off-by: Jacob Pan <jacob.jun.pan@linux.intel.com> > --- > drivers/iommu/Kconfig | 1 + > drivers/iommu/intel-iommu.c | 9 ++++----- > drivers/iommu/intel-pasid.c | 36 ------------------------------------ > drivers/iommu/intel-svm.c | 41 ++++++++++++++++++++++++----------------- > 4 files changed, 29 insertions(+), 58 deletions(-) > > diff --git a/drivers/iommu/Kconfig b/drivers/iommu/Kconfig > index 6f07f3b..7f92009 100644 > --- a/drivers/iommu/Kconfig > +++ b/drivers/iommu/Kconfig > @@ -204,6 +204,7 @@ config INTEL_IOMMU_SVM > bool "Support for Shared Virtual Memory with Intel IOMMU" > depends on INTEL_IOMMU && X86 > select PCI_PASID > + select IOASID > select MMU_NOTIFIER > help > Shared Virtual Memory (SVM) provides a facility for devices > diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c > index ec6f22d..785330a 100644 > --- a/drivers/iommu/intel-iommu.c > +++ b/drivers/iommu/intel-iommu.c > @@ -5153,7 +5153,7 @@ static void auxiliary_unlink_device(struct dmar_domain *domain, > domain->auxd_refcnt--; > > if (!domain->auxd_refcnt && domain->default_pasid > 0) > - intel_pasid_free_id(domain->default_pasid); > + ioasid_free(domain->default_pasid); > } > > static int aux_domain_add_dev(struct dmar_domain *domain, > @@ -5171,9 +5171,8 @@ static int aux_domain_add_dev(struct dmar_domain *domain, > if (domain->default_pasid <= 0) { > int pasid; > > - pasid = intel_pasid_alloc_id(domain, PASID_MIN, > - pci_max_pasids(to_pci_dev(dev)), > - GFP_KERNEL); > + pasid = ioasid_alloc(NULL, PASID_MIN, pci_max_pasids(to_pci_dev(dev)) - 1, > + domain); > if (pasid <= 0) { ioasid_t is a uint and returns INVALID_IOASID on error. Wouldn't it be simpler to make ioasid_alloc return an int? > pr_err("Can't allocate default pasid\n"); > return -ENODEV; > @@ -5210,7 +5209,7 @@ static int aux_domain_add_dev(struct dmar_domain *domain, > spin_unlock(&iommu->lock); > spin_unlock_irqrestore(&device_domain_lock, flags); > if (!domain->auxd_refcnt && domain->default_pasid > 0) > - intel_pasid_free_id(domain->default_pasid); > + ioasid_free(domain->default_pasid); > > return ret; > } > diff --git a/drivers/iommu/intel-pasid.c b/drivers/iommu/intel-pasid.c > index 5b1d3be..d339e8f 100644 > --- a/drivers/iommu/intel-pasid.c > +++ b/drivers/iommu/intel-pasid.c > @@ -26,42 +26,6 @@ > */ > static DEFINE_SPINLOCK(pasid_lock); > u32 intel_pasid_max_id = PASID_MAX; > -static DEFINE_IDR(pasid_idr); > - > -int intel_pasid_alloc_id(void *ptr, int start, int end, gfp_t gfp) > -{ > - int ret, min, max; > - > - min = max_t(int, start, PASID_MIN); > - max = min_t(int, end, intel_pasid_max_id); > - > - WARN_ON(in_interrupt()); > - idr_preload(gfp); > - spin_lock(&pasid_lock); > - ret = idr_alloc(&pasid_idr, ptr, min, max, GFP_ATOMIC); > - spin_unlock(&pasid_lock); > - idr_preload_end(); > - > - return ret; > -} > - > -void intel_pasid_free_id(int pasid) > -{ > - spin_lock(&pasid_lock); > - idr_remove(&pasid_idr, pasid); > - spin_unlock(&pasid_lock); > -} > - > -void *intel_pasid_lookup_id(int pasid) > -{ > - void *p; > - > - spin_lock(&pasid_lock); > - p = idr_find(&pasid_idr, pasid); > - spin_unlock(&pasid_lock); > - > - return p; > -} > > int vcmd_alloc_pasid(struct intel_iommu *iommu, unsigned int *pasid) > { > diff --git a/drivers/iommu/intel-svm.c b/drivers/iommu/intel-svm.c > index 8f87304..8fff212 100644 > --- a/drivers/iommu/intel-svm.c > +++ b/drivers/iommu/intel-svm.c > @@ -25,6 +25,7 @@ > #include <linux/dmar.h> > #include <linux/interrupt.h> > #include <linux/mm_types.h> > +#include <linux/ioasid.h> > #include <asm/page.h> > > #include "intel-pasid.h" > @@ -211,7 +212,9 @@ static void intel_mm_release(struct mmu_notifier *mn, struct mm_struct *mm) > rcu_read_lock(); > list_for_each_entry_rcu(sdev, &svm->devs, list) { > intel_pasid_tear_down_entry(svm->iommu, sdev->dev, svm->pasid); > - intel_flush_svm_range_dev(svm, sdev, 0, -1, 0, !svm->mm)> + /* for emulated iommu, PASID cache invalidation implies IOTLB/DTLB */ > + if (!cap_caching_mode(svm->iommu->cap)) > + intel_flush_svm_range_dev(svm, sdev, 0, -1, 0, !svm->mm); This change is not documented in the commit message. Isn't it a separate fix? > } > rcu_read_unlock(); > > @@ -332,16 +335,15 @@ int intel_svm_bind_mm(struct device *dev, int *pasid, int flags, struct svm_dev_ > if (pasid_max > intel_pasid_max_id) > pasid_max = intel_pasid_max_id; > > - /* Do not use PASID 0 in caching mode (virtualised IOMMU) */ > - ret = intel_pasid_alloc_id(svm, > - !!cap_caching_mode(iommu->cap), > - pasid_max - 1, GFP_KERNEL); > - if (ret < 0) { > + /* Do not use PASID 0, reserved for RID to PASID */ > + svm->pasid = ioasid_alloc(NULL, PASID_MIN, > + pasid_max - 1, svm); the fact the max is not decremented compared to intel_pasid_alloc_id looks suspicious to me (exclusive to inclusive move). I guess it is a fix in which case this may be documented in the commit msg? > + if (svm->pasid == INVALID_IOASID) { > kfree(svm); > kfree(sdev); > + ret = ENOSPC; -ENOSPC > goto out; > } > - svm->pasid = ret; > svm->notifier.ops = &intel_mmuops; > svm->mm = mm; > svm->flags = flags; > @@ -351,7 +353,7 @@ int intel_svm_bind_mm(struct device *dev, int *pasid, int flags, struct svm_dev_ > if (mm) { > ret = mmu_notifier_register(&svm->notifier, mm); > if (ret) { > - intel_pasid_free_id(svm->pasid); > + ioasid_free(svm->pasid); > kfree(svm); > kfree(sdev); > goto out; > @@ -367,7 +369,7 @@ int intel_svm_bind_mm(struct device *dev, int *pasid, int flags, struct svm_dev_ > if (ret) { > if (mm) > mmu_notifier_unregister(&svm->notifier, mm); > - intel_pasid_free_id(svm->pasid); > + ioasid_free(svm->pasid); the ioasid_free returned value never is tested. Is it useful? > kfree(svm); > kfree(sdev); > goto out; > @@ -400,7 +402,12 @@ int intel_svm_unbind_mm(struct device *dev, int pasid) > if (!iommu) > goto out; > > - svm = intel_pasid_lookup_id(pasid); > + svm = ioasid_find(NULL, pasid, NULL); > + if (IS_ERR(svm)) { > + ret = PTR_ERR(svm); > + goto out; > + } > + > if (!svm) > goto out; > > @@ -422,7 +429,7 @@ int intel_svm_unbind_mm(struct device *dev, int pasid) > kfree_rcu(sdev, rcu); > > if (list_empty(&svm->devs)) { > - intel_pasid_free_id(svm->pasid); > + ioasid_free(svm->pasid); > if (svm->mm) > mmu_notifier_unregister(&svm->notifier, svm->mm); > > @@ -457,10 +464,11 @@ int intel_svm_is_pasid_valid(struct device *dev, int pasid) > if (!iommu) > goto out; > > - svm = intel_pasid_lookup_id(pasid); > - if (!svm) > + svm = ioasid_find(NULL, pasid, NULL); > + if (IS_ERR(svm)) { > + ret = PTR_ERR(svm); > goto out; > - > + } > /* init_mm is used in this case */ > if (!svm->mm) > ret = 1; > @@ -567,13 +575,12 @@ static irqreturn_t prq_event_thread(int irq, void *d) > > if (!svm || svm->pasid != req->pasid) { > rcu_read_lock(); > - svm = intel_pasid_lookup_id(req->pasid); > + svm = ioasid_find(NULL, req->pasid, NULL); > /* It *can't* go away, because the driver is not permitted > * to unbind the mm while any page faults are outstanding. > * So we only need RCU to protect the internal idr code. */ > rcu_read_unlock(); > - > - if (!svm) { > + if (IS_ERR(svm) || !svm) { > pr_err("%s: Page request for invalid PASID %d: %08llx %08llx\n", > iommu->name, req->pasid, ((unsigned long long *)req)[0], > ((unsigned long long *)req)[1]); > Thanks Eric
WARNING: multiple messages have this Message-ID (diff)
From: Auger Eric <eric.auger@redhat.com> To: Jacob Pan <jacob.jun.pan@linux.intel.com>, iommu@lists.linux-foundation.org, LKML <linux-kernel@vger.kernel.org>, Joerg Roedel <joro@8bytes.org>, David Woodhouse <dwmw2@infradead.org>, Alex Williamson <alex.williamson@redhat.com>, Jean-Philippe Brucker <jean-philippe.brucker@arm.com> Cc: "Tian, Kevin" <kevin.tian@intel.com>, Raj Ashok <ashok.raj@intel.com>, Andriy Shevchenko <andriy.shevchenko@linux.intel.com> Subject: Re: [PATCH v2 11/19] iommu/vt-d: Replace Intel specific PASID allocator with IOASID Date: Thu, 25 Apr 2019 12:04:01 +0200 [thread overview] Message-ID: <e542fd95-acbe-05e9-e441-27dff752c21a@redhat.com> (raw) Message-ID: <20190425100401.zqGQiTaZqxPgR5wWOWwQtKSRIUizI1lTNkGjSQSG-pY@z> (raw) In-Reply-To: <1556062279-64135-12-git-send-email-jacob.jun.pan@linux.intel.com> Hi Jacob, On 4/24/19 1:31 AM, Jacob Pan wrote: > Make use of generic IOASID code to manage PASID allocation, > free, and lookup. > > Signed-off-by: Jacob Pan <jacob.jun.pan@linux.intel.com> > --- > drivers/iommu/Kconfig | 1 + > drivers/iommu/intel-iommu.c | 9 ++++----- > drivers/iommu/intel-pasid.c | 36 ------------------------------------ > drivers/iommu/intel-svm.c | 41 ++++++++++++++++++++++++----------------- > 4 files changed, 29 insertions(+), 58 deletions(-) > > diff --git a/drivers/iommu/Kconfig b/drivers/iommu/Kconfig > index 6f07f3b..7f92009 100644 > --- a/drivers/iommu/Kconfig > +++ b/drivers/iommu/Kconfig > @@ -204,6 +204,7 @@ config INTEL_IOMMU_SVM > bool "Support for Shared Virtual Memory with Intel IOMMU" > depends on INTEL_IOMMU && X86 > select PCI_PASID > + select IOASID > select MMU_NOTIFIER > help > Shared Virtual Memory (SVM) provides a facility for devices > diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c > index ec6f22d..785330a 100644 > --- a/drivers/iommu/intel-iommu.c > +++ b/drivers/iommu/intel-iommu.c > @@ -5153,7 +5153,7 @@ static void auxiliary_unlink_device(struct dmar_domain *domain, > domain->auxd_refcnt--; > > if (!domain->auxd_refcnt && domain->default_pasid > 0) > - intel_pasid_free_id(domain->default_pasid); > + ioasid_free(domain->default_pasid); > } > > static int aux_domain_add_dev(struct dmar_domain *domain, > @@ -5171,9 +5171,8 @@ static int aux_domain_add_dev(struct dmar_domain *domain, > if (domain->default_pasid <= 0) { > int pasid; > > - pasid = intel_pasid_alloc_id(domain, PASID_MIN, > - pci_max_pasids(to_pci_dev(dev)), > - GFP_KERNEL); > + pasid = ioasid_alloc(NULL, PASID_MIN, pci_max_pasids(to_pci_dev(dev)) - 1, > + domain); > if (pasid <= 0) { ioasid_t is a uint and returns INVALID_IOASID on error. Wouldn't it be simpler to make ioasid_alloc return an int? > pr_err("Can't allocate default pasid\n"); > return -ENODEV; > @@ -5210,7 +5209,7 @@ static int aux_domain_add_dev(struct dmar_domain *domain, > spin_unlock(&iommu->lock); > spin_unlock_irqrestore(&device_domain_lock, flags); > if (!domain->auxd_refcnt && domain->default_pasid > 0) > - intel_pasid_free_id(domain->default_pasid); > + ioasid_free(domain->default_pasid); > > return ret; > } > diff --git a/drivers/iommu/intel-pasid.c b/drivers/iommu/intel-pasid.c > index 5b1d3be..d339e8f 100644 > --- a/drivers/iommu/intel-pasid.c > +++ b/drivers/iommu/intel-pasid.c > @@ -26,42 +26,6 @@ > */ > static DEFINE_SPINLOCK(pasid_lock); > u32 intel_pasid_max_id = PASID_MAX; > -static DEFINE_IDR(pasid_idr); > - > -int intel_pasid_alloc_id(void *ptr, int start, int end, gfp_t gfp) > -{ > - int ret, min, max; > - > - min = max_t(int, start, PASID_MIN); > - max = min_t(int, end, intel_pasid_max_id); > - > - WARN_ON(in_interrupt()); > - idr_preload(gfp); > - spin_lock(&pasid_lock); > - ret = idr_alloc(&pasid_idr, ptr, min, max, GFP_ATOMIC); > - spin_unlock(&pasid_lock); > - idr_preload_end(); > - > - return ret; > -} > - > -void intel_pasid_free_id(int pasid) > -{ > - spin_lock(&pasid_lock); > - idr_remove(&pasid_idr, pasid); > - spin_unlock(&pasid_lock); > -} > - > -void *intel_pasid_lookup_id(int pasid) > -{ > - void *p; > - > - spin_lock(&pasid_lock); > - p = idr_find(&pasid_idr, pasid); > - spin_unlock(&pasid_lock); > - > - return p; > -} > > int vcmd_alloc_pasid(struct intel_iommu *iommu, unsigned int *pasid) > { > diff --git a/drivers/iommu/intel-svm.c b/drivers/iommu/intel-svm.c > index 8f87304..8fff212 100644 > --- a/drivers/iommu/intel-svm.c > +++ b/drivers/iommu/intel-svm.c > @@ -25,6 +25,7 @@ > #include <linux/dmar.h> > #include <linux/interrupt.h> > #include <linux/mm_types.h> > +#include <linux/ioasid.h> > #include <asm/page.h> > > #include "intel-pasid.h" > @@ -211,7 +212,9 @@ static void intel_mm_release(struct mmu_notifier *mn, struct mm_struct *mm) > rcu_read_lock(); > list_for_each_entry_rcu(sdev, &svm->devs, list) { > intel_pasid_tear_down_entry(svm->iommu, sdev->dev, svm->pasid); > - intel_flush_svm_range_dev(svm, sdev, 0, -1, 0, !svm->mm)> + /* for emulated iommu, PASID cache invalidation implies IOTLB/DTLB */ > + if (!cap_caching_mode(svm->iommu->cap)) > + intel_flush_svm_range_dev(svm, sdev, 0, -1, 0, !svm->mm); This change is not documented in the commit message. Isn't it a separate fix? > } > rcu_read_unlock(); > > @@ -332,16 +335,15 @@ int intel_svm_bind_mm(struct device *dev, int *pasid, int flags, struct svm_dev_ > if (pasid_max > intel_pasid_max_id) > pasid_max = intel_pasid_max_id; > > - /* Do not use PASID 0 in caching mode (virtualised IOMMU) */ > - ret = intel_pasid_alloc_id(svm, > - !!cap_caching_mode(iommu->cap), > - pasid_max - 1, GFP_KERNEL); > - if (ret < 0) { > + /* Do not use PASID 0, reserved for RID to PASID */ > + svm->pasid = ioasid_alloc(NULL, PASID_MIN, > + pasid_max - 1, svm); the fact the max is not decremented compared to intel_pasid_alloc_id looks suspicious to me (exclusive to inclusive move). I guess it is a fix in which case this may be documented in the commit msg? > + if (svm->pasid == INVALID_IOASID) { > kfree(svm); > kfree(sdev); > + ret = ENOSPC; -ENOSPC > goto out; > } > - svm->pasid = ret; > svm->notifier.ops = &intel_mmuops; > svm->mm = mm; > svm->flags = flags; > @@ -351,7 +353,7 @@ int intel_svm_bind_mm(struct device *dev, int *pasid, int flags, struct svm_dev_ > if (mm) { > ret = mmu_notifier_register(&svm->notifier, mm); > if (ret) { > - intel_pasid_free_id(svm->pasid); > + ioasid_free(svm->pasid); > kfree(svm); > kfree(sdev); > goto out; > @@ -367,7 +369,7 @@ int intel_svm_bind_mm(struct device *dev, int *pasid, int flags, struct svm_dev_ > if (ret) { > if (mm) > mmu_notifier_unregister(&svm->notifier, mm); > - intel_pasid_free_id(svm->pasid); > + ioasid_free(svm->pasid); the ioasid_free returned value never is tested. Is it useful? > kfree(svm); > kfree(sdev); > goto out; > @@ -400,7 +402,12 @@ int intel_svm_unbind_mm(struct device *dev, int pasid) > if (!iommu) > goto out; > > - svm = intel_pasid_lookup_id(pasid); > + svm = ioasid_find(NULL, pasid, NULL); > + if (IS_ERR(svm)) { > + ret = PTR_ERR(svm); > + goto out; > + } > + > if (!svm) > goto out; > > @@ -422,7 +429,7 @@ int intel_svm_unbind_mm(struct device *dev, int pasid) > kfree_rcu(sdev, rcu); > > if (list_empty(&svm->devs)) { > - intel_pasid_free_id(svm->pasid); > + ioasid_free(svm->pasid); > if (svm->mm) > mmu_notifier_unregister(&svm->notifier, svm->mm); > > @@ -457,10 +464,11 @@ int intel_svm_is_pasid_valid(struct device *dev, int pasid) > if (!iommu) > goto out; > > - svm = intel_pasid_lookup_id(pasid); > - if (!svm) > + svm = ioasid_find(NULL, pasid, NULL); > + if (IS_ERR(svm)) { > + ret = PTR_ERR(svm); > goto out; > - > + } > /* init_mm is used in this case */ > if (!svm->mm) > ret = 1; > @@ -567,13 +575,12 @@ static irqreturn_t prq_event_thread(int irq, void *d) > > if (!svm || svm->pasid != req->pasid) { > rcu_read_lock(); > - svm = intel_pasid_lookup_id(req->pasid); > + svm = ioasid_find(NULL, req->pasid, NULL); > /* It *can't* go away, because the driver is not permitted > * to unbind the mm while any page faults are outstanding. > * So we only need RCU to protect the internal idr code. */ > rcu_read_unlock(); > - > - if (!svm) { > + if (IS_ERR(svm) || !svm) { > pr_err("%s: Page request for invalid PASID %d: %08llx %08llx\n", > iommu->name, req->pasid, ((unsigned long long *)req)[0], > ((unsigned long long *)req)[1]); > Thanks Eric _______________________________________________ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/iommu
