From patchwork Mon Feb 19 11:15:51 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Baolu Lu X-Patchwork-Id: 20593 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:693c:2685:b0:108:e6aa:91d0 with SMTP id mn5csp1281288dyc; Mon, 19 Feb 2024 05:26:10 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUTuSKjrYIWzpsbFO/kCiNbe0KgQydWi+isskSbtoiHX5zzTe54Gbj0iI3r3V/zPnodqkh+VNY3+U18OOGRjU3CReiRAQ== X-Google-Smtp-Source: AGHT+IGApOHQYrx3JUTdx31LERv0ig3gIuxKwXMrwBxx7xyjSQoobnJRGWiB8KFoz1VRQT6pQMdi X-Received: by 2002:a17:903:98d:b0:1db:faa6:d4a9 with SMTP id mb13-20020a170903098d00b001dbfaa6d4a9mr2167173plb.69.1708349170598; Mon, 19 Feb 2024 05:26:10 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708349170; cv=pass; d=google.com; s=arc-20160816; b=Ok4cHgyqWb1W1IDwUERaC+FIBeY1kerMuiJoFJlELEU7n6iIoQrxhSIMqxK2UupfzP nbG71Yya7rbbnoqAhA2GD7lLfjhpyNOhGIyT01b5JSnK4yqGXhB5Is+2Gb0/xHVPohVl XDilMxlhOKEQBEPZuWbMEyoSrTI9KwIer9gaJUKmqUuYnApM1fSrDS2rncU63yq2Kbhu xcj59DmmD6TUf9Fb3oCJbRKU7XooptOMP9WxGT8VTYzUTItb9QeIXRbO4JDZyTaa94Sv Ev8wumfZxv4YsBlST6qBw4t9LevXrEFbEzO1sXEBTVo1iuLwyvYJGMCSjnE6dSAVVyWR qHAA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=edkUh8l8zO5WKLFkNggD/537M/m08KxaQuqu6DHgTvw=; fh=xIXrYyuim0+qQ0OPX7PXG3ceqpJb0Om6wEk3bRGARVs=; b=iUd1WwzSMRJaKdQoQQZtZwJzd6XnMLoVixPKOx8p589sonAWHTca+DeWawotypPZqq WJ9k1zoR3mOU/LA/KNVF7/+ajL3J3Rt607eXJxiA6HeBaBIVWUAFWuuw6JEsiZATeJr+ FGrqqxhvP06vBStTBVSCqhTu+8wWSzcnJAaJ3grPG5+0+rEsHLlo6JJmB+/008mJ+CxC G8PW44gT7ZQTNfOirHDbNgfpboVT+/Sm6VxRcop8KG0I3O0I5Sf/rYdU54lGsBXW2u99 PnFfH/z6qsEsj80bzGrhZtxcQq1pxQkQlagpgTzslPmEnWotVp3NKbNAWBzAEtIpEjRj 1Luw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="Qkv/laDv"; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-71185-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-71185-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id ll12-20020a170903090c00b001dbf2d899c6si1788567plb.433.2024.02.19.05.26.10 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 19 Feb 2024 05:26:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-71185-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="Qkv/laDv"; arc=pass (i=1 dkim=pass dkdomain=intel.com dmarc=pass fromdomain=linux.intel.com); spf=pass (google.com: domain of linux-kernel+bounces-71185-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-71185-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 76B14B221AA for ; Mon, 19 Feb 2024 11:22:08 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2D3E12C1B4; Mon, 19 Feb 2024 11:21:57 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="Qkv/laDv" Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E56E82C690 for ; Mon, 19 Feb 2024 11:21:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.12 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708341714; cv=none; b=B7tBbx1Mxk5LiWfLoocZNLCSMbo8j9D22TMmTA5ka9LuH7Wca84vZKmVwWcC6fAagNFCWg/jvG05YyCv8F+QS1dWSUGQRfaxEZsZbTgUdf/ffUnDnorEVRcQfxgopigk+iI+5Ak2BwxSq5yD5t/Rc13kV4Q4x7ZH9HXjBw+PBGg= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708341714; c=relaxed/simple; bh=4DnwBO9+Yc+LZhrZxqmcmMCN3Z559XhP2LH71F6BApA=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=kGLMaXbXJtsjxJzUwIt7BfZRdCUGQ+0wKFDOq6O3WesPNeK26ZFwb1+AmSvfxRaHJ4nU8H9vMY9TPFSeMfDXoPVeSRA7zK5kyC9JuqtWVvrNCews7mWPrqgsIhqJ9EhuvA1dOkYQ/FdvBTLDax6Ji3imL8YiTyWUNRkyaOh3aSE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com; spf=none