From: Douglas Anderson <dianders@chromium.org> To: gregkh@linuxfoundation.org, rafael@kernel.org, rafael.j.wysocki@intel.com, will@kernel.org, robin.murphy@arm.com, joro@8bytes.org, bjorn.andersson@linaro.org, ulf.hansson@linaro.org, adrian.hunter@intel.com, bhelgaas@google.com Cc: robdclark@chromium.org, linux-arm-msm@vger.kernel.org, linux-pci@vger.kernel.org, quic_c_gdjako@quicinc.com, iommu@lists.linux-foundation.org, sonnyrao@chromium.org, saiprakash.ranjan@codeaurora.org, linux-mmc@vger.kernel.org, vbadigan@codeaurora.org, rajatja@google.com, saravanak@google.com, joel@joelfernandes.org, Douglas Anderson <dianders@chromium.org>, linux-kernel@vger.kernel.org Subject: [PATCH 5/6] iommu: Stop reaching into PCIe devices to decide strict vs. non-strict Date: Mon, 21 Jun 2021 16:52:47 -0700 [thread overview] Message-ID: <20210621165230.5.I091ed869d3b324a483a355d873ce6bf1dc2da5ba@changeid> (raw) In-Reply-To: <20210621235248.2521620-1-dianders@chromium.org> We now have a way for PCIe devices to force iommu.strict through the "struct device" and that's now hooked up. Let's remove the special case for PCIe devices. NOTE: there are still other places in this file that make decisions based on the PCIe "untrusted" status. This patch only handles removing the one related to iommu.strict. Removing the other cases is left as an exercise to the reader. Signed-off-by: Douglas Anderson <dianders@chromium.org> --- drivers/iommu/dma-iommu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c index 7bcdd1205535..e50c06ce1a6b 100644 --- a/drivers/iommu/dma-iommu.c +++ b/drivers/iommu/dma-iommu.c @@ -368,7 +368,7 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base, init_iova_domain(iovad, 1UL << order, base_pfn); - if (!cookie->fq_domain && (!dev || !dev_is_untrusted(dev)) && + if (!cookie->fq_domain && domain->ops->flush_iotlb_all && !iommu_get_dma_strict(domain)) { if (init_iova_flush_queue(iovad, iommu_dma_flush_iotlb_all, iommu_dma_entry_dtor)) -- 2.32.0.288.g62a8d224e6-goog
WARNING: multiple messages have this Message-ID (diff)
From: Douglas Anderson <dianders@chromium.org> To: gregkh@linuxfoundation.org, rafael@kernel.org, rafael.j.wysocki@intel.com, will@kernel.org, robin.murphy@arm.com, joro@8bytes.org, bjorn.andersson@linaro.org, ulf.hansson@linaro.org, adrian.hunter@intel.com, bhelgaas@google.com Cc: robdclark@chromium.org, linux-kernel@vger.kernel.org, saravanak@google.com, linux-arm-msm@vger.kernel.org, linux-mmc@vger.kernel.org, quic_c_gdjako@quicinc.com, Douglas Anderson <dianders@chromium.org>, iommu@lists.linux-foundation.org, linux-pci@vger.kernel.org, joel@joelfernandes.org, rajatja@google.com, sonnyrao@chromium.org, vbadigan@codeaurora.org Subject: [PATCH 5/6] iommu: Stop reaching into PCIe devices to decide strict vs. non-strict Date: Mon, 21 Jun 2021 16:52:47 -0700 [thread overview] Message-ID: <20210621165230.5.I091ed869d3b324a483a355d873ce6bf1dc2da5ba@changeid> (raw) In-Reply-To: <20210621235248.2521620-1-dianders@chromium.org> We now have a way for PCIe devices to force iommu.strict through the "struct device" and that's now hooked up. Let's remove the special case for PCIe devices. NOTE: there are still other places in this file that make decisions based on the PCIe "untrusted" status. This patch only handles removing the one related to iommu.strict. Removing the other cases is left as an exercise to the reader. Signed-off-by: Douglas Anderson <dianders@chromium.org> --- drivers/iommu/dma-iommu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c index 7bcdd1205535..e50c06ce1a6b 100644 --- a/drivers/iommu/dma-iommu.c +++ b/drivers/iommu/dma-iommu.c @@ -368,7 +368,7 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base, init_iova_domain(iovad, 1UL << order, base_pfn); - if (!cookie->fq_domain && (!dev || !dev_is_untrusted(dev)) && + if (!cookie->fq_domain && domain->ops->flush_iotlb_all && !iommu_get_dma_strict(domain)) { if (init_iova_flush_queue(iovad, iommu_dma_flush_iotlb_all, iommu_dma_entry_dtor)) -- 2.32.0.288.g62a8d224e6-goog _______________________________________________ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/iommu
