The check to set identity map for tylersburg is done too late. It needs
to be done before the check for identity_map domain is done.
To: Joerg Roedel
To: David Woodhouse
Cc: iommu@lists.linux-foundation.org
Cc: linux-ker...@vger.kernel.org
Cc: sta...@vger.kernel.org
Cc: Ashok Raj
Signed-off
-ker...@vger.kernel.org
Cc: sta...@vger.kernel.org
Cc: CQ Tang
Cc: Ashok Raj
Signed-off-by: CQ Tang
Signed-off-by: Ashok Raj
Tested-by: CQ Tang
---
include/linux/intel-iommu.h | 14 +++---
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/include/linux/intel-iommu.h b
The check to set identity map for tylersburg is done too late. It needs
to be done before the check for identity_map domain is done.
To: Joerg Roedel
To: David Woodhouse
Cc: iommu@lists.linux-foundation.org
Cc: linux-ker...@vger.kernel.org
Cc: sta...@vger.kernel.org
Cc: Ashok Raj
Signed-off
-ker...@vger.kernel.org
Cc: sta...@vger.kernel.org
Cc: CQ Tang
Cc: Ashok Raj
Signed-off-by: CQ Tang
Signed-off-by: Ashok Raj
Tested-by: CQ Tang
---
include/linux/intel-iommu.h | 14 +++---
1 file changed, 7 insertions(+), 7 deletions(-)
diff --git a/include/linux/intel-iommu.h b
-ker...@vger.kernel.org
Cc: sta...@vger.kernel.org
Cc: CQ Tang
Cc: Ashok Raj
Fixes: 2f26e0a9 ("iommu/vt-d: Add basic SVM PASID support")
Signed-off-by: CQ Tang
Signed-off-by: Ashok Raj
Tested-by: CQ Tang
---
include/linux/intel-iommu.h | 14 +++---
1 file changed, 7 insert
The check to set identity map for tylersburg is done too late. It needs
to be done before the check for identity_map domain is done.
To: Joerg Roedel
To: David Woodhouse
Cc: iommu@lists.linux-foundation.org
Cc: linux-ker...@vger.kernel.org
Cc: sta...@vger.kernel.org
Cc: Ashok Raj
Fixes
: David Woodhouse
Cc: Jean-Phillipe Brucker
Cc: iommu@lists.linux-foundation.org
Signed-off-by: CQ Tang
Signed-off-by: Ashok Raj
---
drivers/iommu/intel-svm.c | 30 ++
include/linux/intel-svm.h | 20
2 files changed, 50 insertions(+)
diff --git
: Ashok Raj
---
drivers/pci/ats.c | 65 +
drivers/pci/pci.c | 3 +++
include/linux/pci-ats.h | 10
include/linux/pci.h | 6 +
4 files changed, 69 insertions(+), 15 deletions(-)
diff --git a/drivers/pci/ats.c b/drivers/pci
: Ashok Raj
---
drivers/pci/ats.c | 65 +
drivers/pci/pci.c | 3 +++
include/linux/pci-ats.h | 10
include/linux/pci.h | 6 +
4 files changed, 69 insertions(+), 15 deletions(-)
diff --git a/drivers/pci/ats.c b/drivers/pci
: David Woodhouse
Cc: Jean-Phillipe Brucker
Cc: iommu@lists.linux-foundation.org
Signed-off-by: CQ Tang
Signed-off-by: Ashok Raj
---
drivers/iommu/intel-svm.c | 30 ++
include/linux/intel-svm.h | 20
2 files changed, 50 insertions(+)
diff --git
Cc: David Woodhouse
Cc: iommu@lists.linux-foundation.org
Signed-off-by: CQ Tang
Signed-off-by: Ashok Raj
---
drivers/pci/ats.c | 65 +
drivers/pci/pci.c | 3 +++
include/linux/pci-ats.h | 10
include/linux/pci.h | 6
Resending Jean's patch so it can be included earlier than his large
SVM commits. Original patch https://patchwork.kernel.org/patch/9593891
was ack'ed by Bjorn. Let's commit these separately since we need
functionality earlier.
