Received: by 10.213.65.68 with SMTP id h4csp165526imn; Mon, 26 Mar 2018 18:10:40 -0700 (PDT) X-Google-Smtp-Source: AG47ELt/PpEC+rCXXtETS8S1QrlEZfvojMNupe/Voiv6IyTJw/LiZC6zBaGKE+7W00OVT+LU89o7 X-Received: by 10.99.175.79 with SMTP id s15mr15314441pgo.388.1522113040215; Mon, 26 Mar 2018 18:10:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522113040; cv=none; d=google.com; s=arc-20160816; b=Z2BhcPBGpkAHzfkH267JP9+Is5315ajRvm2899nBm4eXFA7L+4WBjOFezrwcIIcWNA yembsQ0BtjhnyMWdFf3eabYlxyTXOxV5msngqmS7uYVdGwxOd6/xHp7LB8z1rwgQYd1u sfywr1DpWAX/bgPgZBrFvHMD/qfnjxiB40k/QAIOboiDmELRjclFzJdksfR8RLYNbNm4 Cjz+BMRoER8a58EYLBSXKpQ4B/4q4QHV2l/cDyhimSJj2vnQoejzyg5ncoYq6e7Fg/5g p8B6XFlEipeyMphkY4DcyxQh29oOBY6DwCbBUDZQJqJ73jV6hYTcu2FG0JgFOSPoPIze 6CGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:cc:to :subject:from:dkim-signature:arc-authentication-results; bh=gtmMN+fd/C8smOJcsPwMdQR/wt0BepETkKTtpIMXYxc=; b=uksg4GVfG+MJBJnY0rh2fQJvSgV9e2Y3LQfGmMqRnd6+chIsGuQdxjss8xu0H09gPu 3OE7uilZuKznIvknWbIUTObaD2/nsZt9VCKEKdv6CKnZyUI8B/s9iKhHa0GvbjNL+wZ1 7fCWQMvZMslPEYTlTdBRYCGeFzDbiV0cidkpa+LGWtszUqaB+zhpWDTzg6QjLVKitUID 0/CA2g3H/A5a1XisdflQBlHdII04wDrEzZ2rGYm5w1Mj+QhOndXbr6Okq//Gri+isgLr yP62g2V9jMDMhUxS1yc//ITeyw35V1LBAwXG9Tl3zQmTM3ItBY7y7P0MG2Zs2J2qG0Xg rqJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=PotEuI+M; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j3si41017pgv.342.2018.03.26.18.10.25; Mon, 26 Mar 2018 18:10:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=PotEuI+M; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752069AbeC0BJe (ORCPT + 99 others); Mon, 26 Mar 2018 21:09:34 -0400 Received: from aserp2120.oracle.com ([141.146.126.78]:57452 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751866AbeC0BJd (ORCPT ); Mon, 26 Mar 2018 21:09:33 -0400 Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w2R153ZA175993; Tue, 27 Mar 2018 01:09:05 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : subject : to : cc : message-id : date : mime-version : content-type : content-transfer-encoding; s=corp-2017-10-26; bh=gtmMN+fd/C8smOJcsPwMdQR/wt0BepETkKTtpIMXYxc=; b=PotEuI+MMecjrXci8KNNW/YMdASzgEoL8GuK2qQlys/KxytYJS8ckcBrGlrozmR53vzS i+UGgEA4B/ESzWtc8afCuFpDs4W+FmS+OFF/+XeuOUZbs/uBnBVSBBsgUtg34LuQIGj4 e/l4qKiAI02RJ/OyDNmtcfnuHSZDh6f9UBIjx7v0bhlzAWR9kZ/5+KUNQRh/f74XPfyS 34LTM5SoI0pmAKMoc8hNYimP/ly4rTKwmWBRxTo+dxOeKnDqheSbMogpHNc6DG43CrV/ 1wiOfhU3b/PEK5RftCFs2Yth4O2Ya+NRzL+FuV7Fk+v1zcEtIw3ww561DN7kA2+jq6f1 xQ== Received: from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74]) by aserp2120.oracle.com with ESMTP id 2gybykr0ak-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 27 Mar 2018 01:09:05 +0000 Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w2R194am012768 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 27 Mar 2018 01:09:04 GMT Received: from abhmp0001.oracle.com (abhmp0001.oracle.com [141.146.116.7]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id w2R1942W029508; Tue, 27 Mar 2018 01:09:04 GMT Received: from [10.159.253.160] (/10.159.253.160) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 26 Mar 2018 18:09:03 -0700 From: Tushar Dave Subject: intel-iommu: Is this a bug? To: dwmw2@infradead.org, joro@8bytes.org, iommu@lists.linux-foundation.org Cc: linux-kernel@vger.kernel.org Message-ID: <66db7b28-5749-1d13-b228-88b34087f3b6@oracle.com> Date: Mon, 26 Mar 2018 18:09:02 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8844 signatures=668695 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=870 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1803270010 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, I am analyzing network performance with intel-iommu enabled. And found that running with iommu=pt, for every dma map/unmap it executes this code: /* * At boot time, we don't yet know if devices will be 64-bit capable. * Assume that they will — if they turn out not to be, then we can * take them out of the 1:1 domain later. */ if (!startup) { /* * If the device's dma_mask is less than the system's memory * size then this is not a candidate for identity mapping. */ u64 dma_mask = *dev->dma_mask; if (dev->coherent_dma_mask && dev->coherent_dma_mask < dma_mask) dma_mask = dev->coherent_dma_mask; return dma_mask >= dma_get_required_mask(dev); } Do we really need this check for every dma/unmap? Considering it should be only during startup, shouldn't it be, diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c index 582fd01..3c8f14e 100644 --- a/drivers/iommu/intel-iommu.c +++ b/drivers/iommu/intel-iommu.c @@ -2929,7 +2929,7 @@ static int iommu_should_identity_map(struct device *dev, int startup) * Assume that they will — if they turn out not to be, then we can * take them out of the 1:1 domain later. */ - if (!startup) { + if (startup) { /* * If the device's dma_mask is less than the system's memory * size then this is not a candidate for identity mapping. Thanks. -Tushar