Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp812609img; Fri, 22 Mar 2019 09:05:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqwVvmML/W56y+PrAqHakNrHiZxHecQtQ5Zp/NSMOISn4aIatL3CLnndwpqpY6/vKCy6Z6/g X-Received: by 2002:aa7:811a:: with SMTP id b26mr9713107pfi.250.1553270727695; Fri, 22 Mar 2019 09:05:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553270727; cv=none; d=google.com; s=arc-20160816; b=tfaT3sxCRA0eFhZzxzOZhjQJjnO0mf0UGx2qpSOJvhRjHP/Snk2te52ghZ/JBz0Dah oCM2kUh+pj5MNDVZBF7nLTvdemc+3FgnwIMXHQxhrlbiqS/N+x3ZFfcLWnbVFw5GaBcJ 8dJR4VL1AcjHOHnc43dOsVWuVALe7Nqcqz/8rkmGFeSaHKHwB2ijHhGLvbzoPp70o7Zb p9QEjW7DHULlKpJVJijI2jkGXdoj0PIVK/XAB1aWhiaHqu5q3OsmrGmMxMWRuRDKzD4I Srea+ZR0TVOEUv2tV+zBtQAFCAEx0GiKGw/lcwJASwWSfv2JtJ3Lw0Fqqx7xA3Cre+cF zysg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=Jy/DGkE1rAAMT9ZzwZTrmi5wyof0eS8IU7Lk55zcsKM=; b=mh/TA/FTNarOok2A/fU/gbccBmRSCKmgWLk5zwr4Y+HskkSi9VK3D0WIjgnfs/EcS4 ZkVBvb9Ym1OZW5veWjh9091I7dILbvSN6aYAVqJQ9PCmZqoPPBYid01/qgpbbnAGXdkB wPhP7JP0GtmNUe0lA5y/zH7dlElN1R5xhWqGrUDfsSAoW3bDAnb7p1qx6/Q9t+71Ii6r 9lgbhbtXtnJEeY9JHwOahVrqbC74EbQrpxO5S11kQR77BQvHKCtVAP35ZLEVW+yB7s/I 23gqoNfvGcwyyWPuuw/M5OTHHdpRGA6djnORgg3HR1/QJOM1XUGcSWRU9I6157pIx9Ef k2Tg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e6si7010064pfc.201.2019.03.22.09.05.11; Fri, 22 Mar 2019 09:05:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728874AbfCVQE3 (ORCPT + 99 others); Fri, 22 Mar 2019 12:04:29 -0400 Received: from 8bytes.org ([81.169.241.247]:58690 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727518AbfCVQE3 (ORCPT ); Fri, 22 Mar 2019 12:04:29 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id E74214A7; Fri, 22 Mar 2019 17:04:27 +0100 (CET) From: Joerg Roedel To: iommu@lists.linux-foundation.org Cc: linux-kernel@vger.kernel.org, Joerg Roedel Subject: [PATCH] iommu: Don't print warning when IOMMU driver only supports unmanaged domains Date: Fri, 22 Mar 2019 17:04:26 +0100 Message-Id: <20190322160426.1480-1-joro@8bytes.org> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Print the warning about the fall-back to IOMMU_DOMAIN_DMA in iommu_group_get_for_dev() only when such a domain was actually allocated. Otherwise the user will get misleading warnings in the kernel log when the iommu driver used doesn't support IOMMU_DOMAIN_DMA and IOMMU_DOMAIN_IDENTITY. Fixes: fccb4e3b8ab09 ('iommu: Allow default domain type to be set on the kernel command line') Signed-off-by: Joerg Roedel --- drivers/iommu/iommu.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 33a982e33716..109de67d5d72 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -1105,10 +1105,12 @@ struct iommu_group *iommu_group_get_for_dev(struct device *dev) dom = __iommu_domain_alloc(dev->bus, iommu_def_domain_type); if (!dom && iommu_def_domain_type != IOMMU_DOMAIN_DMA) { - dev_warn(dev, - "failed to allocate default IOMMU domain of type %u; falling back to IOMMU_DOMAIN_DMA", - iommu_def_domain_type); dom = __iommu_domain_alloc(dev->bus, IOMMU_DOMAIN_DMA); + if (dom) { + dev_warn(dev, + "failed to allocate default IOMMU domain of type %u; falling back to IOMMU_DOMAIN_DMA", + iommu_def_domain_type); + } } group->default_domain = dom; -- 2.16.4