next prev parent reply other threads:[~2021-06-21 23:53 UTC|newest] Thread overview: 68+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-06-21 23:52 [PATCH 0/6] iommu: Enable devices to request non-strict DMA, starting with QCom SD/MMC Douglas Anderson 2021-06-21 23:52 ` Douglas Anderson 2021-06-21 23:52 ` [PATCH 1/6] drivers: base: Add the concept of "pre_probe" to drivers Douglas Anderson 2021-06-21 23:52 ` Douglas Anderson 2021-06-24 13:35 ` Greg KH 2021-06-24 13:35 ` Greg KH 2021-06-21 23:52 ` [PATCH 2/6] drivers: base: Add bits to struct device to control iommu strictness Douglas Anderson 2021-06-21 23:52 ` Douglas Anderson 2021-06-24 13:36 ` Greg KH 2021-06-24 13:36 ` Greg KH 2021-06-24 13:42 ` Doug Anderson 2021-06-24 13:42 ` Doug Anderson 2021-06-21 23:52 ` [PATCH 3/6] PCI: Indicate that we want to force strict DMA for untrusted devices Douglas Anderson 2021-06-21 23:52 ` Douglas Anderson 2021-06-24 13:38 ` Greg KH 2021-06-24 13:38 ` Greg KH 2021-06-24 13:46 ` Doug Anderson 2021-06-24 13:46 ` Doug Anderson 2021-06-21 23:52 ` [PATCH 4/6] iommu: Combine device strictness requests with the global default Douglas Anderson 2021-06-21 23:52 ` Douglas Anderson 2021-06-22 2:03 ` Lu Baolu 2021-06-22 2:03 ` Lu Baolu 2021-06-22 16:53 ` Doug Anderson 2021-06-22 16:53 ` Doug Anderson 2021-06-22 17:01 ` Doug Anderson 2021-06-22 17:01 ` Doug Anderson 2021-06-22 2:55 ` Saravana Kannan 2021-06-22 2:55 ` Saravana Kannan via iommu 2021-06-22 16:40 ` Doug Anderson 2021-06-22 16:40 ` Doug Anderson 2021-06-22 19:50 ` Saravana Kannan 2021-06-22 19:50 ` Saravana Kannan via iommu 2021-06-22 11:49 ` Robin Murphy 2021-06-22 11:49 ` Robin Murphy 2021-06-22 18:45 ` Rajat Jain 2021-06-22 18:45 ` Rajat Jain via iommu 2021-06-22 19:35 ` Doug Anderson 2021-06-22 19:35 ` Doug Anderson 2021-06-21 23:52 ` Douglas Anderson [this message] 2021-06-21 23:52 ` [PATCH 5/6] iommu: Stop reaching into PCIe devices to decide strict vs. non-strict Douglas Anderson 2021-06-21 23:52 ` [PATCH 6/6] mmc: sdhci-msm: Request non-strict IOMMU mode Douglas Anderson 2021-06-21 23:52 ` Douglas Anderson 2021-06-24 13:43 ` Greg KH 2021-06-24 13:43 ` Greg KH 2021-06-24 14:00 ` Doug Anderson 2021-06-24 14:00 ` Doug Anderson 2021-06-22 11:35 ` [PATCH 0/6] iommu: Enable devices to request non-strict DMA, starting with QCom SD/MMC Robin Murphy 2021-06-22 11:35 ` Robin Murphy 2021-06-22 16:06 ` Doug Anderson 2021-06-22 16:06 ` Doug Anderson 2021-06-22 20:02 ` Rob Herring 2021-06-22 20:02 ` Rob Herring 2021-06-22 20:05 ` Saravana Kannan 2021-06-22 20:05 ` Saravana Kannan via iommu 2021-06-22 20:10 ` Doug Anderson 2021-06-22 20:10 ` Doug Anderson 2021-06-23 13:54 ` Rob Herring 2021-06-23 13:54 ` Rob Herring 2021-06-22 22:10 ` Robin Murphy 2021-06-22 22:10 ` Robin Murphy 2021-06-23 17:29 ` Doug Anderson 2021-06-23 17:29 ` Doug Anderson 2021-06-24 17:23 ` Doug Anderson 2021-06-24 17:23 ` Doug Anderson 2021-06-22 17:39 ` John Garry 2021-06-22 17:39 ` John Garry 2021-06-22 19:50 ` Doug Anderson 2021-06-22 19:50 ` Doug Anderson
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20210621165230.5.I091ed869d3b324a483a355d873ce6bf1dc2da5ba@changeid \ --to=dianders@chromium.org \ --cc=adrian.hunter@intel.com \ --cc=bhelgaas@google.com \ --cc=bjorn.andersson@linaro.org \ --cc=gregkh@linuxfoundation.org \ --cc=iommu@lists.linux-foundation.org \ --cc=joel@joelfernandes.org \ --cc=joro@8bytes.org \ --cc=linux-arm-msm@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-mmc@vger.kernel.org \ --cc=linux-pci@vger.kernel.org \ --cc=quic_c_gdjako@quicinc.com \ --cc=rafael.j.wysocki@intel.com \ --cc=rafael@kernel.org \ --cc=rajatja@google.com \ --cc=robdclark@chromium.org \ --cc=robin.murphy@arm.com \ --cc=saiprakash.ranjan@codeaurora.org \ --cc=saravanak@google.com \ --cc=sonnyrao@chromium.org \ --cc=ulf.hansson@linaro.org \ --cc=vbadigan@codeaurora.org \ --cc=will@kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.