next prev parent reply other threads:[~2019-04-25 10:04 UTC|newest] Thread overview: 161+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-04-23 23:31 [PATCH v2 00/19] Shared virtual address IOMMU and VT-d support Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 01/19] driver core: add per device iommu param Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 02/19] iommu: introduce device fault data Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-25 12:46 ` Jean-Philippe Brucker 2019-04-25 12:46 ` Jean-Philippe Brucker 2019-04-25 13:21 ` Auger Eric 2019-04-25 13:21 ` Auger Eric 2019-04-25 14:33 ` Jean-Philippe Brucker 2019-04-25 14:33 ` Jean-Philippe Brucker 2019-04-25 18:07 ` Jacob Pan 2019-04-25 18:07 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 03/19] iommu: introduce device fault report API Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 04/19] iommu: Introduce attach/detach_pasid_table API Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 05/19] iommu: Introduce cache_invalidate API Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 06/19] drivers core: Add I/O ASID allocator Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-24 6:19 ` Christoph Hellwig 2019-04-24 6:19 ` Christoph Hellwig 2019-04-25 18:19 ` Jacob Pan 2019-04-25 18:19 ` Jacob Pan 2019-04-25 18:19 ` Jacob Pan 2019-04-26 11:47 ` Jean-Philippe Brucker 2019-04-26 11:47 ` Jean-Philippe Brucker 2019-04-26 12:21 ` Christoph Hellwig 2019-04-26 12:21 ` Christoph Hellwig 2019-04-26 16:58 ` Jacob Pan 2019-04-26 16:58 ` Jacob Pan 2019-04-25 10:17 ` Auger Eric 2019-04-25 10:17 ` Auger Eric 2019-04-25 10:41 ` Jean-Philippe Brucker 2019-04-25 10:41 ` Jean-Philippe Brucker 2019-04-30 20:24 ` Jacob Pan 2019-04-30 20:24 ` Jacob Pan 2019-05-01 17:40 ` Jean-Philippe Brucker 2019-05-01 17:40 ` Jean-Philippe Brucker 2019-04-23 23:31 ` [PATCH v2 07/19] ioasid: Convert ioasid_idr to XArray Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 08/19] ioasid: Add custom IOASID allocator Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-25 10:03 ` Auger Eric 2019-04-25 10:03 ` Auger Eric 2019-04-25 21:29 ` Jacob Pan 2019-04-25 21:29 ` Jacob Pan 2019-04-26 9:06 ` Auger Eric 2019-04-26 9:06 ` Auger Eric 2019-04-26 15:19 ` Jacob Pan 2019-04-26 15:19 ` Jacob Pan 2019-05-06 17:59 ` Jacob Pan 2019-05-06 17:59 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 09/19] iommu/vt-d: Enlightened PASID allocation Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-24 17:27 ` Auger Eric 2019-04-24 17:27 ` Auger Eric 2019-04-24 17:27 ` Auger Eric 2019-04-25 7:12 ` Liu, Yi L 2019-04-25 7:12 ` Liu, Yi L 2019-04-25 7:40 ` Auger Eric 2019-04-25 7:40 ` Auger Eric 2019-04-25 23:01 ` Jacob Pan 2019-04-25 23:01 ` Jacob Pan 2019-04-25 23:01 ` Jacob Pan 2019-04-25 23:40 ` Jacob Pan 2019-04-25 23:40 ` Jacob Pan 2019-04-26 7:24 ` Auger Eric 2019-04-26 7:24 ` Auger Eric 2019-04-26 15:05 ` Jacob Pan 2019-04-26 15:05 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 10/19] iommu/vt-d: Add custom allocator for IOASID Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-24 17:27 ` Auger Eric 2019-04-24 17:27 ` Auger Eric 2019-04-24 17:27 ` Auger Eric 2019-04-26 20:11 ` Jacob Pan 2019-04-26 20:11 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 11/19] iommu/vt-d: Replace Intel specific PASID allocator with IOASID Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-25 10:04 ` Auger Eric [this message] 2019-04-25 10:04 ` Auger Eric [not found] ` <e542fd95-acbe-05e9-e441-27dff752c21a-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> 2019-04-26 21:01 ` Jacob Pan 2019-04-26 21:01 ` Jacob