Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp6087123ybe; Tue, 10 Sep 2019 13:19:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqx/E0zikfRF9kzZTANOHwd7jEW7v7AoGWNCBvJNYzNpYK9qg7F9KYWzhAPKlPEyPnuK19YB X-Received: by 2002:a17:906:3113:: with SMTP id 19mr26037299ejx.176.1568146743395; Tue, 10 Sep 2019 13:19:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568146743; cv=none; d=google.com; s=arc-20160816; b=LoFrbvXTkIHaddIHR6BsMLrGFkkFnjCydDD8meqcTBhytXXMnmrskeTWEl6XiiSVzX J9cML/uT9MY8Ubk20Qi0UKvKFY4zj6bzMsLbCpLJnzPw0jIMjzFdC+F9pwKTAwqPaLWT /2wg5hRCAfLYxEE80JaqHxvrnbOgh08PbLEUwoyKjF+1dpAxwUqh6csGr48xnQ3jel8q 9eQh7GymPr6JU0p/4+1sJRgxM7OTemEvSkzJsOCKV7GiY8FYYEAI7nF16/fESq7Brsc3 Vo0EPRAuNJqAUnmfUINILe/Yqmw86npW+rvY5VArZx1VtdOy6xe/y8n7g3+1/R4xGhDE gUgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=PJ7YQ3IUv1AdtCk6o8V6t1xW+LR4qEzR3fhzzCwC0Kw=; b=yoHqQq5KEcur9SJfGqQj86K0AwqH8bzf6A6JvEDZDxhY5FS+VjSYxPWAtRT13rvBpN kJKlj+QiVfQoqs5PXVQrCjGKPu3jp+nrSAXp73oaucBTkhMVZdPeOILJz80kjmkhzKm9 03XtmzaekSDvz4f6X5wm2N+jyJi8mc7K4QGeyqEeM14XvcbuQRypowej2o2NQiJyzhlk hLN9seTZPdMmDyFuJfzZv5WqXrs+K0Vk1YV+5K66wRZ1ioYMivishY5yuoKeqvPrGKpM 8F+jTcSu0wC5f1T9hkHU5dOkez5UPVyXeBaJ4Cj6y/Z/gGcBOXNlrr4/35EKRg0dej5f YzIw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v31si11512661edm.402.2019.09.10.13.18.39; Tue, 10 Sep 2019 13:19:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393685AbfIJOx0 (ORCPT + 99 others); Tue, 10 Sep 2019 10:53:26 -0400 Received: from 8bytes.org ([81.169.241.247]:53878 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731630AbfIJOx0 (ORCPT ); Tue, 10 Sep 2019 10:53:26 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id 04377BDE; Tue, 10 Sep 2019 16:53:24 +0200 (CEST) Date: Tue, 10 Sep 2019 16:53:23 +0200 From: Joerg Roedel To: Lu Baolu Cc: David Woodhouse , Bjorn Helgaas , Christoph Hellwig , ashok.raj@intel.com, jacob.jun.pan@intel.com, alan.cox@intel.com, kevin.tian@intel.com, mika.westerberg@linux.intel.com, Ingo Molnar , Greg Kroah-Hartman , pengfei.xu@intel.com, Konrad Rzeszutek Wilk , Marek Szyprowski , Robin Murphy , Jonathan Corbet , Boris Ostrovsky , Juergen Gross , Stefano Stabellini , Steven Rostedt , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v9 0/5] iommu: Bounce page for untrusted devices Message-ID: <20190910145322.GB24103@8bytes.org> References: <20190906061452.30791-1-baolu.lu@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190906061452.30791-1-baolu.lu@linux.intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 06, 2019 at 02:14:47PM +0800, Lu Baolu wrote: > Lu Baolu (5): > swiotlb: Split size parameter to map/unmap APIs > iommu/vt-d: Check whether device requires bounce buffer > iommu/vt-d: Don't switch off swiotlb if bounce page is used > iommu/vt-d: Add trace events for device dma map/unmap > iommu/vt-d: Use bounce buffer for untrusted devices > > .../admin-guide/kernel-parameters.txt | 5 + > drivers/iommu/Kconfig | 1 + > drivers/iommu/Makefile | 1 + > drivers/iommu/intel-iommu.c | 310 +++++++++++++++++- > drivers/iommu/intel-trace.c | 14 + > drivers/xen/swiotlb-xen.c | 8 +- > include/linux/swiotlb.h | 8 +- > include/trace/events/intel_iommu.h | 106 ++++++ > kernel/dma/direct.c | 2 +- > kernel/dma/swiotlb.c | 30 +- > 10 files changed, 449 insertions(+), 36 deletions(-) > create mode 100644 drivers/iommu/intel-trace.c > create mode 100644 include/trace/events/intel_iommu.h Applied, thanks.