Resending this series as requested by Jean.
CQ Tang (1):
PCI: Save p
Complex Integrated Endpoint, MSI 00
This permits assigning this device to a guest VM.
Fixes: f096c061f552 ("iommu: Rework iommu_group_get_for_pci_dev()")
Signed-off-by: Ashok Raj
To: Joerg Roedel
To: Bjorn Helgaas
Cc: linux-ker...@vger.kernel.org
Cc: iommu@lists.linux-foundation.org
Cc:
P.
00:14.3 Network controller: Intel Corporation Device 9df0 (rev 30)
Capabilities: [40] Express (v2) Root Complex Integrated Endpoint, MSI 00
This permits assigning this device to a guest VM.
Fixes: f096c061f552 ("iommu: Rework iommu_group_get_for_pci_dev()")
Signed-off-by: Ashok Raj
P.
00:14.3 Network controller: Intel Corporation Device 9df0 (rev 30)
Capabilities: [40] Express (v2) Root Complex Integrated Endpoint, MSI 00
This permits assigning this device to a guest VM.
Fixes: f096c061f552 ("iommu: Rework iommu_group_get_for_pci_dev()")
Signed-off-by: Ashok Raj
Woodhouse
Cc: Joerg Roedel
Cc: Ashok Raj
Cc: Sainath Grandhi
Cc: iommu@lists.linux-foundation.org
Cc: sta...@vger.kernel.org
Signed-off-by: Sainath Grandhi
Signed-off-by: Ashok Raj
---
drivers/iommu/intel-iommu.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/drivers/iommu/int
Hi
Sorry for resending.. iommu list email was mistyped :-(
The first 2 patches in the series fix some simple bugs in Intel vt-d driver.
The 3rd patch Adds support for kmem notify required to support ring0 SVM.
4th patch uses the hooks to perform device tlb invalidations.
Ashok Raj (3):
iommu
mmu@lists.linux-foundation.org
Cc: David Woodhouse
Cc: Jacob Pan
Cc: Ashok Raj
Signed-off-by: Ashok Raj
Reported-by: Sudeep Dutt
---
drivers/iommu/intel-svm.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/drivers/iommu/intel-svm.c b/drivers/iommu/intel-svm.c
index f167
New kernels with debug show panic() from __phys_addr() checks. Avoid
calling virt_to_phys() when pasid_state_tbl pointer is null
To: Joerg Roedel
To: linux-ker...@vger.kernel.org>
Cc: iommu@lists.linux-foundation.org
Cc: David Woodhouse
Cc: Jacob Pan
Cc: Ashok Raj
Signed-off-by: Ashok
flush the device TLBs
when necessary.
To: linux-ker...@vger.kernel.org
To: Joerg Roedel
Cc: Ashok Raj
Cc: Dave Hansen
Cc: CQ Tang
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc: H. Peter Anvin
Cc: Andy Lutomirski
Cc: Rik van Riel
Cc: Kees Cook
Cc: Andrew Morton
Cc: "Kirill A. Shutemov"
C
ations via
mmu_notifier_register() api's.
