Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp383134ybi; Fri, 31 May 2019 03:05:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqyI6xIE6XX6zRcIMZRQMOK+WQqsuWUyzEzT1O8okg2r40TZvWoHET8DtwK5g0fL9F1DQ74l X-Received: by 2002:a63:cd4c:: with SMTP id a12mr7992133pgj.362.1559297118624; Fri, 31 May 2019 03:05:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559297118; cv=none; d=google.com; s=arc-20160816; b=ydAPnDCdys7x1dv6eg/xGQNkBVKi1p39aZmGESjAt+9AnK37uStrxxZQPGg/TI9Q6G bGaGdgiiQqN9cWTiJqWhk9Q4Qh4Uz8Cl+gpbjOnnfNahTzJKIH15esmAi36Wx5C3017s WhF+VFqS6Elu0HczO+omjybwVn8e7EtyWdXHpHmFeVxF+AHpSr2UJfM9CNnFXZSShcub TUFaEWpydnRIoeIss+BgLQmCG5y3wT3b5DhDq7bfh+ujYfo6a3Rbku83O7+pGQ0LTRsQ EHHkkaceGWMwr4h2d51+d2M4QfZ88jK3duEVnckHs9vRxVZUu+9RcH4oTP85oan6ygYd 3Pew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=WsjmXnmAj885kfFXzx8iqGYtxbusw9AqL0WPiVcUmY0=; b=spG+HlEyDijUWZ2hnNYD3HBoTD0XEEJAdnv6ZJoE1fD5I28T1NquRbY1ccTrEn+kDv rj7nQVEJtcPeuJTkgCeBq8NROxj+6+WWASdOvAgqYVZRFrVbmmfP+O0yXWrtmdGse78b 37BXAx6ojeFuFaeAj8Dsb1h5pRtbkY8VZcLy70VVs24E5JC+n5P8vTT8Nhs63eIek05p 8AaSIXhVDvcPdeEvpipWG8ad4DMM9eTGBhoXP63XDZld8TmYbZNUlB9DVHtOAta8lbE1 yLBcMRmXMpDlcgOO+YCQT7y9vzgSOymm2pT13xAe9pzsRXf0/mT8fMZ+T5OdGVNHuxZ8 93xA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h5si5390840plt.232.2019.05.31.03.04.57; Fri, 31 May 2019 03:05:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726826AbfEaKDj (ORCPT + 99 others); Fri, 31 May 2019 06:03:39 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:58086 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726002AbfEaKDj (ORCPT ); Fri, 31 May 2019 06:03:39 -0400 Received: from DGGEMS414-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 9BBDB1EFB9AB272BF3AF; Fri, 31 May 2019 18:03:36 +0800 (CST) Received: from [127.0.0.1] (10.133.215.186) by DGGEMS414-HUB.china.huawei.com (10.3.19.214) with Microsoft SMTP Server id 14.3.439.0; Fri, 31 May 2019 18:03:29 +0800 Subject: Re: [PATCH v8 1/7] iommu: enhance IOMMU default DMA mode build options To: John Garry , Jean-Philippe Brucker , Robin Murphy , "Will Deacon" , Joerg Roedel , Jonathan Corbet , linux-doc , Sebastian Ott , Gerald Schaefer , "Martin Schwidefsky" , Heiko Carstens , Benjamin Herrenschmidt , Paul Mackerras , "Michael Ellerman" , Tony Luck , Fenghua Yu , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , David Woodhouse , iommu , linux-kernel , linux-s390 , linuxppc-dev , x86 , linux-ia64 CC: Hanjun Guo , Linuxarm References: <20190530034831.4184-1-thunder.leizhen@huawei.com> <20190530034831.4184-2-thunder.leizhen@huawei.com> <645bd526-4eb0-4a36-2dda-023f009247ab@huawei.com> From: "Leizhen (ThunderTown)" Message-ID: <030bafab-58f5-8bb1-0533-2977d6e138b2@huawei.com> Date: Fri, 31 May 2019 18:03:16 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <645bd526-4eb0-4a36-2dda-023f009247ab@huawei.com> Content-Type: text/plain; charset="UTF-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-Originating-IP: [10.133.215.186] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/5/30 20:20, John Garry wrote: > On 30/05/2019 04:48, Zhen Lei wrote: >> First, add build option IOMMU_DEFAULT_{LAZY|STRICT}, so that we have the >> opportunity to set {lazy|strict} mode as default at build time. Then put >> the three config options in an choice, make people can only choose one of >> the three at a time. >> > > Since this was not picked