Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1314416pxa; Thu, 20 Aug 2020 08:10:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxMv4lTNvVDNBXWWOiji2C85ArNG+y8/6iNzoQqP5rEuEGQ8u8S2UtUmOq1a18jptzh5ku4 X-Received: by 2002:a17:906:868a:: with SMTP id g10mr3052694ejx.342.1597936257629; Thu, 20 Aug 2020 08:10:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597936257; cv=none; d=google.com; s=arc-20160816; b=cho0grad8lmPCBtcuBSGtLR19WxunSC9kjwMPW5FTvi/S+xPPyIfSXOLZRiOj0hRQf oU48Q0bDRn91f9pfKgzoBWgobrmmqudRR9/hy0E5SBWrA6LZP24qKU/q6FezVOEt4MAk PlV0n2knP42sozISfKmKrXiKsgAEMghlzuZLYZYlrJewOwE9m5VuaNEyfQaf3t69rW6t bX3+ScWCmFFKAOOFCCAcI4PqItfhvrKJl648RwjC3uWGsQJPqY2CmkftF2AQk3OTBN92 RUFRqY1rVNp4Cz5pFGLjalDsR46zKIPyrneNdygMVkSQNkicXtkgJu3tpDNZ70hy2Yt9 TANg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=VZYr9jKp8xj0bZmhK6+ieWHM7a+TrSAWRM2VPs0pXYY=; b=lV4njiwX2zJBrq3I5jL6+RF1SgUgQj9KjMoRtVW3exT9VQLC/89Z/HFzCGskoXUdok ctdYFBDvnLswTR1oc+9VzBthOofX6xKdMMTY1+WtJk4/GpFLga2qa0swaGaZARq52nZu bU9VcaYQvIqO7Jw6K+3smNJonTvikSykm9mbj+RipiLV395QX1XaV0wsI/HhF2Go9W+3 ZDKQZf3038UArB9n0mmCCbqR3GQ5XED/xrPsb0SSNpj9Oe+9JFfduhzHAtdP8wBAVvQS 9KItoTGXWH92FVqybQpLYj9koWf5ehcZq6RvUnAQ0+hE2wY8drohqo1nhmgrxbNlduTS 9yBw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x14si1535847edv.549.2020.08.20.08.10.33; Thu, 20 Aug 2020 08:10:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727079AbgHTPJQ (ORCPT + 99 others); Thu, 20 Aug 2020 11:09:16 -0400 Received: from foss.arm.com ([217.140.110.172]:40714 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727920AbgHTPI6 (ORCPT ); Thu, 20 Aug 2020 11:08:58 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 82CFDD6E; Thu, 20 Aug 2020 08:08:57 -0700 (PDT) Received: from e121345-lin.cambridge.arm.com (e121345-lin.cambridge.arm.com [10.1.196.37]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id E35423F6CF; Thu, 20 Aug 2020 08:08:53 -0700 (PDT) From: Robin Murphy To: hch@lst.de, joro@8bytes.org, linux@armlinux.org.uk Cc: will@kernel.org, inki.dae@samsung.com, sw0312.kim@samsung.com, kyungmin.park@samsung.com, m.szyprowski@samsung.com, agross@kernel.org, bjorn.andersson@linaro.org, thierry.reding@gmail.com, jonathanh@nvidia.com, vdumpa@nvidia.com, digetx@gmail.com, matthias.bgg@gmail.com, yong.wu@mediatek.com, geert+renesas@glider.be, magnus.damm@gmail.com, t-kristo@ti.com, s-anna@ti.com, laurent.pinchart@ideasonboard.com, linux-arm-kernel@lists.infradead.org, iommu@lists.linux-foundation.org, linux-samsung-soc@vger.kernel.org, linux-tegra@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-mediatek@lists.infradead.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 01/18] ARM/dma-mapping: Drop .dma_supported for IOMMU ops Date: Thu, 20 Aug 2020 16:08:20 +0100 Message-Id: <8bcf5f908d23883af00a42c0bb88d44d25c019f5.1597931876.git.robin.murphy@arm.com> X-Mailer: git-send-email 2.28.0.dirty In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When an IOMMU is present, we trust that it should be capable of remapping any physical memory, and since the device masks represent the input (virtual) addresses to the IOMMU it makes no sense to validate them against physical PFNs anyway. Signed-off-by: Robin Murphy --- arch/arm/mm/dma-mapping.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/arch/arm/mm/dma-mapping.c b/arch/arm/mm/dma-mapping.c index 8a8949174b1c..ffa387f343dc 100644 --- a/arch/arm/mm/dma-mapping.c +++ b/arch/arm/mm/dma-mapping.c @@ -1997,8 +1997,6 @@ static const struct dma_map_ops iommu_ops = { .map_resource = arm_iommu_map_resource, .unmap_resource = arm_iommu_unmap_resource, - - .dma_supported = arm_dma_supported, }; static const struct dma_map_ops iommu_coherent_ops = { @@ -2015,8 +2013,6 @@ static const struct dma_map_ops iommu_coherent_ops = { .map_resource = arm_iommu_map_resource, .unmap_resource = arm_iommu_unmap_resource, - - .dma_supported = arm_dma_supported, }; /** -- 2.28.0.dirty