Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp533200pxj; Fri, 11 Jun 2021 05:29:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzl4mmVKgtrVpUXWVs0bGsSNiJpFW6HHjzjsA+qgg+85k25MzGXEg0kWCC21AlJnxUgYUr+ X-Received: by 2002:a17:906:af55:: with SMTP id ly21mr3290685ejb.276.1623414584362; Fri, 11 Jun 2021 05:29:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623414584; cv=none; d=google.com; s=arc-20160816; b=awyng/h/vUoTyr/Lx72B0v4oNan1FQ+5kdyPPjsFK25CG/MU+7XnKXXcvHdHG2SlHP gKwnlUNkJNJQO4pgB40/GJiDAt8Q8SkRjtUa2Mw9a9T5RBgd/FFo/D8V9Vt3YrpCE1DH FvlIobpiAMlhVyg0z7OEVgtz1M81w5q8BMT6nb4m7EFR7lKfjQkGtifGi+uIQWmc2Ew0 m0HnG9xOT0x6tZibX/1/DuIemM7DwYZ9fudJ89dKJCKR7dJiDpCT3OpaKw6u1zF2BGCx XX94r5/BR4uXnqryf8LHX+x6UCNjlgmFbMtzneNBS1X7Vj6XKg+9Gm3fTLeL+bdX2HJE O5Kg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=t4lc81W52GOMyazaR9o1avFMAESPnbj7nzPYSyq8JOs=; b=JanwBswIr+JkkJbTg15gCV+GGsqmy/6FOb4yk27EVla4smPApPZ408OUbM4QVhDhbF zUi7sUWgwkMhRFvPmcxNf6bZOxm++idbZ7H81cwDfjTeCkO9gnkad117RcuCJKEIooBb 0+0VsMnHlGKLyxUbJ7IEpdJlOgPBtoccihTeBsJeewoZJWqjo61hZFoMA0EBW1G39b2q ag3mv+o6Lm3a8lnFKlsy1FKpQPjhiYVtk4QvsIV97jznlHQ2BU7695K1tZqDXt4ct8Nk V0ioFO8dm68GUkPh+Rr4V0kKZcE/un8cB62MjBYkk6PrpKHFCnJ5deSjeGBJsQW2+3HG ZcTA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n18si4793853eja.465.2021.06.11.05.29.21; Fri, 11 Jun 2021 05:29:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231614AbhFKM2d (ORCPT + 99 others); Fri, 11 Jun 2021 08:28:33 -0400 Received: from frasgout.his.huawei.com ([185.176.79.56]:3217 "EHLO frasgout.his.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231685AbhFKM2c (ORCPT ); Fri, 11 Jun 2021 08:28:32 -0400 Received: from fraeml744-chm.china.huawei.com (unknown [172.18.147.207]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4G1fwh4ydWz6L7J8; Fri, 11 Jun 2021 20:17:08 +0800 (CST) Received: from lhreml724-chm.china.huawei.com (10.201.108.75) by fraeml744-chm.china.huawei.com (10.206.15.225) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Fri, 11 Jun 2021 14:26:33 +0200 Received: from localhost.localdomain (10.69.192.58) by lhreml724-chm.china.huawei.com (10.201.108.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Fri, 11 Jun 2021 13:26:30 +0100 From: John Garry To: , , , , CC: , , , , , John Garry Subject: [PATCH v12 5/5] iommu: Remove mode argument from iommu_set_dma_strict() Date: Fri, 11 Jun 2021 20:20:43 +0800 Message-ID: <1623414043-40745-6-git-send-email-john.garry@huawei.com> X-Mailer: git-send-email 2.8.1 In-Reply-To: <1623414043-40745-1-git-send-email-john.garry@huawei.com> References: <1623414043-40745-1-git-send-email-john.garry@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.69.192.58] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To lhreml724-chm.china.huawei.com (10.201.108.75) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We only ever now set strict mode enabled in iommu_set_dma_strict(), so just remove the argument. Signed-off-by: John Garry --- drivers/iommu/amd/init.c | 2 +- drivers/iommu/intel/iommu.c | 6 +++--- drivers/iommu/iommu.c | 5 ++--- include/linux/iommu.h | 2 +- 4 files changed, 7 insertions(+), 8 deletions(-) diff --git a/drivers/iommu/amd/init.c b/drivers/iommu/amd/init.c index 0e6ae6d68f14..27e9677ec303 100644 --- a/drivers/iommu/amd/init.c +++ b/drivers/iommu/amd/init.c @@ -3098,7 +3098,7 @@ static int __init parse_amd_iommu_options(char *str) { for (; *str; ++str) { if (strncmp(str, "fullflush", 9) == 0) - iommu_set_dma_strict(true); + iommu_set_dma_strict(); if (strncmp(str, "force_enable", 12) == 0) amd_iommu_force_enable = true; if (strncmp(str, "off", 3) == 0) diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c index 6763e516362c..e77b8b6e7838 100644 --- a/drivers/iommu/intel/iommu.c +++ b/drivers/iommu/intel/iommu.c @@ -452,7 +452,7 @@ static int __init intel_iommu_setup(char *str) pr_warn("intel_iommu=forcedac deprecated; use iommu.forcedac instead\n"); iommu_dma_forcedac = true; } else if (!strncmp(str, "strict", 6)) { - iommu_set_dma_strict(true); + iommu_set_dma_strict(); } else if (!strncmp(str, "sp_off", 6)) { pr_info("Disable supported super page\n"); intel_iommu_superpage = 0; @@ -4392,7 +4392,7 @@ int __init intel_iommu_init(void) */ if (cap_caching_mode(iommu->cap)) { pr_warn("IOMMU batching disallowed due to virtualization\n"); - iommu_set_dma_strict(true); + iommu_set_dma_strict(); } iommu_device_sysfs_add(&iommu->iommu, NULL, intel_iommu_groups, @@ -5663,7 +5663,7 @@ static void quirk_calpella_no_shadow_gtt(struct pci_dev *dev) } else if (dmar_map_gfx) { /* we have to ensure the gfx device is idle before we flush */ pci_info(dev, "Disabling batched IOTLB flush on Ironlake\n"); - iommu_set_dma_strict(true); + iommu_set_dma_strict(); } } DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x0040, quirk_calpella_no_shadow_gtt); diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index ccbd5d4c1a50..146cb71c7441 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -350,10 +350,9 @@ static int __init iommu_dma_setup(char *str) } early_param("iommu.strict", iommu_dma_setup); -void iommu_set_dma_strict(bool strict) +void iommu_set_dma_strict(void) { - if (strict || !(iommu_cmd_line & IOMMU_CMD_LINE_STRICT)) - iommu_dma_strict = strict; + iommu_dma_strict = true; } bool iommu_get_dma_strict(struct iommu_domain *domain) diff --git a/include/linux/iommu.h b/include/linux/iommu.h index 32d448050bf7..754f67d6dd90 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -476,7 +476,7 @@ int iommu_enable_nesting(struct iommu_domain *domain); int iommu_set_pgtable_quirks(struct iommu_domain *domain, unsigned long quirks); -void iommu_set_dma_strict(bool val); +void iommu_set_dma_strict(void); bool iommu_get_dma_strict(struct iommu_domain *domain); extern int report_iommu_fault(struct iommu_domain *domain, struct device *dev, -- 2.26.2