Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3504127pxv; Mon, 26 Jul 2021 05:45:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyDC8b8DTsuJxw8fY4f3bw94f4ECGVGQn1WNqu6yKNrgGaooOx4Fdv5wSf4RY12yjarHbNF X-Received: by 2002:a17:906:38ce:: with SMTP id r14mr16433917ejd.268.1627303533214; Mon, 26 Jul 2021 05:45:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627303533; cv=none; d=google.com; s=arc-20160816; b=C6bxz7mQAvLTEGTJ8KWv154qZ0fePt3oCgg/e4bKjbEbRYEsWCfLs85cDmE5hS2waR rYXwwYy99cLbDl+oOMnUG/klNP0BwezcikDZ4mgPP97RzpBxuI2JIm+i0eCH3V5g8Stj GEElCom6CmapQMEFfmAJjPukSLcBG1b5IJ3+LhQ/qHBhxSf45v9Wj8lZKSCmVBSIWmlm +Aj+WeeVaMen3uaAByvSYjMRXAqD1PnVvsbCLLs5epFZXQrY4ecJ4ChKtA0tWAHWYyFM frfQv6Ky9Pt3/tsJTH08LvLmoWXC6sryODtBCVFiEcD45PVBVzCGCV7ymTQlxIvQRx2W Lhww== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=kV6US/2peS0tTeIn7NLN2939VYxe0WUH1ggzokZTvik=; b=vy40yaQXIWKEo9Q56gYd+kMQCVJ+Z/oRUXRtkStTj37g/ilkM3AANyDjGJiOR8IOKG Sz8DMia24okuHR8Yo+L2BoxhQk9uWn7PmeBNgO/GfEOSyQH+S/t1voVrzAI1XicThz9M SAJ+Q8AovGZ4WRergyWdncKxfuAfILC7wJAZqiWbQJbSyixx2FtVcaM6VzEyHOyKjkwv jvpuYfYMWAJsnCh9BG4jxLVIEwzQylGNShtqa7j9nIicfpfIb0GU/gB/PKJju7JXY9ko tRwxAga8c1sDbi3/G08U5EU7dcK+NSAwjOo8CtwK6+n9RhkDa4JBWaF65U3owZYEJrY8 0Ltg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h13si22045120ede.550.2021.07.26.05.45.08; Mon, 26 Jul 2021 05:45:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234043AbhGZMDD (ORCPT + 99 others); Mon, 26 Jul 2021 08:03:03 -0400 Received: from foss.arm.com ([217.140.110.172]:51374 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233754AbhGZMDB (ORCPT ); Mon, 26 Jul 2021 08:03:01 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 844AB31B; Mon, 26 Jul 2021 05:43:30 -0700 (PDT) Received: from [10.57.36.146] (unknown [10.57.36.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 689D93F70D; Mon, 26 Jul 2021 05:43:29 -0700 (PDT) Subject: Re: [PATCH 18/23] iommu: Express DMA strictness via the domain type To: Lu Baolu , joro@8bytes.org, will@kernel.org Cc: linux-kernel@vger.kernel.org, dianders@chromium.org, iommu@lists.linux-foundation.org, linux-arm-kernel@lists.infradead.org References: <37708e21b55e17eb074ef145afc2157cd0192abe.1626888445.git.robin.murphy@arm.com> <77057c4b-479b-c5b8-4666-f16e294552d1@arm.com> <29443387-c088-480c-3d91-17b6d1cc8188@linux.intel.com> From: Robin Murphy Message-ID: <9b5abd19-8bfe-7215-8b13-108aea2aee5e@arm.com> Date: Mon, 26 Jul 2021 13:43:24 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: <29443387-c088-480c-3d91-17b6d1cc8188@linux.intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-07-26 13:29, Lu Baolu wrote: [...] >>>> diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c >>>> index b1af1ff324c5..a114a7ad88ec 100644 >>>> --- a/drivers/iommu/dma-iommu.c >>>> +++ b/drivers/iommu/dma-iommu.c >>>> @@ -363,13 +363,15 @@ static int iommu_dma_init_domain(struct >>>> iommu_domain *domain, dma_addr_t base, >>>>       init_iova_domain(iovad, 1UL << order, base_pfn); >>>> -    if (!cookie->fq_domain && !dev_is_untrusted(dev) && >>>> -        domain->ops->flush_iotlb_all && >>>> !iommu_get_dma_strict(domain)) { >>>> +    if (domain->type == IOMMU_DOMAIN_DMA_FQ && !cookie->fq_domain && >>>> +        domain->ops->flush_iotlb_all) { > > Perhaps we can remove the ops->flush_iotlb_all check with the > assumption that any vendor iommu driver with DMA_FQ domain support > should always provides this callback? Oh yes, indeed it wouldn't make sense for a driver to claim IOMMU_DOMAIN_DMA_FQ support but not implement the one thing that that needs the driver to provide. That's yet another neat little cleanup, thanks! Robin.