[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220501112434.874236-1-baolu.lu@linux.intel.com>
Date: Sun, 1 May 2022 19:24:29 +0800
From: Lu Baolu <baolu.lu@...ux.intel.com>
To: Joerg Roedel <joro@...tes.org>, Jason Gunthorpe <jgg@...dia.com>,
Alex Williamson <alex.williamson@...hat.com>,
Kevin Tian <kevin.tian@...el.com>
Cc: Jacob jun Pan <jacob.jun.pan@...el.com>,
Liu Yi L <yi.l.liu@...el.com>,
iommu@...ts.linux-foundation.org, linux-kernel@...r.kernel.org,
Lu Baolu <baolu.lu@...ux.intel.com>
Subject: [PATCH 0/5] iommu/vt-d: Force snooping improvement
Hi folks,
Previously, the IOMMU capability of enforcing cache coherency is queried
through iommu_capable(IOMMU_CAP_CACHE_COHERENCY). This is a global
capability, hence the IOMMU driver reports support for this capability
only when all IOMMUs in the system has this support.
Commit 6043257b1de06 ("iommu: Introduce the domain op
enforce_cache_coherency()") converts this into a per-domain test-and-set
option, and the previous iommu_capable(IOMMU_CAP_CACHE_COHERENCY) is
deprecated.
This is a follow-up series which improves the Intel IOMMU driver to
support the per-domain scheme better.
Best regards,
baolu
Lu Baolu (5):
iommu/vt-d: Block force-snoop domain attaching if no SC support
iommu/vt-d: Set SNP bit only in second-level page table entries
iommu/vt-d: Check domain force_snooping against attached devices
iommu/vt-d: Remove domain_update_iommu_snooping()
iommu/vt-d: Remove hard coding PGSNP bit in PASID entries
drivers/iommu/intel/pasid.h | 3 +-
drivers/iommu/intel/iommu.c | 92 ++++++++++++++++++++++---------------
drivers/iommu/intel/pasid.c | 24 +++++++---
3 files changed, 74 insertions(+), 45 deletions(-)
--
2.25.1
Powered by blists - more mailing lists