Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp4416477pxv; Mon, 5 Jul 2021 23:52:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwSyEwQEASlQrYnmOJEWiRE5vQK9uma2G7X0Hh5qCO+RrBVodzzXnD6dzup8RtrCiqw4IdS X-Received: by 2002:a92:3f01:: with SMTP id m1mr13875707ila.122.1625554346131; Mon, 05 Jul 2021 23:52:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625554346; cv=none; d=google.com; s=arc-20160816; b=szLLbczYXaIsLm9dGfgJe3unOC3MK9cps5yhmK8k3lgk57e6916YbBKkjJSK7JKPCk vn/Peapomtl7D+eedJutzpmBkR9yNBJR2Dnp71Spkbwh0IiIPPJuKiPnhUINqRgSy8eZ M28LLFuZbd9uc2BcsIvPaUSg032QsMsRUE6c7wu3VcDuvzNwSq5Vc3O7F9IO+xgrWT/j Iy663q1J0OnjRDylc/aeCj2AFrUhnUG/PzBfZxZlTq4yTjH5HGgjZFfAXwGeRoRb3gbs 53Ssb/xo3fePUYdVQwuDHsTX0R7O+qBwVu2PgRCKwNEPJWFLq4aEbTGTEM/ev0YfhLbO aeiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=Zxj5KFM2NzOjH3w4gfbP75xc35g1xrIQHJNObwFVZpY=; b=crw30ra4KY0tA6ytSqGGjGOAksjwLnRZVsGaLmP4F8oOPh3/58BG13AM9bvtn8SfoP qzgBUVPkZGDUvDddYiRv2kX5FeIba3sNehJ3v/dWRK5gcWk6vW3I63q3kRliXxTjxdvl rpr36cLq2Q7Wt86w/6BdCzwcc2mvEvPGDnKYH+JpoIqInEMoD0ts9wPORzP4T8H2lsFL bcOyIuuMjzLIpu5cFy1sS0C1k89cSMvX2VTvPJlvQJ/ouvrrIJTvWh0aK2JC0M4goW9a DUS1Ar7KKinETzCTzD+Z/QQTu2UOk0z4700NcaO2uBhX2O7pBJAwjYagUYq4UAaHVzr5 S0zg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j23si16617352iog.79.2021.07.05.23.52.14; Mon, 05 Jul 2021 23:52:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230195AbhGFGxz (ORCPT + 99 others); Tue, 6 Jul 2021 02:53:55 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:48578 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230119AbhGFGxz (ORCPT ); Tue, 6 Jul 2021 02:53:55 -0400 Received: from 1.general.khfeng.us.vpn ([10.172.68.174] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.93) (envelope-from ) id 1m0evI-00077K-N5; Tue, 06 Jul 2021 06:51:13 +0000 From: Kai-Heng Feng To: joro@8bytes.org, will@kernel.org Cc: Kai-Heng Feng , Lu Baolu , iommu@lists.linux-foundation.org (open list:IOMMU DRIVERS), linux-kernel@vger.kernel.org (open list) Subject: [PATCH] iommu: Fallback to default setting when def_domain_type() callback returns 0 Date: Tue, 6 Jul 2021 14:51:06 +0800 Message-Id: <20210706065106.271765-1-kai.heng.feng@canonical.com> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit 28b41e2c6aeb ("iommu: Move def_domain type check for untrusted device into core") not only moved the check for untrusted device to IOMMU core, it also introduced a behavioral change by returning def_domain_type() directly without checking its return value. That makes many devices no longer use the default IOMMU setting. So revert back to the old behavior which defaults to iommu_def_domain_type when driver callback returns 0. Fixes: 28b41e2c6aeb ("iommu: Move def_domain type check for untrusted device into core") Signed-off-by: Kai-Heng Feng --- drivers/iommu/iommu.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 5419c4b9f27a..faac4f795025 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -1507,14 +1507,15 @@ EXPORT_SYMBOL_GPL(fsl_mc_device_group); static int iommu_get_def_domain_type(struct device *dev) { const struct iommu_ops *ops = dev->bus->iommu_ops; + unsigned int type = 0; if (dev_is_pci(dev) && to_pci_dev(dev)->untrusted) return IOMMU_DOMAIN_DMA; if (ops->def_domain_type) - return ops->def_domain_type(dev); + type = ops->def_domain_type(dev); - return 0; + return (type == 0) ? iommu_def_domain_type : type; } static int iommu_group_alloc_default_domain(struct bus_type *bus, -- 2.31.1