Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5936046pxv; Thu, 29 Jul 2021 02:06:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzKT3Py6Z8o51tT8nO0+I7SnJzNcBuW2nVQAz7vRNOF/qaOicNKyM40SxPIlLQOYM82o7Du X-Received: by 2002:a92:7f03:: with SMTP id a3mr3002681ild.254.1627549583046; Thu, 29 Jul 2021 02:06:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627549583; cv=none; d=google.com; s=arc-20160816; b=FFZyDHGgJrrheGXeeVaR5HRr1VgpPkEO6F5XsfDKJ92hdFSbPdnc70V3p5Ze++R1ai Fv071YVmSpiDdcH+kcOd/rwTa8aL6akUxqzDbQuALcSf5vTbySrG0XBnz1nZ7kDSMeFD d6fy781B6BfE4ATmrIPQVRfyHHWlyEPPsWn3ri8waiu9LfhaaLgbwcfIqQdSw9kmHZw5 Z3ILb672q7zoXXt7iiXbsEschil3Dyo4oYp0bmW1VUKZ1T3WtsQq97KFetFgJ/4lAkZU VTVT0WHKlbAOQbJAlbd39l8mfpGE3wXPjhO0O/ntIGQdyzDDUeNnLMzZF5YpE0FkqK+W 3FgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=QuzalbBsJPLZmJFOGQObKkT4ecrv1JvK5fM66VV3rbE=; b=qGp3vcAftzCBbtFLwcSIcb3d+Hp/obkYN8/NfeVxpeaw1ij59jCLweaBp+bi2/Mtq7 6PwYLjZkYX4ESOuww6KEAqDTOSugB/cJbDUAavRm3nZ4l0IbTUGeDwdXOFxqtb37cR8f z7tlQSttJiq3ZD9snEjcn/huQf/XDAaUQPofvcRyxFjfSD1AeJCfixwO2EH1SkS+lqrf HM0FkAiqlZHMXSjvblAAPq3F0/wvdPLST+GmmeY/Q4Dqx64HDdfkIDCmCB9cy+Kaxl34 CN/jCSkCpBZ8QK0BjPPXN62dCcCAdZT7NPEd9MJR7YHZmqse1rfN40UxJv9BjY+LAFNP qLuw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n20si2948175jat.115.2021.07.29.02.06.11; Thu, 29 Jul 2021 02:06:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235319AbhG2JFD (ORCPT + 99 others); Thu, 29 Jul 2021 05:05:03 -0400 Received: from frasgout.his.huawei.com ([185.176.79.56]:3517 "EHLO frasgout.his.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234972AbhG2JFC (ORCPT ); Thu, 29 Jul 2021 05:05:02 -0400 Received: from fraeml703-chm.china.huawei.com (unknown [172.18.147.206]) by frasgout.his.huawei.com (SkyGuard) with ESMTP id 4Gb4B517Xdz6FFxM; Thu, 29 Jul 2021 16:55:41 +0800 (CST) Received: from lhreml724-chm.china.huawei.com (10.201.108.75) by fraeml703-chm.china.huawei.com (10.206.15.52) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2176.2; Thu, 29 Jul 2021 11:04:57 +0200 Received: from [10.47.27.169] (10.47.27.169) by lhreml724-chm.china.huawei.com (10.201.108.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2176.2; Thu, 29 Jul 2021 10:04:56 +0100 Subject: Re: [PATCH v2 24/24] iommu: Only log strictness for DMA domains To: Robin Murphy , , CC: , , , , , References: From: John Garry Message-ID: Date: Thu, 29 Jul 2021 10:04:31 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.12.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.47.27.169] X-ClientProxiedBy: lhreml745-chm.china.huawei.com (10.201.108.195) To lhreml724-chm.china.huawei.com (10.201.108.75) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 28/07/2021 16:58, Robin Murphy wrote: > When passthrough is enabled, the default strictness policy becomes > irrelevant, since any subsequent runtime override to a DMA domain type > now embodies an explicit choice of strictness as well. Save on noise by > only logging the default policy when it is meaningfully in effect. > > Signed-off-by: Robin Murphy FWIW, small comment below, Reviewed-by: John Garry > --- > drivers/iommu/iommu.c | 9 +++++---- > 1 file changed, 5 insertions(+), 4 deletions(-) > > diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c > index be399d630953..87d7b299436e 100644 > --- a/drivers/iommu/iommu.c > +++ b/drivers/iommu/iommu.c > @@ -144,10 +144,11 @@ static int __init iommu_subsys_init(void) > (iommu_cmd_line & IOMMU_CMD_LINE_DMA_API) ? > "(set via kernel command line)" : ""); > > - pr_info("DMA domain TLB invalidation policy: %s mode %s\n", > - iommu_dma_strict ? "strict" : "lazy", > - (iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ? > - "(set via kernel command line)" : ""); > + if (!iommu_default_passthrough()) I suppose that you could also do an early return to save indenting... > + pr_info("DMA domain TLB invalidation policy: %s mode %s\n", > + iommu_dma_strict ? "strict" : "lazy", > + (iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ? > + "(set via kernel command line)" : ""); > > return 0; > }