Re: [PATCH 09/12] kvm: iommu: Convert to use new iommu_capable() API function

2014-09-17 Thread Joerg Roedel
Hi Paolo, Gleb,

On Fri, Sep 05, 2014 at 12:53:01PM +0200, Joerg Roedel wrote:
 From: Joerg Roedel jroe...@suse.de
 
 Cc: Gleb Natapov g...@kernel.org
 Cc: Paolo Bonzini pbonz...@redhat.com
 Signed-off-by: Joerg Roedel jroe...@suse.de
 ---
  virt/kvm/iommu.c | 6 ++
  1 file changed, 2 insertions(+), 4 deletions(-)

Do you have any objections against this patch? I would like to put this
series into the iommu tree.


Thanks,

Joerg

 
 diff --git a/virt/kvm/iommu.c b/virt/kvm/iommu.c
 index 714b949..45ee080 100644
 --- a/virt/kvm/iommu.c
 +++ b/virt/kvm/iommu.c
 @@ -191,8 +191,7 @@ int kvm_assign_device(struct kvm *kvm,
   return r;
   }
  
 - noncoherent = !iommu_domain_has_cap(kvm-arch.iommu_domain,
 - IOMMU_CAP_CACHE_COHERENCY);
 + noncoherent = !iommu_capable(pci_bus_type, IOMMU_CAP_CACHE_COHERENCY);
  
   /* Check if need to update IOMMU page table for guest memory */
   if (noncoherent != kvm-arch.iommu_noncoherent) {
 @@ -254,8 +253,7 @@ int kvm_iommu_map_guest(struct kvm *kvm)
   }
  
   if (!allow_unsafe_assigned_interrupts 
 - !iommu_domain_has_cap(kvm-arch.iommu_domain,
 -   IOMMU_CAP_INTR_REMAP)) {
 + !iommu_capable(pci_bus_type, IOMMU_CAP_INTR_REMAP)) {
   printk(KERN_WARNING %s: No interrupt remapping support,
   disallowing device assignment.
   Re-enble with \allow_unsafe_assigned_interrupts=1\
 -- 
 1.9.1
___
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu


[PATCH 09/12] kvm: iommu: Convert to use new iommu_capable() API function

2014-09-05 Thread Joerg Roedel
From: Joerg Roedel jroe...@suse.de

Cc: Gleb Natapov g...@kernel.org
Cc: Paolo Bonzini pbonz...@redhat.com
Signed-off-by: Joerg Roedel jroe...@suse.de
---
 virt/kvm/iommu.c | 6 ++
 1 file changed, 2 insertions(+), 4 deletions(-)

diff --git a/virt/kvm/iommu.c b/virt/kvm/iommu.c
index 714b949..45ee080 100644
--- a/virt/kvm/iommu.c
+++ b/virt/kvm/iommu.c
@@ -191,8 +191,7 @@ int kvm_assign_device(struct kvm *kvm,
return r;
}
 
-   noncoherent = !iommu_domain_has_cap(kvm-arch.iommu_domain,
-   IOMMU_CAP_CACHE_COHERENCY);
+   noncoherent = !iommu_capable(pci_bus_type, IOMMU_CAP_CACHE_COHERENCY);
 
/* Check if need to update IOMMU page table for guest memory */
if (noncoherent != kvm-arch.iommu_noncoherent) {
@@ -254,8 +253,7 @@ int kvm_iommu_map_guest(struct kvm *kvm)
}
 
if (!allow_unsafe_assigned_interrupts 
-   !iommu_domain_has_cap(kvm-arch.iommu_domain,
- IOMMU_CAP_INTR_REMAP)) {
+   !iommu_capable(pci_bus_type, IOMMU_CAP_INTR_REMAP)) {
printk(KERN_WARNING %s: No interrupt remapping support,
disallowing device assignment.
Re-enble with \allow_unsafe_assigned_interrupts=1\
-- 
1.9.1

___
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu