Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5363205pxv; Wed, 28 Jul 2021 09:02:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxUf3zzobfoEUH42Kz7wpjL56j9Xo44luGfIuVFGPS2Q0B6WcQK/xN4h1SKTm64jPAYepmL X-Received: by 2002:a05:6512:6cb:: with SMTP id u11mr236949lff.330.1627488157326; Wed, 28 Jul 2021 09:02:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627488157; cv=none; d=google.com; s=arc-20160816; b=vknQib4eo1GpxO4+Y5IZteYOphg58A9eZsk2hoO0wubNABh0OkheoMeYT2pHXVTLcN OThOgmdAPFtr+lULlm7nEoaf1TbpSbv9OcE/7P3lXxJXgETK48tzKnFv/uXuB3UwoC9Y r9KvM8lPnhhkofG055G5qC0kwXF8OlXi8a5m/u38nFVzIx5rMQ0lEiEqHvvUv52fmWtt lRNrAvn4ZrswiN68IoQpCVcL9KlFnwb6L0zP4Vtq6GjxgTtt/ADt68yWTNQ3qnMgYMBI YftGiKVE/WWuuWq0PN18Xo6w6I04mu/8QPn5E1vCpWN2+6imCqjfK8Svzu1gb3YolzTJ OAnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=6w/knKF+XhJA7Me6K56kzXU3AAIk1vp+UQA8SZL8Lac=; b=h6JnVCc62gAoLqXqnd195Pw8Plsm2TvOhHS9PfralLfDzbqlHh8m7K9kQw3e0dU8CX ylciwcGIZZhYybIOSavtd1coCIYUkT6QDu4ifYSXI7i0ZNWqIohDZdH0mrsazGpISw4R oojk3Y+DGyhlZ+M0T5esP4GMvilnY9MO5pBQkMfs++ANZZkYu7NY+EQEXLY10P8lmCup vHk3amFstS3Uum/iYBuLSeRGBSfq+y1FKEeXYZ7TGceMUJgKnA20b897Z0/4ogAzkHut JSRvaoHQUhDgrBXQJ+lOo8IUO+7uU88z4ZTPMqq+nEkQGFr4XRovl+dEAwS1wfEGlLSg RjJQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k4si50583lji.80.2021.07.28.09.01.59; Wed, 28 Jul 2021 09:02:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237458AbhG1P7k (ORCPT + 99 others); Wed, 28 Jul 2021 11:59:40 -0400 Received: from foss.arm.com ([217.140.110.172]:59426 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237404AbhG1P7b (ORCPT ); Wed, 28 Jul 2021 11:59:31 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 27F99113E; Wed, 28 Jul 2021 08:59:29 -0700 (PDT) Received: from 010265703453.arm.com (unknown [10.57.36.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id A1D683F70D; Wed, 28 Jul 2021 08:59:27 -0700 (PDT) From: Robin Murphy To: joro@8bytes.org, will@kernel.org Cc: iommu@lists.linux-foundation.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, suravee.suthikulpanit@amd.com, baolu.lu@linux.intel.com, john.garry@huawei.com, dianders@chromium.org Subject: [PATCH v2 13/24] iommu/dma: Remove redundant "!dev" checks Date: Wed, 28 Jul 2021 16:58:34 +0100 Message-Id: <200af1d10b493a90aada6466b1f1938e1b16731f.1627468309.git.robin.murphy@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org iommu_dma_init_domain() is now only called from iommu_setup_dma_ops(), which has already assumed dev to be non-NULL. Reviewed-by: John Garry Signed-off-by: Robin Murphy --- drivers/iommu/dma-iommu.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c index 10067fbc4309..e28396cea6eb 100644 --- a/drivers/iommu/dma-iommu.c +++ b/drivers/iommu/dma-iommu.c @@ -363,7 +363,7 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base, init_iova_domain(iovad, 1UL << order, base_pfn); - if (!cookie->fq_domain && (!dev || !dev_is_untrusted(dev)) && + if (!cookie->fq_domain && !dev_is_untrusted(dev) && domain->ops->flush_iotlb_all && !iommu_get_dma_strict(domain)) { if (init_iova_flush_queue(iovad, iommu_dma_flush_iotlb_all, iommu_dma_entry_dtor)) @@ -372,9 +372,6 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base, cookie->fq_domain = domain; } - if (!dev) - return 0; - return iova_reserve_iommu_regions(dev, domain); } -- 2.25.1