Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp535954imu; Mon, 26 Nov 2018 14:35:59 -0800 (PST) X-Google-Smtp-Source: AFSGD/Vs4bi5nERpA0Wdy2lyXWlGz8TBWTiyqQMx4TMNXZwn06BTZbk3rJV2yBgJubCQcgOhtnor X-Received: by 2002:a17:902:a710:: with SMTP id w16mr29268399plq.95.1543271759394; Mon, 26 Nov 2018 14:35:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543271759; cv=none; d=google.com; s=arc-20160816; b=ZhUTlZQhMh+Myer18qFcHNNbMErkkF0kkJ6MR6FRwKQV1XMxMugCANrpjFFaqlBvyj haswbB+JxT3z11tnXvlg0Ct9Hdyuc3f068SfVP34ZxMeiRMH7hBj4ZE4AqCqunWhFn6w 1QMFm9V0Siyox3xDbz2f5zJ1PD0fCiDF6kgVJ7ZBLLQwV8YSjqi0o7XVTZDLBYyYBQae xCrD/tf0e53nGM+f1ouPqEg8ZM9aNXdmwgkn1FK7U4iqqRyGP4RyORTSYPZyV7DPNtar wZJj4EjKmNDUd1LY+t1N7KcsVQHCNPBzimLwzRCWVJp+voT1V/cx5Ulw2oNHk14f9Ssb +Ppw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=8Op0NzkQKKjFA09xP+KudlsrTJbMCeSHmCx7+v6qzCg=; b=IQSESkh1o56vYrOxpFYoRE3Tm3I5bdlPzXZbV1YxI0TA6skh6fRTc7stdlTc6bcsy+ aqB9jm5sReLnytVoAC1Jcmd1KFS1dSxUVUzxlzhzezFunqmSdCzuHXDf3Lid429ndflR +8aquUPIoZXavAWxOXxOyqV9mms327PaZkxGrPSpPt4exKzBfF7LxxomK9ggko2/yN2Z GStCY3DSc6rNHpQbu9CzwNMGeg17vND7IkeVVlCaBOlIzSrMEJ3K1GFG1/+Gx2K2zHeX rXBJ3F/OUAtTxUFigolrbZYCckfgmZkBie5glJ8/BIwlXrK9epkjv6vL0RYIN7TYQFty GEXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y22si1841493pfa.6.2018.11.26.14.35.44; Mon, 26 Nov 2018 14:35:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727491AbeK0Ja3 (ORCPT + 99 others); Tue, 27 Nov 2018 04:30:29 -0500 Received: from mail.windriver.com ([147.11.1.11]:50081 "EHLO mail.windriver.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726516AbeK0Ja2 (ORCPT ); Tue, 27 Nov 2018 04:30:28 -0500 Received: from ALA-HCA.corp.ad.wrs.com ([147.11.189.40]) by mail.windriver.com (8.15.2/8.15.1) with ESMTPS id wAQMYTmK007478 (version=TLSv1 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 26 Nov 2018 14:34:29 -0800 (PST) Received: from yow-cube1.wrs.com (128.224.56.98) by ALA-HCA.corp.ad.wrs.com (147.11.189.40) with Microsoft SMTP Server id 14.3.408.0; Mon, 26 Nov 2018 14:34:28 -0800 From: Paul Gortmaker To: Joerg Roedel CC: , , Paul Gortmaker , Will Deacon , Robin Murphy , Nate Watterson , Subject: [PATCH 8/9] iommu: arm-smmu: make it explicitly non-modular Date: Mon, 26 Nov 2018 17:31:37 -0500 Message-ID: <1543271498-28966-9-git-send-email-paul.gortmaker@windriver.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1543271498-28966-1-git-send-email-paul.gortmaker@windriver.com> References: <1543271498-28966-1-git-send-email-paul.gortmaker@windriver.com> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The Kconfig currently controlling compilation of this code is: drivers/iommu/Kconfig:config ARM_SMMU drivers/iommu/Kconfig: bool "ARM Ltd. System MMU (SMMU) Support" ...meaning that it currently is not being built as a module by anyone. Lets remove the modular code that is essentially orphaned, so that when reading the driver there is no doubt it is builtin-only. Since module_platform_driver() uses the same init level priority as builtin_platform_driver() the init ordering remains unchanged with this commit. We explicitly disallow a driver unbind, since that doesn't have a sensible use case anyway, but unlike most drivers, we can't delete the function tied to the ".remove" field. This is because as of commit 7aa8619a66ae ("iommu/arm-smmu-v3: Implement shutdown method") the .remove function was given a one line wrapper and re-used to provide a .shutdown service. So we delete the wrapper and re-name the function from remove to shutdown. We add a moduleparam.h include since the file does actually declare some module parameters, and leaving them as such is the easiest way currently to remain backwards compatible with existing use cases. We also delete the MODULE_LICENSE tag etc. since all that information is already contained at the top of the file in the comments. Cc: Will Deacon Cc: Joerg Roedel Cc: Robin Murphy Cc: Nate Watterson Cc: linux-arm-kernel@lists.infradead.org Cc: iommu@lists.linux-foundation.org Signed-off-by: Paul Gortmaker --- drivers/iommu/arm-smmu.c | 32 +++++++++++++------------------- 1 file changed, 13 insertions(+), 19 deletions(-) diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c index 5a28ae892504..4a2e143fdf52 100644 --- a/drivers/iommu/arm-smmu.c +++ b/drivers/iommu/arm-smmu.c @@ -41,7 +41,8 @@ #include #include #include -#include +#include +#include #include #include #include @@ -101,6 +102,10 @@ #define MSI_IOVA_LENGTH 0x100000 static int force_stage; +/* + * not really modular, but the easiest way to keep compat with existing + * bootargs behaviour is to continue using module_param() here. + */ module_param(force_stage, int, S_IRUGO); MODULE_PARM_DESC(force_stage, "Force SMMU mappings to be installed at a particular stage of translation. A value of '1' or '2' forces the corresponding stage. All other values are ignored (i.e. no stage is forced). Note that selecting a specific stage will disable support for nested translation."); @@ -1964,7 +1969,6 @@ static const struct of_device_id arm_smmu_of_match[] = { { .compatible = "cavium,smmu-v2", .data = &cavium_smmuv2 }, { }, }; -MODULE_DEVICE_TABLE(of, arm_smmu_of_match); #ifdef CONFIG_ACPI static int acpi_smmu_get_data(u32 model, struct arm_smmu_device *smmu) @@ -2224,24 +2228,18 @@ static int arm_smmu_legacy_bus_init(void) } device_initcall_sync(arm_smmu_legacy_bus_init); -static int arm_smmu_device_remove(struct platform_device *pdev) +static void arm_smmu_device_shutdown(struct platform_device *pdev) { struct arm_smmu_device *smmu = platform_get_drvdata(pdev); if (!smmu) - return -ENODEV; + return; if (!bitmap_empty(smmu->context_map, ARM_SMMU_MAX_CBS)) dev_err(&pdev->dev, "removing device with active domains!\n"); /* Turn the thing off */ writel(sCR0_CLIENTPD, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0); - return 0; -} - -static void arm_smmu_device_shutdown(struct platform_device *pdev) -{ - arm_smmu_device_remove(pdev); } static int __maybe_unused arm_smmu_pm_resume(struct device *dev) @@ -2256,16 +2254,12 @@ static SIMPLE_DEV_PM_OPS(arm_smmu_pm_ops, NULL, arm_smmu_pm_resume); static struct platform_driver arm_smmu_driver = { .driver = { - .name = "arm-smmu", - .of_match_table = of_match_ptr(arm_smmu_of_match), - .pm = &arm_smmu_pm_ops, + .name = "arm-smmu", + .of_match_table = of_match_ptr(arm_smmu_of_match), + .pm = &arm_smmu_pm_ops, + .suppress_bind_attrs = true, }, .probe = arm_smmu_device_probe, - .remove = arm_smmu_device_remove, .shutdown = arm_smmu_device_shutdown, }; -module_platform_driver(arm_smmu_driver); - -MODULE_DESCRIPTION("IOMMU API for ARM architected SMMU implementations"); -MODULE_AUTHOR("Will Deacon "); -MODULE_LICENSE("GPL v2"); +builtin_platform_driver(arm_smmu_driver); -- 2.7.4