Stefan,<div><br></div><div>I have tested the patch series on Power8, Intel, along with ARM and updated the bug with the test information, and the git repo I sent the pull request from. A kernel with the patches is available in PPA <a href="https://launchpad.net/~centriq-team/+archive/ubuntu/sru/">https://launchpad.net/~centriq-team/+archive/ubuntu/sru/</a></div><div><br></div><div>Could you please review and consider for SRU?</div><div><br></div><div><div>The following changes since commit 6e2b676684d740b6c781cf631453127f3f4d7631:</div><div><br></div><div> UBUNTU: Ubuntu-4.10.0-21.23 (2017-04-28 12:46:22 +0200)</div><div><br></div><div>are available in the git repository at:</div><div><br></div><div> git+<a href="ssh://git.launchpad.net/~centriq-team/+git/linux-sru">ssh://git.launchpad.net/~centriq-team/+git/linux-sru</a> lp1688158</div><div><br></div><div>for you to fetch changes up to f45d8d99d2a3c36cce6a1a64d4c36bc37088fe32:</div><div><br></div><div> iommu/vt-d: Fix crash on boot when DMAR is disabled (2017-05-30 14:50:40 -0500)</div><div><br></div><div>----------------------------------------------------------------</div><div>Andy Shevchenko (1):</div><div> iommu/vt-d: Fix crash on boot when DMAR is disabled</div><div><br></div><div>Joerg Roedel (7):</div><div> iommu: Rename iommu_get_instance()</div><div> iommu: Rename struct iommu_device</div><div> iommu: Introduce new 'struct iommu_device'</div><div> iommu: Add sysfs bindings for struct iommu_device</div><div> iommu: Make iommu_device_link/unlink take a struct iommu_device</div><div> iommu: Add iommu_device_set_fwnode() interface</div><div> iommu/arm-smmu: Make use of the iommu_register interface</div><div><br></div><div>Will Deacon (6):</div><div> iommu/arm-smmu: Restrict domain attributes to UNMANAGED domains</div><div> iommu/arm-smmu: Install bypass S2CRs for IOMMU_DOMAIN_IDENTITY domains</div><div> iommu/arm-smmu-v3: Make arm_smmu_install_ste_for_dev return void</div><div> iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY domains</div><div> iommu: Allow default domain type to be set on the kernel command line</div><div> arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA</div><div><br></div><div> Documentation/admin-guide/kernel-parameters.txt | 6 ++</div><div> arch/arm64/mm/dma-mapping.c | 17 +++--</div><div> drivers/acpi/arm64/iort.c | 2 +-</div><div> drivers/iommu/amd_iommu.c | 18 +++--</div><div> drivers/iommu/amd_iommu_init.c | 9 ++-</div><div> drivers/iommu/amd_iommu_types.h | 4 +-</div><div> drivers/iommu/arm-smmu-v3.c | 98 +++++++++++++++++--------</div><div> drivers/iommu/arm-smmu.c | 56 +++++++++++++-</div><div> drivers/iommu/dmar.c | 22 ++++--</div><div> drivers/iommu/intel-iommu.c | 21 +++---</div><div> drivers/iommu/iommu-sysfs.c | 61 +++++++--------</div><div> drivers/iommu/iommu.c | 61 ++++++++++++---</div><div> include/linux/intel-iommu.h | 3 +-</div><div> include/linux/iommu.h | 78 ++++++++++++++++----</div><div> include/linux/of_iommu.h | 2 +-</div><div> 15 files changed, 329 insertions(+), 129 deletions(-)</div></div><div><br></div><div><br></div><div>Thanks </div><div>Manoj Iyer<br><br>On Tue, May 23, 2017 at 4:00 AM, Stefan Bader <stefan.bader@canonical.com> wrote:<br>
<blockquote type="cite"><div class="plaintext" style="white-space: pre-wrap;">On 20.05.2017 04:40, Manoj Iyer wrote:
<blockquote> Paolo found build issues with the patch series I had sent earlier and nak'ed it
because of build failure. Rather than sending large number of patches with git
send-email I am resending these as a pull-request (I should have done this
initially).
