Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp4368453pxk; Tue, 8 Sep 2020 19:09:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz2pbpU3eb6EFBIux/5jttTXNQkWwNrJayvC6H9zgmxXcnJXI5hNYK18pLJ66YXxpikTThh X-Received: by 2002:a17:906:1c5b:: with SMTP id l27mr1446242ejg.283.1599617395342; Tue, 08 Sep 2020 19:09:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599617395; cv=none; d=google.com; s=arc-20160816; b=jm8VSA624Vc7aWlXcit6I1t8qlrfwqdiiLheid4I2BBaH6b978SM6YUPs+gGGxmLbH kSRaCwpqNC/BX0LzU5R+QaFcinFE2KagD9uvrhVRkQAVz0Z2WYyC3oqN2416zQEzuIh5 yMP1WM+TpeodlS5PRcWALEd7u9NHVnojAmrCwZWUtC1z74oqzcTivDCFTRY994yKosSL 3b2/qwA1JA+UzzFQwt3yRHRLckgrDwRA1kTUM99AO5K3BOqQMs7Fj4JS2CvNJjZrxHO/ nargh4CBb3TNWDUyyMWANEl3KxI0fkI7XJNnR6QmVco1uqt2B9nYIkBFlpulJCc02rxU s+zg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:cc:ironport-sdr:ironport-sdr; bh=nz3srH9MYZS3Wkb2dda+OG0OTz7SuZ+qW6xNRtKAmn8=; b=fSLksMhHAMldzd+0hmGD+YR0tdepX3n1aNe61Pz0ZIPjMdmclU96kBjI5JujI/JAKf XE3yKcZrqdiBB+SCxvRxYYeU1egWFJjMiDRtjyt1Db/Z96a6D9IiPvK2Irtxp1vtt6Zm 4Q/T5U/ENJLzeOxWW0Dm2IxUqm8IxzYorm545CoOa7EazzDfCXM1zjT2R3e+TPSlhay2 oKh66jLTPbWqm7o94B5E5vZOuG9aWm+RytLrdnVxISrCEHuqYu8759WddcpLdd0z1mb9 j72XmFWU/eaNWCQhQ4Jweh4vvU3NCmETQpCFELKV8z+PQALDBDQvAl/lZGx6GXeAKw0y ujsQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y19si558620ejf.251.2020.09.08.19.09.32; Tue, 08 Sep 2020 19:09:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728954AbgIICFQ (ORCPT + 99 others); Tue, 8 Sep 2020 22:05:16 -0400 Received: from mga01.intel.com ([192.55.52.88]:59425 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726369AbgIICFP (ORCPT ); Tue, 8 Sep 2020 22:05:15 -0400 IronPort-SDR: ascVOh4eIFewb0RJvTAW/fAk8AT91Fwu7Hsgi0mCTOy0uuTSGM5yOg6m9vwZ0vjroLOSlfgTjC 3wXYvzAGHPUA== X-IronPort-AV: E=McAfee;i="6000,8403,9738"; a="176315096" X-IronPort-AV: E=Sophos;i="5.76,408,1592895600"; d="scan'208";a="176315096" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Sep 2020 19:05:04 -0700 IronPort-SDR: EwMvsQnqiow84WybRJd3Wz4IdLwdqpsZRhwF3StOI1WcwhzelaTRAF5rFeezLyrG+mPt1JIJFc 7B1B7o7lDxsg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.76,408,1592895600"; d="scan'208";a="407319111" Received: from allen-box.sh.intel.com (HELO [10.239.159.139]) ([10.239.159.139]) by fmsmga001.fm.intel.com with ESMTP; 08 Sep 2020 19:04:56 -0700 Cc: baolu.lu@linux.intel.com, Joerg Roedel , David Woodhouse , linux-kernel@vger.kernel.org Subject: Re: [PATCH V2 4/5] iommu/vt-d: Convert intel iommu driver to the iommu ops To: Tom Murphy , iommu@lists.linux-foundation.org References: <20200903201839.7327-1-murphyt7@tcd.ie> <20200903201839.7327-5-murphyt7@tcd.ie> From: Lu Baolu Message-ID: <7b0c0f62-2efa-8183-0cbc-6028feb8ec93@linux.intel.com> Date: Wed, 9 Sep 2020 09:59:11 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20200903201839.7327-5-murphyt7@tcd.ie> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/4/20 4:18 AM, Tom Murphy wrote: > +static int intel_iommu_needs_bounce_buffer(struct device *d) > +{ > + return !intel_no_bounce && dev_is_pci(d) && to_pci_dev(d)->untrusted; > +} > + > + > static void intel_iommu_probe_finalize(struct device *dev) > { > - struct iommu_domain *domain; > + dma_addr_t base = IOVA_START_PFN << VTD_PAGE_SHIFT; > + struct iommu_domain *domain = iommu_get_domain_for_dev(dev); > + struct dmar_domain *dmar_domain = to_dmar_domain(domain); > > - domain = iommu_get_domain_for_dev(dev); > - if (device_needs_bounce(dev)) > - set_dma_ops(dev, &bounce_dma_ops); > - else if (domain && domain->type == IOMMU_DOMAIN_DMA) > - set_dma_ops(dev, &intel_dma_ops); > + if (intel_iommu_needs_bounce_buffer(dev) || For untrusted devices, the DMA type of domain is enforced. There's no need to check again here. Best regards, baolu > + (domain && domain->type == IOMMU_DOMAIN_DMA)) > + iommu_setup_dma_ops(dev, base, > + __DOMAIN_MAX_ADDR(dmar_domain->gaw) - base); > else > set_dma_ops(dev, NULL); > } >