Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp1876145rwl; Wed, 12 Apr 2023 21:08:25 -0700 (PDT) X-Google-Smtp-Source: AKy350bl0OBku44QiyUD0fBfxj9SYJsBdso3weq8W4GT7ANhoek8cl9lngTAjvoSrcjw+5S7WPXF X-Received: by 2002:aa7:cac5:0:b0:504:b45a:5f99 with SMTP id l5-20020aa7cac5000000b00504b45a5f99mr406703edt.19.1681358905394; Wed, 12 Apr 2023 21:08:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681358905; cv=none; d=google.com; s=arc-20160816; b=c/HCklnhHrKw8tqtVGMdg9KOCBt4QrHnPvFzDkTGQPqCmNMov2dPWYqMk8kqLCKwFV UHMda0MHrwhrs3X0VzNr1O3NLsqv+Yw/TFR90Vaz2af/qehfDDv1gwG57+xzVukjtdqv MoFvUrvsoLNVBs8hYXwZ0kzG+1fHBxEULgHKhTyFcUqFclgt09kwVJisO9rkvqpzupW1 aWE2pP37d/vTEnnR4PDXlkLs4J+KtnZ3FXZ8Oh1lyUT3lDn3nWy0dH0+HBAFQhl2Jlln b7+1lyDM+tFPjVDVm/8QhOOMtsonyofWTmOPhzNelCe2Q50w5gjZsTGy5NfLH5eI4mOV mgcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=cpGgpnXaPNjrM2p+Y76L3si06YoRHQLhWPUYW//Nt/o=; b=vuOXnXDzFbyVdq1Vdq1N/KQL+T9OzfbyMKpJTpuGXk3njuuH5nR5f0feZZ5scD7w9n tAR04XbdbbKPHWZvA5q9zSTKCVW3ZwGjI0V+TPVnWJbOOgvzOfh1fEMNYClGs6MeYSW7 ocFZP++5T8ygv/EiyittUMiZbUd6O358kqYJmLLwpBbrnyvh7X1cCIfnrBCIxSYcZ8rD GDLG2CqBWinaybnBXmqsBWRVrMyD68420o2ZoQyUz6sR8U4bmP81+0ajxZrTWGxQb4Lx a0qZyexZTs8UE4prwGwdrNqET5jA168Zyg1Cp3469hxdJArlPbYHxLWfeBXUq/gcCx18 R34Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=gF431WTO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d4-20020a50ea84000000b004fd1f2a0eb2si755015edo.423.2023.04.12.21.07.59; Wed, 12 Apr 2023 21:08:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=gF431WTO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229583AbjDMEGq (ORCPT + 99 others); Thu, 13 Apr 2023 00:06:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36548 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229451AbjDMEGp (ORCPT ); Thu, 13 Apr 2023 00:06:45 -0400 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8F0C15B88 for ; Wed, 12 Apr 2023 21:06:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1681358804; x=1712894804; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=s73Dwcw/j+M9Z+7wT2sD+XtVqUA+ffONLeb/NudPzz8=; b=gF431WTOQLtv4icy0snUZ0/hjeZBM7/y57UWJKLJfF9iNxLh/xaFCWpq 8qW9cDaoSOQ5br/zR/qKqRZXuca8hDNjtt0VeBbo468CyW+mShePTIPVE 4DKOObgY5w5fPKENDm1fgBro8Pkn8aldBVogk+Nr58iErcMcM4iYOqo6Z OD+rKmhnfuF2eks5tGqCXnNgBJXUbmniIn+vTnOXkYZWQoeFeyIq8hXKy 8nfBMJxxN0FLI2SakeXV+IPxhMt89hGlI8SZd/bv5CITqQDD7P8vSwIuD jtJjHkAmm/w+JgR8zkXHzngXKHBB3gSekdC1niDX/ZojyF7WO7L0UvAIw w==; X-IronPort-AV: E=McAfee;i="6600,9927,10678"; a="323702318" X-IronPort-AV: E=Sophos;i="5.98,339,1673942400"; d="scan'208";a="323702318" Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Apr 2023 21:06:44 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10678"; a="935360955" X-IronPort-AV: E=Sophos;i="5.98,339,1673942400"; d="scan'208";a="935360955" Received: from allen-box.sh.intel.com ([10.239.159.127]) by fmsmga006.fm.intel.com with ESMTP; 12 Apr 2023 21:06:42 -0700 From: Lu Baolu To: Joerg Roedel Cc: Tina Zhang , Jacob Pan , Christophe JAILLET , iommu@lists.linux.dev, linux-kernel@vger.kernel.org Subject: [PATCH v2 00/17] [PULL REQUEST] Intel IOMMU updates for Linux v6.4 Date: Thu, 13 Apr 2023 12:06:28 +0800 Message-Id: <20230413040645.46157-1-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_PASS, SPF_NONE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Joerg, This includes patches queued for v6.4. They are: - Allow the VT-d driver to support non-PRI IOPF - Remove PASID supervisor request support - Various small and misc cleanups This series also includes an idxd patch to avoid driver regression after changes in the IOMMU driver. It has been reviewed and acked by the maintainers. The whole series is based on v6.3-rc6 and also available at: https://github.com/LuBaolu/intel-iommu/commits/vtd-update-for-v6.4 Please pull them for x86/vt-d branch. Best regards, Baolu Change log: - v2: - Avoid using "fix" wording in the commit message of a cleanup patch, no functional change. [David Laight] - Add Acked-by from Vinod Koul to the idxd patch. - v1: https://lore.kernel.org/linux-iommu/20230411064815.31456-1-baolu.lu@linux.intel.com/ Christophe JAILLET (1): iommu/vt-d: Do not use GFP_ATOMIC when not needed Jacob Pan (2): iommu/vt-d: Use non-privileged mode for all PASIDs iommu/vt-d: Remove PASID supervisor request support Lu Baolu (7): dmaengine: idxd: Add enable/disable device IOPF feature iommu/vt-d: Allow SVA with device-specific IOPF iommu/vt-d: Move iopf code from SVA to IOPF enabling path iommu/vt-d: Move pfsid and ats_qdep calculation to device probe path iommu/vt-d: Move PRI handling to IOPF feature path iommu/vt-d: Remove unnecessary checks in iopf disabling path iommu/vt-d: Remove extern from function prototypes Tina Zhang (7): iommu/vt-d: Make size of operands same in bitwise operations iommu/vt-d: Remove BUG_ON on checking valid pfn range iommu/vt-d: Remove BUG_ON in handling iotlb cache invalidation iommu/vt-d: Remove BUG_ON when domain->pgd is NULL iommu/vt-d: Remove BUG_ON in map/unmap() iommu/vt-d: Remove a useless BUG_ON(dev->is_virtfn) iommu/vt-d: Remove BUG_ON in dmar_insert_dev_scope() drivers/iommu/intel/iommu.h | 36 +++--- drivers/iommu/intel/pasid.h | 7 -- drivers/dma/idxd/init.c | 31 ++++- drivers/iommu/intel/dmar.c | 7 +- drivers/iommu/intel/iommu.c | 173 +++++++++++++++++----------- drivers/iommu/intel/irq_remapping.c | 2 +- drivers/iommu/intel/pasid.c | 43 ------- 7 files changed, 155 insertions(+), 144 deletions(-) -- 2.34.1