public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH 00/14] [PULL REQUEST] Intel IOMMU updates for v6.12
@ 2024-09-02  2:27 Lu Baolu
  2024-09-02  2:27 ` [PATCH 01/14] iommu/vt-d: Require DMA domain if hardware not support passthrough Lu Baolu
                   ` (14 more replies)
  0 siblings, 15 replies; 16+ messages in thread
From: Lu Baolu @ 2024-09-02  2:27 UTC (permalink / raw)
  To: Joerg Roedel, Will Deacon; +Cc: Tina Zhang, Sanjay K Kumar, iommu, linux-kernel

Hi Joerg,

The following changes have been queued for v6.12-rc1. They are about new
features and code refactoring, including:

 - Retire si_domain and convert to use static identity domain
 - Batched IOTLB/dev-IOTLB invalidation
 - Small code refactoring and cleanups

These patches are based on v6.11-rc6. The complete patches are also
available at:

https://github.com/LuBaolu/intel-iommu/commits/vtd-update-for-v6.12

Please consider them for iommu next.

Best regards,
baolu

Lu Baolu (10):
  iommu/vt-d: Require DMA domain if hardware not support passthrough
  iommu/vt-d: Remove identity mappings from si_domain
  iommu/vt-d: Always reserve a domain ID for identity setup
  iommu/vt-d: Remove has_iotlb_device flag
  iommu/vt-d: Factor out helpers from domain_context_mapping_one()
  iommu/vt-d: Add support for static identity domain
  iommu/vt-d: Cleanup si_domain
  iommu/vt-d: Move PCI PASID enablement to probe path
  iommu/vt-d: Unconditionally flush device TLB for pasid table updates
  iommu/vt-d: Add qi_batch for dmar_domain

Sanjay K Kumar (1):
  iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count

Tina Zhang (3):
  iommu/vt-d: Factor out invalidation descriptor composition
  iommu/vt-d: Refactor IOTLB and Dev-IOTLB flush for batching
  iommu/vt-d: Introduce batched cache invalidation

 drivers/iommu/intel/iommu.h  | 128 ++++++++-
 drivers/iommu/intel/cache.c  | 239 ++++++++++++-----
 drivers/iommu/intel/dmar.c   | 109 ++------
 drivers/iommu/intel/iommu.c  | 503 +++++++++++++++--------------------
 drivers/iommu/intel/nested.c |   3 +-
 drivers/iommu/intel/pasid.c  |  12 +-
 drivers/iommu/intel/svm.c    |   7 +-
 7 files changed, 547 insertions(+), 454 deletions(-)

-- 
2.34.1


^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2024-09-02 16:15 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-09-02  2:27 [PATCH 00/14] [PULL REQUEST] Intel IOMMU updates for v6.12 Lu Baolu
2024-09-02  2:27 ` [PATCH 01/14] iommu/vt-d: Require DMA domain if hardware not support passthrough Lu Baolu
2024-09-02  2:27 ` [PATCH 02/14] iommu/vt-d: Remove identity mappings from si_domain Lu Baolu
2024-09-02  2:27 ` [PATCH 03/14] iommu/vt-d: Always reserve a domain ID for identity setup Lu Baolu
2024-09-02  2:27 ` [PATCH 04/14] iommu/vt-d: Remove has_iotlb_device flag Lu Baolu
2024-09-02  2:27 ` [PATCH 05/14] iommu/vt-d: Factor out helpers from domain_context_mapping_one() Lu Baolu
2024-09-02  2:27 ` [PATCH 06/14] iommu/vt-d: Add support for static identity domain Lu Baolu
2024-09-02  2:27 ` [PATCH 07/14] iommu/vt-d: Cleanup si_domain Lu Baolu
2024-09-02  2:27 ` [PATCH 08/14] iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count Lu Baolu
2024-09-02  2:27 ` [PATCH 09/14] iommu/vt-d: Move PCI PASID enablement to probe path Lu Baolu
2024-09-02  2:27 ` [PATCH 10/14] iommu/vt-d: Unconditionally flush device TLB for pasid table updates Lu Baolu
2024-09-02  2:27 ` [PATCH 11/14] iommu/vt-d: Factor out invalidation descriptor composition Lu Baolu
2024-09-02  2:27 ` [PATCH 12/14] iommu/vt-d: Refactor IOTLB and Dev-IOTLB flush for batching Lu Baolu
2024-09-02  2:27 ` [PATCH 13/14] iommu/vt-d: Add qi_batch for dmar_domain Lu Baolu
2024-09-02  2:27 ` [PATCH 14/14] iommu/vt-d: Introduce batched cache invalidation Lu Baolu
2024-09-02 16:15 ` [PATCH 00/14] [PULL REQUEST] Intel IOMMU updates for v6.12 Joerg Roedel

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox