Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp358252pxj; Wed, 16 Jun 2021 04:11:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxZm1oP6uyu59Ga7HamIpwKuM7/Cj9UP3/Oomxml/dUjx/YiUf6Wnkzj6a4vrKa/mgzwJea X-Received: by 2002:a05:6e02:1b8f:: with SMTP id h15mr3378139ili.151.1623841910805; Wed, 16 Jun 2021 04:11:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623841910; cv=none; d=google.com; s=arc-20160816; b=mn94+Ar/BdOAgqRcFO8Nanlm9aFYHeAtDGVUXBItKEljUcknKV3cVAZbtHX4YIWTZ5 Hwu+6lbXmB07AdvZBR6jS9qRVT0chFx6B9vQsDHov+nP+yyQZka13HzzWTDYiu3IWDuy dxVxL9u7dIj2cDZ/69pQLkPGM11AYTJviNFHyLodYOYn4kG1sgxNi4QXvki9h/DGe+ZN Q9v4HiZgYgYDRkkHKjZmctd3OFTe7MTF5PDcj2DDACOKa4leG0uMcSXmX1+xK53x+VZ+ w/dcnIJuuPtHpp1EVfWwkj0wyr0eksaSLK9S4Iqe2E0Vv/BLLXX2MtmKzMK1fXWt9/CG Dolw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=rLFGCHPPodPAwT5PHXO533NcDkPtoCpJHCTcXPTifQ0=; b=AHzn+L4BLNgyEDKlJwBILguAWEwXt4fhp0OnmpkZvx9aSwN7mvtAInHBthW8AlWLyb KUc+LDcexYjfyyrP5mWgZ/yWC0QCEyVP5gpmrb+R/yBdXY5PICcwXZBI7kP4A/WYK14d D80vAw3xSHP/Ce5y8RuQhsBgaUrqt3Qz8AQBWWaonPclzRJWs37SumWvfyiidBmrXnVH qtXExO8tPMiGrrMf8EjWi+T+1uDa6L90llM+g5aTlBw/aCmdymVPVqVnP2DQlquvJ/Sz Nruoqin7OXW2SC/7kZySLA3qqvrtg8EB+zunVR2zWieHIOslta398QgnhrKheB9Hx45I 0j1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p31si2558386jac.95.2021.06.16.04.11.39; Wed, 16 Jun 2021 04:11:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232412AbhFPLLL (ORCPT + 99 others); Wed, 16 Jun 2021 07:11:11 -0400 Received: from frasgout.his.huawei.com ([185.176.79.56]:3249 "EHLO frasgout.his.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232438AbhFPLLF (ORCPT ); Wed, 16 Jun 2021 07:11:05 -0400 Received: from fraeml738-chm.china.huawei.com (unknown [172.18.147.206]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4G4htZ6PGVz6JBBn; Wed, 16 Jun 2021 18:55:50 +0800 (CST) Received: from lhreml724-chm.china.huawei.com (10.201.108.75) by fraeml738-chm.china.huawei.com (10.206.15.219) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Wed, 16 Jun 2021 13:08:58 +0200 Received: from localhost.localdomain (10.69.192.58) by lhreml724-chm.china.huawei.com (10.201.108.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Wed, 16 Jun 2021 12:08:54 +0100 From: John Garry To: , , , , , CC: , , , , , , John Garry Subject: [PATCH v13 6/6] iommu: Remove mode argument from iommu_set_dma_strict() Date: Wed, 16 Jun 2021 19:03:57 +0800 Message-ID: <1623841437-211832-7-git-send-email-john.garry@huawei.com> X-Mailer: git-send-email 2.8.1 In-Reply-To: <1623841437-211832-1-git-send-email-john.garry@huawei.com> References: <1623841437-211832-1-git-send-email-john.garry@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.69.192.58] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To lhreml724-chm.china.huawei.com (10.201.108.75) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We only ever now set strict mode enabled in iommu_set_dma_strict(), so just remove the argument. Signed-off-by: John Garry Reviewed-by: Robin Murphy --- drivers/iommu/amd/init.c | 2 +- drivers/iommu/intel/iommu.c | 6 +++--- drivers/iommu/iommu.c | 5 ++--- include/linux/iommu.h | 2 +- 4 files changed, 7 insertions(+), 8 deletions(-) diff --git a/drivers/iommu/amd/init.c b/drivers/iommu/amd/init.c index fb3618af643b..7bc460052678 100644 --- a/drivers/iommu/amd/init.c +++ b/drivers/iommu/amd/init.c @@ -3099,7 +3099,7 @@ static int __init parse_amd_iommu_options(char *str) for (; *str; ++str) { if (strncmp(str, "fullflush", 9) == 0) { pr_warn("amd_iommu=fullflush deprecated; use iommu.strict instead\n"); - iommu_set_dma_strict(true); + iommu_set_dma_strict(); } if (strncmp(str, "force_enable", 12) == 0) amd_iommu_force_enable = true; diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c index d586990fa751..0618c35cfb51 100644 --- a/drivers/iommu/intel/iommu.c +++ b/drivers/iommu/intel/iommu.c @@ -454,7 +454,7 @@ static int __init intel_iommu_setup(char *str) iommu_dma_forcedac = true; } else if (!strncmp(str, "strict", 6)) { pr_warn("intel_iommu=strict deprecated; use iommu.strict instead\n"); - iommu_set_dma_strict(true); + iommu_set_dma_strict(); } else if (!strncmp(str, "sp_off", 6)) { pr_info("Disable supported super page\n"); intel_iommu_superpage = 0; @@ -4382,7 +4382,7 @@ int __init intel_iommu_init(void) */ if (cap_caching_mode(iommu->cap)) { pr_warn("IOMMU batching disallowed due to virtualization\n"); - iommu_set_dma_strict(true); + iommu_set_dma_strict(); } iommu_device_sysfs_add(&iommu->iommu, NULL, intel_iommu_groups, @@ -5699,7 +5699,7 @@ static void quirk_calpella_no_shadow_gtt(struct pci_dev *dev) } else if (dmar_map_gfx) { /* we have to ensure the gfx device is idle before we flush */ pci_info(dev, "Disabling batched IOTLB flush on Ironlake\n"); - iommu_set_dma_strict(true); + iommu_set_dma_strict(); } } DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_INTEL, 0x0040, quirk_calpella_no_shadow_gtt); diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 60b1ec42e73b..ff221d3ddcbc 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -349,10 +349,9 @@ static int __init iommu_dma_setup(char *str) } early_param("iommu.strict", iommu_dma_setup); -void iommu_set_dma_strict(bool strict) +void iommu_set_dma_strict(void) { - if (strict || !(iommu_cmd_line & IOMMU_CMD_LINE_STRICT)) - iommu_dma_strict = strict; + iommu_dma_strict = true; } bool iommu_get_dma_strict(struct iommu_domain *domain) diff --git a/include/linux/iommu.h b/include/linux/iommu.h index 32d448050bf7..754f67d6dd90 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -476,7 +476,7 @@ int iommu_enable_nesting(struct iommu_domain *domain); int iommu_set_pgtable_quirks(struct iommu_domain *domain, unsigned long quirks); -void iommu_set_dma_strict(bool val); +void iommu_set_dma_strict(void); bool iommu_get_dma_strict(struct iommu_domain *domain); extern int report_iommu_fault(struct iommu_domain *domain, struct device *dev, -- 2.26.2