Pan 2019-04-27 8:38 ` Auger Eric 2019-04-27 8:38 ` Auger Eric 2019-04-29 10:00 ` Jean-Philippe Brucker 2019-04-29 10:00 ` Jean-Philippe Brucker 2019-04-23 23:31 ` [PATCH v2 12/19] iommu/vt-d: Move domain helper to header Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-24 17:27 ` Auger Eric 2019-04-24 17:27 ` Auger Eric 2019-04-24 17:27 ` Auger Eric 2019-04-23 23:31 ` [PATCH v2 13/19] iommu/vt-d: Add nested translation support Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-26 15:42 ` Auger Eric 2019-04-26 15:42 ` Auger Eric 2019-04-26 21:57 ` Jacob Pan 2019-04-26 21:57 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 14/19] iommu: Add guest PASID bind function Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-26 15:53 ` Auger Eric 2019-04-26 15:53 ` Auger Eric 2019-04-26 22:11 ` Jacob Pan 2019-04-26 22:11 ` Jacob Pan 2019-04-27 8:37 ` Auger Eric 2019-04-27 8:37 ` Auger Eric 2019-04-23 23:31 ` [PATCH v2 15/19] iommu/vt-d: Add bind guest PASID support Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-26 16:15 ` Auger Eric 2019-04-26 16:15 ` Auger Eric 2019-04-29 15:25 ` Jacob Pan 2019-04-29 15:25 ` Jacob Pan 2019-04-30 7:05 ` Auger Eric 2019-04-30 7:05 ` Auger Eric 2019-04-30 17:49 ` Jacob Pan 2019-04-30 17:49 ` Jacob Pan 2019-04-23 23:31 ` [PATCH v2 16/19] iommu/vtd: Clean up for SVM device list Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-26 16:19 ` Auger Eric 2019-04-26 16:19 ` Auger Eric 2019-04-23 23:31 ` [PATCH v2 17/19] iommu: Add max num of cache and granu types Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-26 16:22 ` Auger Eric 2019-04-26 16:22 ` Auger Eric 2019-04-29 16:17 ` Jacob Pan 2019-04-29 16:17 ` Jacob Pan 2019-04-30 5:15 ` Auger Eric 2019-04-30 5:15 ` Auger Eric 2019-04-23 23:31 ` [PATCH v2 18/19] iommu/vt-d: Support flushing more translation cache types Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-27 9:04 ` Auger Eric 2019-04-27 9:04 ` Auger Eric 2019-04-29 21:29 ` Jacob Pan 2019-04-29 21:29 ` Jacob Pan 2019-04-30 4:41 ` Auger Eric 2019-04-30 4:41 ` Auger Eric 2019-04-30 4:41 ` Auger Eric 2019-04-30 17:15 ` Jacob Pan 2019-04-30 17:15 ` Jacob Pan 2019-04-30 17:41 ` Auger Eric 2019-04-30 17:41 ` Auger Eric 2019-04-23 23:31 ` [PATCH v2 19/19] iommu/vt-d: Add svm/sva invalidate function Jacob Pan 2019-04-23 23:31 ` Jacob Pan 2019-04-26 17:23 ` Auger Eric 2019-04-26 17:23 ` Auger Eric 2019-04-29 22:41 ` Jacob Pan 2019-04-29 22:41 ` Jacob Pan 2019-04-30 6:57 ` Auger Eric 2019-04-30 6:57 ` Auger Eric 2019-04-30 17:22 ` Jacob Pan 2019-04-30 17:22 ` Jacob Pan 2019-04-30 17:36 ` Auger Eric 2019-04-30 17:36 ` Auger Eric
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=e542fd95-acbe-05e9-e441-27dff752c21a@redhat.com \ --to=eric.auger@redhat.com \ --cc=alex.williamson@redhat.com \ --cc=andriy.shevchenko@linux.intel.com \ --cc=ashok.raj@intel.com \ --cc=baolu.lu@linux.intel.com \ --cc=dwmw2@infradead.org \ --cc=hch@infradead.org \ --cc=iommu@lists.linux-foundation.org \ --cc=jacob.jun.pan@linux.intel.com \ --cc=jean-philippe.brucker@arm.com \ --cc=joro@8bytes.org \ --cc=kevin.tian@intel.com \ --cc=linux-kernel@vger.kernel.org \ --cc=yi.l.liu@intel.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.