Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp2751086pxb; Mon, 31 Jan 2022 03:35:28 -0800 (PST) X-Google-Smtp-Source: ABdhPJxwpgUqK1dJ0FMoR9H3R3mMn0NtOrWYBArJ0uir1tCWyG2SNtuGMIVlV3vgkRZTi9M/p7uw X-Received: by 2002:a63:f20b:: with SMTP id v11mr11056022pgh.398.1643628927873; Mon, 31 Jan 2022 03:35:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643628927; cv=none; d=google.com; s=arc-20160816; b=VDg0kqoME4bSAr7jcwhvDdG0ZHg0Zcf9SDK0ZCd/z4Jo59vEvAyGUq66WYbgKDwlpL BtgeeauaGmIDxyk6zK0adv92oFWQFjKto+lqureAU3L5O1vT7diIf9qxP9eh5SVQWdVq KWCS/rMVYPZqzCOxEQrts/HHThExbwYB4uQySAp+9VjHEvNp/kFemLHbw7IX+05GslBM nNtOm5TDPiF+Mtod28u0abw2r3DKOAvfkm7978vYb1Xq4rZ5IJpVX17HKN6E8mL8AkBP DSzxPikFMGeh/gzbLX/ZM3BtnPaFVeLcdMFA1aXMnh5Cb9JlAqvxyEF93V/kYlj/fUkD 5nnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=7+nQu6E1QEfIJ/XTtkd2XzV6PY7HTdpDuxakuYyeDiA=; b=Hs3l/AyNq5rGghKtwE2QYbV9qI7w2b0kKqgIJ8jAeNnVqShPB7wjVUbmRreO1mFGFm 0qQrpjCNAJ65UfU5Yr/4Zagc4wyQ36V8utr6QfVboPFWiPd93QfITpuPodxY8LQyBmIx HlYd+iC1v5qxB6PBdG2ond/xMPRVWqJio9LLRxMoOIPvPmoK/JlVlIgI5dleE7NmefTx AUBFaQlkf6x+Lk6tPl/5zMOBiR27TaY+pmGnowcT5dHaMN508WDQlqITulT2e0GzfQhE iaONcRRab+JbVA3wpJ/hFWPrYmsTfUlGd8sdv4zeV2DVjwyFa5GgrYKGHpLVSY/TyW6d Trrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="lWK/UtOb"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w7si13635648plg.323.2022.01.31.03.35.15; Mon, 31 Jan 2022 03:35:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="lWK/UtOb"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1351231AbiA1U30 (ORCPT + 99 others); Fri, 28 Jan 2022 15:29:26 -0500 Received: from mga02.intel.com ([134.134.136.20]:61402 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351179AbiA1U3X (ORCPT ); Fri, 28 Jan 2022 15:29:23 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643401763; x=1674937763; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=qX917cPwwlO8dZZek3e7j9ci/IfNoJH+hK5O82lWRfk=; b=lWK/UtObQ4wVEdYtHdBwGWWLbfuEsZLiTJTTlQpHNS/J8yt4AZCqc40O yAc6oJzcfUVl7DBx7aXZ1WylchoHNx3cCkIGYqYBj60LkBLyt0L8TMF9V YCFqy+tYWzh8HaRPhUBCpXly7JAzKip1fPT7Y/OIx09GHCimg9VSgoZyV w+HjUs/ezar+qOE8se59CIe2ajYAuguc51s34oVTjrR7Q6ynEJyN02F6T /Bzo7cVc12wodUgeM9/p3D0CvPBigQWXOQYEf9w+dbz/19t9aceaIS/ll 02vJfhtIOWZV9HvnT3k7FHynsCfjhePG2GKSaeqztnFpToD1QE9LyqjjW A==; X-IronPort-AV: E=McAfee;i="6200,9189,10241"; a="234578000" X-IronPort-AV: E=Sophos;i="5.88,324,1635231600"; d="scan'208";a="234578000" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Jan 2022 12:29:22 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,324,1635231600"; d="scan'208";a="618827688" Received: from otcwcpicx3.sc.intel.com ([172.25.55.73]) by FMSMGA003.fm.intel.com with ESMTP; 28 Jan 2022 12:29:21 -0800 From: Fenghua Yu To: "Thomas Gleixner" , "Dave Hansen" , "Ingo Molnar" , "Borislav Petkov" , "Peter Zijlstra" , "Andy Lutomirski" , "Tony Luck" , "Lu Baolu" , "Joerg Roedel" , Josh Poimboeuf , "Jacob Pan" , "Ashok Raj" , "Ravi V Shankar" Cc: iommu@lists.linux-foundation.org, "x86" , "linux-kernel" , Fenghua Yu Subject: [PATCH v3 01/11] iommu/sva: Rename CONFIG_IOMMU_SVA_LIB to CONFIG_IOMMU_SVA Date: Fri, 28 Jan 2022 12:28:55 -0800 Message-Id: <20220128202905.2274672-2-fenghua.yu@intel.com> X-Mailer: git-send-email 2.35.0 In-Reply-To: <20220128202905.2274672-1-fenghua.yu@intel.com> References: <20220128202905.2274672-1-fenghua.yu@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This CONFIG option originally only referred to the Shared Virtual Address (SVA) library. But it is now also used for non-library portions of code. Drop the "_LIB" suffix so that there is just one configuration options for all code relating to SVA. Signed-off-by: Fenghua Yu Reviewed-by: Tony Luck --- v2: - Add this patch for more meaningful name CONFIG_IOMMU_SVA drivers/iommu/Kconfig | 6 +++--- drivers/iommu/Makefile | 2 +- drivers/iommu/intel/Kconfig | 2 +- drivers/iommu/iommu-sva-lib.h | 6 +++--- 4 files changed, 8 insertions(+), 8 deletions(-) diff --git a/drivers/iommu/Kconfig b/drivers/iommu/Kconfig index 3eb68fa1b8cc..c79a0df090c0 100644 --- a/drivers/iommu/Kconfig +++ b/drivers/iommu/Kconfig @@ -144,8 +144,8 @@ config IOMMU_DMA select IRQ_MSI_IOMMU select NEED_SG_DMA_LENGTH -# Shared Virtual Addressing library -config IOMMU_SVA_LIB +# Shared Virtual Addressing +config IOMMU_SVA bool select IOASID @@ -379,7 +379,7 @@ config ARM_SMMU_V3 config ARM_SMMU_V3_SVA bool "Shared Virtual Addressing support for the ARM SMMUv3" depends on ARM_SMMU_V3 - select IOMMU_SVA_LIB + select IOMMU_SVA select MMU_NOTIFIER help Support for sharing process address spaces with devices using the diff --git a/drivers/iommu/Makefile b/drivers/iommu/Makefile index bc7f730edbb0..44475a9b3eea 100644 --- a/drivers/iommu/Makefile +++ b/drivers/iommu/Makefile @@ -27,6 +27,6 @@ obj-$(CONFIG_FSL_PAMU) += fsl_pamu.o fsl_pamu_domain.o obj-$(CONFIG_S390_IOMMU) += s390-iommu.o obj-$(CONFIG_HYPERV_IOMMU) += hyperv-iommu.o obj-$(CONFIG_VIRTIO_IOMMU) += virtio-iommu.o -obj-$(CONFIG_IOMMU_SVA_LIB) += iommu-sva-lib.o io-pgfault.o +obj-$(CONFIG_IOMMU_SVA) += iommu-sva-lib.o io-pgfault.o obj-$(CONFIG_SPRD_IOMMU) += sprd-iommu.o obj-$(CONFIG_APPLE_DART) += apple-dart.o diff --git a/drivers/iommu/intel/Kconfig b/drivers/iommu/intel/Kconfig index 247d0f2d5fdf..39a06d245f12 100644 --- a/drivers/iommu/intel/Kconfig +++ b/drivers/iommu/intel/Kconfig @@ -52,7 +52,7 @@ config INTEL_IOMMU_SVM select PCI_PRI select MMU_NOTIFIER select IOASID - select IOMMU_SVA_LIB + select IOMMU_SVA help Shared Virtual Memory (SVM) provides a facility for devices to access DMA resources through process address space by diff --git a/drivers/iommu/iommu-sva-lib.h b/drivers/iommu/iommu-sva-lib.h index 031155010ca8..95dc3ebc1928 100644 --- a/drivers/iommu/iommu-sva-lib.h +++ b/drivers/iommu/iommu-sva-lib.h @@ -17,7 +17,7 @@ struct device; struct iommu_fault; struct iopf_queue; -#ifdef CONFIG_IOMMU_SVA_LIB +#ifdef CONFIG_IOMMU_SVA int iommu_queue_iopf(struct iommu_fault *fault, void *cookie); int iopf_queue_add_device(struct iopf_queue *queue, struct device *dev); @@ -28,7 +28,7 @@ struct iopf_queue *iopf_queue_alloc(const char *name); void iopf_queue_free(struct iopf_queue *queue); int iopf_queue_discard_partial(struct iopf_queue *queue); -#else /* CONFIG_IOMMU_SVA_LIB */ +#else /* CONFIG_IOMMU_SVA */ static inline int iommu_queue_iopf(struct iommu_fault *fault, void *cookie) { return -ENODEV; @@ -64,5 +64,5 @@ static inline int iopf_queue_discard_partial(struct iopf_queue *queue) { return -ENODEV; } -#endif /* CONFIG_IOMMU_SVA_LIB */ +#endif /* CONFIG_IOMMU_SVA */ #endif /* _IOMMU_SVA_LIB_H */ -- 2.35.0