I am resending the patch series to add support for SMMU passthrough using the
default domain, the patch series implements a kernel command-line option
iommu.passthrough=0/1 1 - Bypass the IOMMU for DMA, 0 - Use IOMMU translation
for DMA. This feature is desired on both Qualcomm Centriq 2400 and Thunder-X
platforms.
The bug report <a href="http://bugs.launchpad.net/bugs/1688158">http://bugs.launchpad.net/bugs/1688158</a> has detailed test
results from Qualcomm demonstrating performance improvements using passthrough.
I have also tested the kernel on Thundex-X for any regressions, for both boot
test and pci passthrough.
I builtsuccessfully the kernel in the centriq ppa with patches applied to zesty
master for ARM64, AMD64 and i386.
<a href="https://launchpad.net/~centriq-team/+archive/ubuntu/sru/+packages">https://launchpad.net/~centriq-team/+archive/ubuntu/sru/+packages</a>
Please consider this patch series for review and SRU to zesty.
The following changes since commit 6e2b676684d740b6c781cf631453127f3f4d7631:
UBUNTU: Ubuntu-4.10.0-21.23 (2017-04-28 12:46:22 +0200)
are available in the git repository at:
git+<a href="ssh://git.launchpad.net/~centriq-team/+git/linux-sru">ssh://git.launchpad.net/~centriq-team/+git/linux-sru</a> lp1688158
for you to fetch changes up to ac9d3fd2c6f4a7d7bd0d3329ac073eca1961f8e5:
arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA (2017-05-19
14:40:57 -0500)
----------------------------------------------------------------
Joerg Roedel (7):
iommu: Rename iommu_get_instance()
iommu: Rename struct iommu_device
iommu: Introduce new 'struct iommu_device'
iommu: Add sysfs bindings for struct iommu_device
iommu: Make iommu_device_link/unlink take a struct iommu_device
iommu: Add iommu_device_set_fwnode() interface
</blockquote>
This, again, contains changes in the area of IOMMU that are not isolated to
arm64 systems (specifically iommu_amd and iommu_intel) while regression testing
I can see only was done for arm64.
I cannot ACK this under this conditions.
-Stefan
<blockquote> iommu/arm-smmu: Make use of the iommu_register interface
Will Deacon (6):
iommu/arm-smmu: Restrict domain attributes to UNMANAGED domains
iommu/arm-smmu: Install bypass S2CRs for IOMMU_DOMAIN_IDENTITY domains
iommu/arm-smmu-v3: Make arm_smmu_install_ste_for_dev return void
iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY domains
iommu: Allow default domain type to be set on the kernel command line
arm64: dma-mapping: Only swizzle DMA ops for IOMMU_DOMAIN_DMA
Documentation/admin-guide/kernel-parameters.txt | 6 ++
arch/arm64/mm/dma-mapping.c | 17 +++--
drivers/acpi/arm64/iort.c | 2 +-
drivers/iommu/amd_iommu.c | 18 +++--
drivers/iommu/amd_iommu_init.c | 9 ++-
drivers/iommu/amd_iommu_types.h | 4 +-
drivers/iommu/arm-smmu-v3.c | 98 +++++++++++++++++--------
drivers/iommu/arm-smmu.c | 56 +++++++++++++-
drivers/iommu/dmar.c | 20 +++--
drivers/iommu/intel-iommu.c | 21 +++---
drivers/iommu/iommu-sysfs.c | 61 +++++++--------
drivers/iommu/iommu.c | 61 ++++++++++++---
include/linux/intel-iommu.h | 3 +-
include/linux/iommu.h | 78 ++++++++++++++++----
include/linux/of_iommu.h | 2 +-
15 files changed, 327 insertions(+), 129 deletions(-)
</blockquote>
</div><div class="plaintext" style="white-space: pre-wrap;">--
kernel-team mailing list
<a href="mailto:kernel-team@lists.ubuntu.com">kernel-team@lists.ubuntu.com</a>
<a href="https://lists.ubuntu.com/mailman/listinfo/kernel-team">https://lists.ubuntu.com/mailman/listinfo/kernel-team</a>
</div></blockquote></div>