Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3918569ybi; Mon, 27 May 2019 08:02:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqzHRo7tjwuB85wz2Vp5dvd/X9Xo8op0t6SpMVH1rl4S4K/FopmCpH2Cyix6RQ+RyM2Ya9GY X-Received: by 2002:a17:90a:bb8d:: with SMTP id v13mr31336567pjr.79.1558969352403; Mon, 27 May 2019 08:02:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558969352; cv=none; d=google.com; s=arc-20160816; b=U8jDP/IbZJmslmHKGphjdVxmoIRelxOInik1gzzUFQ8WKBzhpyIFjsXqbvZwWyUljC O5tGFXP2FyRR2iPl5cUxc5MccPY1k738/Pqppl4j3Elr+eBjnOAmMQK7/Vl44TeR6AGP ZoTe6KhIxaHE1hq8BlQjynHbw/uiRSYnDzw2jFADj5YzXBOOENEdgO/sRQ/f4IEOdLT0 62uTsJJjQJnI9gTvucKsFbB0Y5MQ24WDlnucXmEL8TAwRTVGiM7blNriGqC8PvlDYwY8 PIjnZqzeURQ7zAVBWW+r5r5NpovMfMdU7eY/+VmIquxBegQsvkI38eIBRmq1tfTa1ugV DT0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=9vhxWHUFPUQjswy9z4jvEuaxTVmSO6eJRmUXmzg7J0s=; b=UniYXlSAbya65v7xc+QR/CZJ7E30niRgXSWA9xrYRYHiR42Vy/vPexJRthtqs+EREr tAror5Izbz6HRRhfG0Xl5kaD2Nrxkkju1bxmp65nFKcWgHt9lHaDlKZlLvOpSeDG7h3o HZrJCzoDIUjem+x2Y0JTLtZF1Gavogs0/q6kx5AflmHGwd2vZjhvKKj7W5s9CwU7mbOi GY9fbj2RFTTz5hGG1lZwBS8tzNnq08BtImoSebvCjMyXRqgarNAUAZi9fRWK7lCqqLuw M8ooOk89oBNdUAePf4S9dLGWhgtCikkVgrLK5MXAfdRwz/QZiZwo8pZcGGdszNKvKq7R GHzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n6si19402681pla.380.2019.05.27.08.02.16; Mon, 27 May 2019 08:02:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726964AbfE0PAh (ORCPT + 99 others); Mon, 27 May 2019 11:00:37 -0400 Received: from 8bytes.org ([81.169.241.247]:40352 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726291AbfE0PAg (ORCPT ); Mon, 27 May 2019 11:00:36 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id 99DA0244; Mon, 27 May 2019 17:00:35 +0200 (CEST) Date: Mon, 27 May 2019 17:00:34 +0200 From: Joerg Roedel To: Lu Baolu Cc: David Woodhouse , ashok.raj@intel.com, jacob.jun.pan@intel.com, kevin.tian@intel.com, jamessewart@arista.com, tmurphy@arista.com, dima@arista.com, sai.praneeth.prakhya@intel.com, iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v4 00/15] iommu/vt-d: Delegate DMA domain to generic iommu Message-ID: <20190527150033.GC12745@8bytes.org> References: <20190525054136.27810-1-baolu.lu@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190525054136.27810-1-baolu.lu@linux.intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hey James, Lu Baolu, On Sat, May 25, 2019 at 01:41:21PM +0800, Lu Baolu wrote: > James Sewart (1): > iommu/vt-d: Implement apply_resv_region iommu ops entry > > Lu Baolu (14): > iommu: Add API to request DMA domain for device > iommu/vt-d: Expose ISA direct mapping region via > iommu_get_resv_regions > iommu/vt-d: Enable DMA remapping after rmrr mapped > iommu/vt-d: Add device_def_domain_type() helper > iommu/vt-d: Delegate the identity domain to upper layer > iommu/vt-d: Delegate the dma domain to upper layer > iommu/vt-d: Identify default domains replaced with private > iommu/vt-d: Handle 32bit device with identity default domain > iommu/vt-d: Probe DMA-capable ACPI name space devices > iommu/vt-d: Implement is_attach_deferred iommu ops entry > iommu/vt-d: Cleanup get_valid_domain_for_dev() > iommu/vt-d: Remove startup parameter from device_def_domain_type() > iommu/vt-d: Remove duplicated code for device hotplug > iommu/vt-d: Remove static identity map code Thanks for working on this. I think it is time to give it some testing in linux-next, so I applied it to my tree. Fingers crossed this can make it into v5.3 :) Regards, Joerg