To: linux-ker...@vger.kernel.org
To: Joerg Roedel
Cc: Ashok Raj
Cc: Dave Hansen
Cc: Huang Ying
Cc: CQ Tang
Cc: Thomas Gleixner
Cc: Ingo Molnar
Cc: H. Peter Anvin
Cc: Andy Lutomirski
Cc: Rik van Riel
Cc: Kees Cook
Cc: Andrew Morton
Cc: Michal Hoc
Raj
To: Bjorn Helgaas
To: Joerg Roedel
To: Lu Baolu
Cc: sta...@vger.kernel.org
Cc: linux-...@vger.kernel.org
Cc: linux-ker...@vger.kernel.org
Cc: Ashok Raj
Cc: iommu@lists.linux-foundation.org
---
drivers/iommu/intel/iommu.c | 2 +-
drivers/pci/ats.c | 14 ++
include
...@vger.kernel.org
Cc: Ashok Raj
Cc: iommu@lists.linux-foundation.org
---
drivers/iommu/intel/iommu.c | 2 +-
drivers/pci/ats.c | 14 ++
include/linux/pci-ats.h | 4
3 files changed, 19 insertions(+), 1 deletion(-)
diff --git a/drivers/iommu/intel/iommu.c b/drivers
: Lu Baolu
Cc: sta...@vger.kernel.org
Cc: linux-...@vger.kernel.org
Cc: linux-ker...@vger.kernel.org
Cc: Ashok Raj
Cc: iommu@lists.linux-foundation.org
---
drivers/iommu/intel/iommu.c | 2 +-
drivers/pci/ats.c | 13 +
include/linux/pci-ats.h | 4
3 files changed, 18
("iommu/vt-d: Always enable PASID/PRI PCI capabilities
before ATS")
Signed-off-by: Ashok Raj
To: Bjorn Helgaas
To: Joerg Roedel
To: Lu Baolu
Cc: sta...@vger.kernel.org
Cc: linux-...@vger.kernel.org
Cc: linux-ker...@vger.kernel.org
Cc: Ashok Raj
Cc: iommu@lists.linux-foundation.org
---
Presently, the default domain of an iommu group is allocated during boot time
and it cannot be changed later. So, the device would typically be either in
identity (pass_through) mode or the device would be in DMA mode as long as the
system is up and running. There is no way to change the default do
From: Sai Praneeth Prakhya
The default domain type of an iommu group can be changed by writing to
"/sys/kernel/iommu_groups//type" file. Hence, document it's usage
and more importantly spell out its limitations.
Cc: Christoph Hellwig
Cc: Joerg Roedel
Cc: Ashok Raj
Cc: Will
ldn't see stale
values or iommu_group_show_type() doesn't try to derefernce stale pointers.
Cc: Christoph Hellwig
Cc: Joerg Roedel
Cc: Ashok Raj
Cc: Will Deacon
Cc: Lu Baolu
Cc: Sohil Mehta
Cc: Robin Murphy
Cc: Jacob Pan
Reviewed-by: Lu Baolu
Signed-off-by: Sai Praneeth Prakhya
---
drivers/iomm
/ABI/testing/sysfs-kernel-iommu_groups" for more
information.
Cc: Christoph Hellwig
Cc: Joerg Roedel
Cc: Ashok Raj
Cc: Will Deacon
Cc: Lu Baolu
Cc: Sohil Mehta
Cc: Robin Murphy
Cc: Jacob Pan
Reviewed-by: Lu Baolu
Signed-off-by: Sai Praneeth Prakhya
--
- If there is ATTN button, and an MRL event pending, ignore
Presence Detect. Since we want ATTN button to drive the
hotplug event.
Signed-off-by: Ashok Raj
Co-developed-by: Kuppuswamy Sathyanarayanan
---
drivers/pci/hotplug/pciehp.h | 1 +
drivers/pci/hotplug/pciehp_ctrl.c
PCI_INTERRUPT_PIN should always read 0 for SRIOV Virtual Functions.
Some SRIOV devices have some bugs in RTL and VF's end up reading 1
instead of 0 for the PIN.
We could enforce it by default in vfio_pci_nointx.
Reported-by: Gage Eads
Tested-by: Gage Eads
Signed-off-by: Ashok Raj
Cc:
orked suggestions from Alex https://lkml.org/lkml/2018/7/16/1052
Reported-by: Gage Eads
Tested-by: Gage Eads
Signed-off-by: Ashok Raj
Cc: k...@vger.kernel.org
Cc: linux-ker...@vger.kernel.org
Cc: iommu@lists.linux-foundation.org
Cc: Joerg Roedel
Cc: Bjorn Helgaas
Cc: Gage Eads
---
drivers/vfi
32 matches
Mail list logo