mbox series

[v3,0/6] iommu/vt-d: Refactor code for non-PRI IOPF

Message ID 20230324120234.313643-1-baolu.lu@linux.intel.com (mailing list archive)
Headers show
Series iommu/vt-d: Refactor code for non-PRI IOPF | expand

Message

Baolu Lu March 24, 2023, 12:02 p.m. UTC
The existing SVA and IOPF implementation assumes that devices report I/O
page faults via PCI PRI. This is not always true as some emerging
devices are designed to handle the I/O page faults by themselves without
ever sending PCI page requests nor advertising PRI capability.

Refactor the SVA and IOPF code to allow SVA support with IOPF handled
either by IOMMU (PCI PRI) or device driver (device-specific IOPF).

This series is based on v6.3-rc1 and also available at github:
https://github.com/LuBaolu/intel-iommu/commits/intel-iommu-refactor-iopf-v3

Change log:
v3:
 - Split removing unnecessary checks in iopf disabling path into a
   separate patch.
 - Add some in-line comments.

v2:
 - https://lore.kernel.org/linux-iommu/20230309025639.26109-1-baolu.lu@linux.intel.com/
 - Separate a fix patch and merge it into v6. 3-rc1 [commit 60b1daa3b168
   ("iommu/vt-d: Fix error handling in sva enable/disable paths")]
 - Disallow device-specific IOPF is device advertising PRI capability;
 - Add some extra patches to move all IOPF related code to the IOPF
   enabling/disabling paths.

v1: Initial post
 - https://lore.kernel.org/linux-iommu/20230203084456.469641-1-baolu.lu@linux.intel.com/

Lu Baolu (6):
  dmaengine: idxd: Add enable/disable device IOPF feature
  iommu/vt-d: Allow SVA with device-specific IOPF
  iommu/vt-d: Move iopf code from SVA to IOPF enabling path
  iommu/vt-d: Move pfsid and ats_qdep calculation to device probe path
  iommu/vt-d: Move PRI handling to IOPF feature path
  iommu/vt-d: Remove unnecessary checks in iopf disabling path

 drivers/dma/idxd/init.c     |  31 +++++++--
 drivers/iommu/intel/iommu.c | 132 ++++++++++++++++++++++++------------
 2 files changed, 112 insertions(+), 51 deletions(-)