Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5361805pxv; Wed, 28 Jul 2021 09:01:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxggH/cGsy4LvCECdW4RKvGKxygivvZGVxWOKkucHI+DhmNjHX8UqkPKJCCLG3tQKyG2Pzh X-Received: by 2002:a17:907:1190:: with SMTP id uz16mr139277ejb.543.1627488070740; Wed, 28 Jul 2021 09:01:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627488070; cv=none; d=google.com; s=arc-20160816; b=quvLDFPypJ4jUNRoyw5O2QYBU0SVziHEHGZqEIqySpSVok/XgY+X9/Xm4I6frRnGW8 IN+XQ/94JSKltENdPMCiRWEz9+7NT2/OBm+R8Wqxg7AKO3qaEtcMiMPq4B/cnQXyQqRI LkDlN62RrTd6fEjwhg929uh3QlAcUbqmPk2uHP9U9jziu6tcuJg5cs8ik/RHMkeF3KrJ C8YqaWBBWeARj+VezEs2YGHhvGrD3JA9tvZNCBCWz/zDRAia2B5OzIx4hICyFneo1hHR Sh1MlLs/38e2jv1/5c14bHsDBRt3ogDdQotGhRvBJ4uOf9QHESAea5QyoqGBEmoO5x8n 50fg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=JbPWxm+nHHuYiWr9d/0napTrorwdkRsoAFKi1lQBPlM=; b=CKZqaB4gg8yIuPXIcT6ouSvi1sJIHr+HWhJugtnR/bFsjXI+CwFJJffALevTkoYWPt ZLqvhl6tTSWprNLOKYcffR9LJ/mtkvV2QIKfx5v+3I9wahJCiSj83mkEzeNXbOLB+oxP g9UquKP+lSteV7F+TpufrKWzjAC7Y7l8lux/zZ5FZiVZtDTtcFBEWNolSLOWSXmtyEFr CIn59kL2awL1S1ha3FRPJQHQkb3Evw/rN3dPdfsW+q5jurXGqqD78lUWQ1m5yF/YdZtd EVWXORSmH2Fj4PYn9XTUSnQjIZ5J9OeRn5utqxL1USceF+GJQAGi+nB20A2JGyZgXCCu SdUg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g18si192694ejp.458.2021.07.28.09.00.46; Wed, 28 Jul 2021 09:01:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235754AbhG1P7T (ORCPT + 99 others); Wed, 28 Jul 2021 11:59:19 -0400 Received: from foss.arm.com ([217.140.110.172]:59258 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237326AbhG1P7P (ORCPT ); Wed, 28 Jul 2021 11:59:15 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B06AA1FB; Wed, 28 Jul 2021 08:59:13 -0700 (PDT) Received: from 010265703453.arm.com (unknown [10.57.36.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 1ED633F70D; Wed, 28 Jul 2021 08:59:11 -0700 (PDT) From: Robin Murphy To: joro@8bytes.org, will@kernel.org Cc: iommu@lists.linux-foundation.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, suravee.suthikulpanit@amd.com, baolu.lu@linux.intel.com, john.garry@huawei.com, dianders@chromium.org, Marek Szyprowski Subject: [PATCH v2 05/24] iommu/exynos: Drop IOVA cookie management Date: Wed, 28 Jul 2021 16:58:26 +0100 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The core code bakes its own cookies now. CC: Marek Szyprowski Signed-off-by: Robin Murphy --- drivers/iommu/exynos-iommu.c | 18 ++++-------------- 1 file changed, 4 insertions(+), 14 deletions(-) diff --git a/drivers/iommu/exynos-iommu.c b/drivers/iommu/exynos-iommu.c index d0fbf1d10e18..34085d069cda 100644 --- a/drivers/iommu/exynos-iommu.c +++ b/drivers/iommu/exynos-iommu.c @@ -735,20 +735,16 @@ static struct iommu_domain *exynos_iommu_domain_alloc(unsigned type) /* Check if correct PTE offsets are initialized */ BUG_ON(PG_ENT_SHIFT < 0 || !dma_dev); + if (type != IOMMU_DOMAIN_DMA && type != IOMMU_DOMAIN_UNMANAGED) + return NULL; + domain = kzalloc(sizeof(*domain), GFP_KERNEL); if (!domain) return NULL; - if (type == IOMMU_DOMAIN_DMA) { - if (iommu_get_dma_cookie(&domain->domain) != 0) - goto err_pgtable; - } else if (type != IOMMU_DOMAIN_UNMANAGED) { - goto err_pgtable; - } - domain->pgtable = (sysmmu_pte_t *)__get_free_pages(GFP_KERNEL, 2); if (!domain->pgtable) - goto err_dma_cookie; + goto err_pgtable; domain->lv2entcnt = (short *)__get_free_pages(GFP_KERNEL | __GFP_ZERO, 1); if (!domain->lv2entcnt) @@ -779,9 +775,6 @@ static struct iommu_domain *exynos_iommu_domain_alloc(unsigned type) free_pages((unsigned long)domain->lv2entcnt, 1); err_counter: free_pages((unsigned long)domain->pgtable, 2); -err_dma_cookie: - if (type == IOMMU_DOMAIN_DMA) - iommu_put_dma_cookie(&domain->domain); err_pgtable: kfree(domain); return NULL; @@ -809,9 +802,6 @@ static void exynos_iommu_domain_free(struct iommu_domain *iommu_domain) spin_unlock_irqrestore(&domain->lock, flags); - if (iommu_domain->type == IOMMU_DOMAIN_DMA) - iommu_put_dma_cookie(iommu_domain); - dma_unmap_single(dma_dev, virt_to_phys(domain->pgtable), LV1TABLE_SIZE, DMA_TO_DEVICE); -- 2.25.1