Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp424912ybi; Fri, 31 May 2019 03:45:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqwdSJk1baddO/NjdwpTAf6IlIGjrMTG6mTFLrSGETkzwA44GO245u4Pu3tBjiY0BdVQiHzE X-Received: by 2002:a17:902:704a:: with SMTP id h10mr8305510plt.294.1559299555135; Fri, 31 May 2019 03:45:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559299555; cv=none; d=google.com; s=arc-20160816; b=gqJBHKaHJxribHmMLoh/ybk8LdoYPyhx0LfhGfeIFM2qrYZbS1RutpUwsjQd+qT0/n Ijy58yRxOD5U/SO3+eh/3f4LMxWicWph+TxfpZuTb3yaNzuIJsDEimbcIs3Yjei6QAtW cs/39z7KmEhxX05qdOkMqRUhNmjP8AvDFb0vc4Rkav23SQmqjVtqsVeA4SapAVzzKz75 NQiY+UE9AtoAg56tytX7WPni7Hbw2eQ924Q0di1M+VOhv2IZGFkeEzy819MPLPLUfUUP kBJYKjKiFy0m6l+Xu5M018NWmUDVNdO9i1HBRm+3vR9lCoR/EEWgvMj1ONs92PbOmzY4 a19Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject; bh=fdq6bPT1dDt4mM+69IyYPEQP2sQ11ry83RyJsG4CYAA=; b=hvGAd0VOAbk3/Owx/PZ9i/b/Ut2DrEvCrSuijbvSv0Ttoo5tOkGKhrpIme5pzqPm8O 12KqHkbkUTqEcX8FqhGm8asyLZqpbeRwQeTZh8WMH+C2H2AktOa1pAKxx2ebac/jhkJk ro787+tJ31wdTnwjahIYswsSFCTZjT+Gl+MwFvkmYYfYp2ZpjnDkov7SR4btfB/PC4FW RPCxBf0JPpIuRyVur3vmY8hdAPw92up3VGX2AL4OKxVF6PkWh8e9lj5rDNr0URv5zf0g M0VFXnE/j3WBqlD26JibPKrT1tlu9frLMhJEwnG+M6jes5PTiuKPp8sKYsJb4wtXmPel 0XgA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i2si5424231pgl.282.2019.05.31.03.45.37; Fri, 31 May 2019 03:45:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726683AbfEaKnP (ORCPT + 99 others); Fri, 31 May 2019 06:43:15 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:43848 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726158AbfEaKnO (ORCPT ); Fri, 31 May 2019 06:43:14 -0400 Received: from DGGEMS409-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 9228C33A72539724796A; Fri, 31 May 2019 18:43:10 +0800 (CST) Received: from [127.0.0.1] (10.202.227.238) by DGGEMS409-HUB.china.huawei.com (10.3.19.209) with Microsoft SMTP Server id 14.3.439.0; Fri, 31 May 2019 18:42:59 +0800 Subject: Re: [PATCH v8 1/7] iommu: enhance IOMMU default DMA mode build options To: "Leizhen (ThunderTown)" , "Jean-Philippe Brucker" , Robin Murphy , Will Deacon , Joerg Roedel , "Jonathan Corbet" , linux-doc , Sebastian Ott , Gerald Schaefer , "Martin Schwidefsky" , Heiko Carstens , Benjamin Herrenschmidt , Paul Mackerras , "Michael Ellerman" , Tony Luck , Fenghua Yu , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H . Peter Anvin" , David Woodhouse , iommu , linux-kernel , linux-s390 , linuxppc-dev , x86 , linux-ia64 References: <20190530034831.4184-1-thunder.leizhen@huawei.com> <20190530034831.4184-2-thunder.leizhen@huawei.com> <645bd526-4eb0-4a36-2dda-023f009247ab@huawei.com> <030bafab-58f5-8bb1-0533-2977d6e138b2@huawei.com> CC: Hanjun Guo , Linuxarm From: John Garry Message-ID: <55d0e30c-5bca-41fc-5bf0-4366dc387afd@huawei.com> Date: Fri, 31 May 2019 11:42:45 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0 MIME-Version: 1.0 In-Reply-To: <030bafab-58f5-8bb1-0533-2977d6e138b2@huawei.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.202.227.238] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org >>> -config IOMMU_DEFAULT_PASSTHROUGH >>> - bool "IOMMU passthrough by default" >>> +choice >>> + prompt "IOMMU default DMA mode" >>> depends on IOMMU_API >>> - help >>> - Enable passthrough by default, removing the need to pass in >>> - iommu.passthrough=on or iommu=pt through command line. If this >>> - is enabled, you can still disable with iommu.passthrough=off >>> - or iommu=nopt depending on the architecture. >>> + default IOMMU_DEFAULT_STRICT >>> + help >>> + This option allows IOMMU DMA mode to be chose at build time, to >> >> As before: >> /s/chose/chosen/, /s/allows IOMMU/allows an IOMMU/ > I'm sorry that the previous version was not modified. > >> >>> + override the default DMA mode of each ARCHs, removing the need to >> >> Again, as before: >> ARCHs should be singular > OK > >> >>> + pass in kernel parameters through command line. You can still use >>> + ARCHs specific boot options to override this option again. * >>> + >>> +config IOMMU_DEFAULT_PASSTHROUGH >>> + bool "passthrough" >>> + help >>> + In this mode, the DMA access through IOMMU without any addresses >>> + translation. That means, the wrong or illegal DMA access can not >>> + be caught, no error information will be reported. >>> >>> If unsure, say N here. >>> >>> +config IOMMU_DEFAULT_LAZY >>> + bool "lazy" >>> + help >>> + Support lazy mode, where for every IOMMU DMA unmap operation, the >>> + flush operation of IOTLB and the free operation of IOVA are deferred. >>> + They are only guaranteed to be done before the related IOVA will be >>> + reused. >> >> why no advisory on how to set if unsure? > Because the LAZY and STRICT have their own advantages and disadvantages. > > Should I say: If unsure, keep the default。 Maybe. So you could put this in the help for the choice, * above, and remove the advisory on IOMMU_DEFAULT_PASSTHROUGH. However the maintainer may have a different view. Thanks, John > >> >>> + >>> +config IOMMU_DEFAULT_STRICT >>> + bool "strict" >>> + help >>> + For every IOMMU DMA unmap operation, the flush operation of IOTLB and >>> + the free operation of IOVA are guaranteed to be done in the unmap >>> + function. >>> + >>> + This mode is safer than the two above, but it maybe slower in some >>> + high performace scenarios. >> >> and here?