up, but modulo (somtimes same) comments below: > > Reviewed-by: John Garry > >> Signed-off-by: Zhen Lei >> --- >>  drivers/iommu/Kconfig | 42 +++++++++++++++++++++++++++++++++++------- >>  drivers/iommu/iommu.c |  3 ++- >>  2 files changed, 37 insertions(+), 8 deletions(-) >> >> diff --git a/drivers/iommu/Kconfig b/drivers/iommu/Kconfig >> index 83664db5221df02..d6a1a45f80ffbf5 100644 >> --- a/drivers/iommu/Kconfig >> +++ b/drivers/iommu/Kconfig >> @@ -75,17 +75,45 @@ config IOMMU_DEBUGFS >>        debug/iommu directory, and then populate a subdirectory with >>        entries as required. >> >> -config IOMMU_DEFAULT_PASSTHROUGH >> -    bool "IOMMU passthrough by default" >> +choice >> +    prompt "IOMMU default DMA mode" >>      depends on IOMMU_API >> -        help >> -      Enable passthrough by default, removing the need to pass in >> -      iommu.passthrough=on or iommu=pt through command line. If this >> -      is enabled, you can still disable with iommu.passthrough=off >> -      or iommu=nopt depending on the architecture. >> +    default IOMMU_DEFAULT_STRICT >> +    help >> +      This option allows IOMMU DMA mode to be chose at build time, to > > As before: > /s/chose/chosen/, /s/allows IOMMU/allows an IOMMU/ I'm sorry that the previous version was not modified. > >> +      override the default DMA mode of each ARCHs, removing the need to > > Again, as before: > ARCHs should be singular OK > >> +      pass in kernel parameters through command line. You can still use >> +      ARCHs specific boot options to override this option again. >> + >> +config IOMMU_DEFAULT_PASSTHROUGH >> +    bool "passthrough" >> +    help >> +      In this mode, the DMA access through IOMMU without any addresses >> +      translation. That means, the wrong or illegal DMA access can not >> +      be caught, no error information will be reported. >> >>        If unsure, say N here. >> >> +config IOMMU_DEFAULT_LAZY >> +    bool "lazy" >> +    help >> +      Support lazy mode, where for every IOMMU DMA unmap operation, the >> +      flush operation of IOTLB and the free operation of IOVA are deferred. >> +      They are only guaranteed to be done before the related IOVA will be >> +      reused. > > why no advisory on how to set if unsure? Because the LAZY and STRICT have their own advantages and disadvantages. Should I say: If unsure, keep the default。 > >> + >> +config IOMMU_DEFAULT_STRICT >> +    bool "strict" >> +    help >> +      For every IOMMU DMA unmap operation, the flush operation of IOTLB and >> +      the free operation of IOVA are guaranteed to be done in the unmap >> +      function. >> + >> +      This mode is safer than the two above, but it maybe slower in some >> +      high performace scenarios. > > and here? > >> + >> +endchoice >> + >>  config OF_IOMMU >>         def_bool y >>         depends on OF && IOMMU_API >> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c >> index 67ee6623f9b2a4d..56bce221285b15f 100644 >> --- a/drivers/iommu/iommu.c >> +++ b/drivers/iommu/iommu.c >> @@ -43,7 +43,8 @@ >>  #else >>  static unsigned int iommu_def_domain_type = IOMMU_DOMAIN_DMA; >>  #endif >> -static bool iommu_dma_strict __read_mostly = true; >> +static bool iommu_dma_strict __read_mostly = >> +            IS_ENABLED(CONFIG_IOMMU_DEFAULT_STRICT); >> >>  struct iommu_group { >>      struct kobject kobj; >> > > > > . >