Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1835194ybb; Thu, 26 Mar 2020 08:11:07 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtYHbbcY5OrcHRY0kqcV73ccp8GV67neAtPxeiod450TbZAR/ET2twSZiO6TU28F8vxVxHO X-Received: by 2002:a05:6830:3151:: with SMTP id c17mr17906ots.310.1585235466876; Thu, 26 Mar 2020 08:11:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585235466; cv=none; d=google.com; s=arc-20160816; b=y7+DW7SzQ+tSlosn+SyVwCG8Bhw1iOx6jCVdEHq788Fu2LkF1O2rI/YddurTSwlaOm 4nvGR5qo0D/Gy9I43Nzv17ORSTHLVB8l8ywtYW84gFeH+i6c6Ani1WzFG19f6gyPdq+J M2bKjwdqLmDThPqgBushtVl0ZhPekl6F6fZDeAI/EGzx9LkX9tXyEXsCDRg0GLBsqZwv PxSJrXec2NaafNlzy91/zEiCAw5kp2Y+zihqdqKaHF/2ebljbEVqdx/k7w2B1i8KtmCl TGS1guyQy5dQMsiO9sgQlowfWpxX2lxBrMQcyzZnhC42LdHEAuUspG3e7S9fkBzOdlL9 KhuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=kxtUHyvBpudWnBM3OIt9qJDMYLFI2+64YXbhrb084CQ=; b=VQWTzNptHUQ3PsAtqa/XkKGMhB8XBC8+dgLGxH8R6uWUXSffCkuCJpTzK5g07nSQ6O lUJJDUv3oYaKZS37cVAR7xLt8R9x70+VAYyeNzRqKvQCGmLVy7WuZ0FxYPfSI92HqQK/ QDTVtyQ65VTdzzxdU/4N1W7KyR58npKriHL+vt3GOFnREPA3c5rMDnw3jm46rE8ETjo0 1PshgUtKE4tr2oWd23t8y3FoeLDCHcey8xoUjfiwxSIEXyKR98ulk0yI/kHiE8jBUiYF 46LBaMueAMBK8SAEb2rMpWlbEfpQ0wOTic+B5VGZ3DSuNfhwBkT9TM0eGkD8oxjzn1bs Qx5A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 96si1206035otm.42.2020.03.26.08.10.40; Thu, 26 Mar 2020 08:11:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728502AbgCZPJU (ORCPT + 99 others); Thu, 26 Mar 2020 11:09:20 -0400 Received: from 8bytes.org ([81.169.241.247]:55878 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728292AbgCZPIx (ORCPT ); Thu, 26 Mar 2020 11:08:53 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id DCF2BAF3; Thu, 26 Mar 2020 16:08:48 +0100 (CET) From: Joerg Roedel To: iommu@lists.linux-foundation.org Cc: linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-mediatek@lists.infradead.org, guohanjun@huawei.com, Sudeep Holla , Rob Clark , Sean Paul , Will Deacon , Robin Murphy , Joerg Roedel , Matthias Brugger , Thierry Reding , Jean-Philippe Brucker , Andy Gross , Bjorn Andersson , Greg Kroah-Hartman , Joerg Roedel Subject: [PATCH v4 15/16] iommu/virtio: Use accessor functions for iommu private data Date: Thu, 26 Mar 2020 16:08:40 +0100 Message-Id: <20200326150841.10083-16-joro@8bytes.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200326150841.10083-1-joro@8bytes.org> References: <20200326150841.10083-1-joro@8bytes.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Make use of dev_iommu_priv_set/get() functions. Reviewed-by: Jean-Philippe Brucker Signed-off-by: Joerg Roedel --- drivers/iommu/virtio-iommu.c | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/drivers/iommu/virtio-iommu.c b/drivers/iommu/virtio-iommu.c index cce329d71fba..8ead57f031f5 100644 --- a/drivers/iommu/virtio-iommu.c +++ b/drivers/iommu/virtio-iommu.c @@ -466,7 +466,7 @@ static int viommu_probe_endpoint(struct viommu_dev *viommu, struct device *dev) struct virtio_iommu_req_probe *probe; struct virtio_iommu_probe_property *prop; struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev); - struct viommu_endpoint *vdev = fwspec->iommu_priv; + struct viommu_endpoint *vdev = dev_iommu_priv_get(dev); if (!fwspec->num_ids) return -EINVAL; @@ -648,7 +648,7 @@ static int viommu_attach_dev(struct iommu_domain *domain, struct device *dev) int ret = 0; struct virtio_iommu_req_attach req; struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev); - struct viommu_endpoint *vdev = fwspec->iommu_priv; + struct viommu_endpoint *vdev = dev_iommu_priv_get(dev); struct viommu_domain *vdomain = to_viommu_domain(domain); mutex_lock(&vdomain->mutex); @@ -807,8 +807,7 @@ static void viommu_iotlb_sync(struct iommu_domain *domain, static void viommu_get_resv_regions(struct device *dev, struct list_head *head) { struct iommu_resv_region *entry, *new_entry, *msi = NULL; - struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev); - struct viommu_endpoint *vdev = fwspec->iommu_priv; + struct viommu_endpoint *vdev = dev_iommu_priv_get(dev); int prot = IOMMU_WRITE | IOMMU_NOEXEC | IOMMU_MMIO; list_for_each_entry(entry, &vdev->resv_regions, list) { @@ -876,7 +875,7 @@ static int viommu_add_device(struct device *dev) vdev->dev = dev; vdev->viommu = viommu; INIT_LIST_HEAD(&vdev->resv_regions); - fwspec->iommu_priv = vdev; + dev_iommu_priv_set(dev, vdev); if (viommu->probe_size) { /* Get additional information for this endpoint */ @@ -920,7 +919,7 @@ static void viommu_remove_device(struct device *dev) if (!fwspec || fwspec->ops != &viommu_ops) return; - vdev = fwspec->iommu_priv; + vdev = dev_iommu_priv_get(dev); iommu_group_remove_device(dev); iommu_device_unlink(&vdev->viommu->iommu, dev); -- 2.17.1