smtp.mailfrom=linux.intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=Qkv/laDv; arc=none smtp.client-ip=198.175.65.12 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.intel.com Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=linux.intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1708341713; x=1739877713; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=4DnwBO9+Yc+LZhrZxqmcmMCN3Z559XhP2LH71F6BApA=; b=Qkv/laDv6Y+CHY/7Ekk4QUiHpjODVQMX/x7CeqTvixNo30nELGLnnjVr Juu/XzioZcgTG1njlHtVQVOsnK1bZ9yx8m0tFamlqIza8+Gu3qTj4rTeT SRT2F/G4lMdpWbrjhefKo97YPi4Gn0iAcUwWAQTt9z6AlfxGVr75QelRv ikNKaADoQanpi02MrioOcDxpy9xYZSZBWOq1bzgHRJB24N4Lar09Pk6ea dZrXME+slbdWLqpahYiJxftQlnwyVxuGyD3H27veJBwGEYRhMvOj3mc3x iOApba9UjTgl9A/m28rNgUlA9mSuVO4Hu7TqvhDr5ZkP3rAdXossVhH4/ Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10988"; a="13823325" X-IronPort-AV: E=Sophos;i="6.06,170,1705392000"; d="scan'208";a="13823325" Received: from orviesa006.jf.intel.com ([10.64.159.146]) by orvoesa104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Feb 2024 03:21:53 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.06,170,1705392000"; d="scan'208";a="4826776" Received: from allen-box.sh.intel.com ([10.239.159.127]) by orviesa006.jf.intel.com with ESMTP; 19 Feb 2024 03:21:50 -0800 From: Lu Baolu To: Joerg Roedel Cc: Yi Liu , Arnd Bergmann , Kevin Tian , Joao Martins , iommu@lists.linux.dev, linux-kernel@vger.kernel.org Subject: [PATCH 00/10] [PULL REQUEST] iommu/vt-d: Fixes for v6.8-rc5 Date: Mon, 19 Feb 2024 19:15:51 +0800 Message-Id: <20240219111601.96405-1-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791333939785961021 X-GMAIL-MSGID: 1791333939785961021 Hi Joerg, The following patches have been queued for v6.8. They fix some missed behavior for nested domain implementation in the Intel IOMMU driver. To be more specific, they aim to achieve comprehensive: - Cache invalidation for changes in a parent domain; - Dirty tracking setting for parent and nested domains; - Fix a constant-out-of-range warning. As the nested domain implementation in the Intel IOMMU driver was introduced in v6.8-rc1, I would suggest merging this series in the rc phase. So, Please consider them for the iommu/fix branch. Best regards, Lu Baolu Arnd Bergmann (1): iommu/vt-d: Fix constant-out-of-range warning Yi Liu (9): iommu/vt-d: Track nested domains in parent iommu/vt-d: Add __iommu_flush_iotlb_psi() iommu/vt-d: Add missing iotlb flush for parent domain iommu/vt-d: Update iotlb in nested domain attach iommu/vt-d: Add missing device iotlb flush for parent domain iommu/vt-d: Remove domain parameter for intel_pasid_setup_dirty_tracking() iommu/vt-d: Wrap the dirty tracking loop to be a helper iommu/vt-d: Add missing dirty tracking set for parent domain iommu/vt-d: Set SSADE when attaching to a parent with dirty tracking drivers/iommu/intel/iommu.h | 7 ++ drivers/iommu/intel/pasid.h | 1 - drivers/iommu/intel/iommu.c | 214 ++++++++++++++++++++++++++--------- drivers/iommu/intel/nested.c | 16 ++- drivers/iommu/intel/pasid.c | 5 +- 5 files changed, 187 insertions(+), 56 deletions(-)