Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1317207pxa; Thu, 20 Aug 2020 08:14:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyO2XAspk/AJvQxDp/qVzt0iJ4aOzxwvNvC1z0OZEJDhFAKdOL3f1fYJGldtxi0OPSx3NzL X-Received: by 2002:a17:906:6ad8:: with SMTP id q24mr3738717ejs.192.1597936457309; Thu, 20 Aug 2020 08:14:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597936457; cv=none; d=google.com; s=arc-20160816; b=HqOmcRnM/0Fs4hZY2DJc5h0hEoArCBlEj3N04OfqsWBdFaIvPMCY9XhI89xJLDdz5g zJj3p3Zm6nTXTGjxu4cz8uxjOFWfhsdWwQl6ORFQGhXeHvdXaZ4tG4iuxLx2OaIXoyb3 /h6uz1cnGmZO+31Agihc0mlzIRY3ZI4/fbq0S9qZ2eB/IKl/L5Bd0jglCggctkHRDVbW rhXNfyoaFq3c7UvyfrifcXcPXixyK7hb1Y7VzaUogltbs4YJ8un6qD+LiBfLTkHvZG2A yOcJ25Jh4e5l+rPR1XxdRXZRZbYMz/DgakS7gA9tu2mcxm2OlUmeXgvowPv6sOMYymkB s9dQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=1o7M1yqGdeXQ3QQcHlwPyjVxlIf9K/WZwjegFBYbEKM=; b=wStFGJfU517cf+13il4nmXR1udvUpoETLwLjpi6pS8KNwSP3vrq2HtmSaJdkyOAT5N mDtKSZwM4cLfGMZUs71vV7Yo5NWah5/BShqunL9a52ya54arbTlmVpgW5TqEc4Kv8vtu /9h7W9AFaZLQSejiMDm9JIcyD73ZDBD7FwKi79e6vkgzeOD2i+Pw0x1es136RwcC2JJy /zJtv42zEQs2jD4W4EGCGU64GLBM9bBk/raNBEzHCZssv70UEWqfNTQpz3CB0UqHSyvU LIuUORBRx8xa0mGx/+RxLErGlY7FZpPjV6rmXPAZxjpq5JuTJ6AGWFCtaRMWQ157TKRe UJ7Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i24si1357027eja.529.2020.08.20.08.13.53; Thu, 20 Aug 2020 08:14:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729219AbgHTPMS (ORCPT + 99 others); Thu, 20 Aug 2020 11:12:18 -0400 Received: from foss.arm.com ([217.140.110.172]:40952 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728650AbgHTPJV (ORCPT ); Thu, 20 Aug 2020 11:09:21 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7D16D1424; Thu, 20 Aug 2020 08:09:20 -0700 (PDT) Received: from e121345-lin.cambridge.arm.com (e121345-lin.cambridge.arm.com [10.1.196.37]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id DE4803F6CF; Thu, 20 Aug 2020 08:09:16 -0700 (PDT) From: Robin Murphy To: hch@lst.de, joro@8bytes.org, linux@armlinux.org.uk Cc: will@kernel.org, inki.dae@samsung.com, sw0312.kim@samsung.com, kyungmin.park@samsung.com, m.szyprowski@samsung.com, agross@kernel.org, bjorn.andersson@linaro.org, thierry.reding@gmail.com, jonathanh@nvidia.com, vdumpa@nvidia.com, digetx@gmail.com, matthias.bgg@gmail.com, yong.wu@mediatek.com, geert+renesas@glider.be, magnus.damm@gmail.com, t-kristo@ti.com, s-anna@ti.com, laurent.pinchart@ideasonboard.com, linux-arm-kernel@lists.infradead.org, iommu@lists.linux-foundation.org, linux-samsung-soc@vger.kernel.org, linux-tegra@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-mediatek@lists.infradead.org, dri-devel@lists.freedesktop.org, linux-media@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 07/18] iommu/arm-smmu: Remove arch/arm workaround Date: Thu, 20 Aug 2020 16:08:26 +0100 Message-Id: X-Mailer: git-send-email 2.28.0.dirty In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Now that arch/arm is wired up for default domains and iommu-dma, remove the add_device workaround. Signed-off-by: Robin Murphy --- drivers/iommu/arm/arm-smmu/arm-smmu.c | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu.c b/drivers/iommu/arm/arm-smmu/arm-smmu.c index 09c42af9f31e..4e52d8cb67dd 100644 --- a/drivers/iommu/arm/arm-smmu/arm-smmu.c +++ b/drivers/iommu/arm/arm-smmu/arm-smmu.c @@ -1164,17 +1164,7 @@ static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev) return -ENXIO; } - /* - * FIXME: The arch/arm DMA API code tries to attach devices to its own - * domains between of_xlate() and probe_device() - we have no way to cope - * with that, so until ARM gets converted to rely on groups and default - * domains, just say no (but more politely than by dereferencing NULL). - * This should be at least a WARN_ON once that's sorted. - */ cfg = dev_iommu_priv_get(dev); - if (!cfg) - return -ENODEV; - smmu = cfg->smmu; ret = arm_smmu_rpm_get(smmu); -- 2.28.0.dirty