Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp6690871pxv; Thu, 29 Jul 2021 23:13:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJygEOcgaDy7RSBx/VFyPFF8IvxSpR/5KkSFxx8cSsnMMyftj3qZM8lkBPypLS7wD2IimLY4 X-Received: by 2002:a05:6638:44f:: with SMTP id r15mr832282jap.55.1627625615518; Thu, 29 Jul 2021 23:13:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627625615; cv=none; d=google.com; s=arc-20160816; b=YN3MvFbD7t3vwjndEJgmoy58nQl2basWwFQnhTKPvy0q6T6uSdCjAHPalS1Ebgr8/q 9Oz2jDJSRTQRpZ+sQ5N0sVJ7nLUyvdCYSgfJKH87QgLS4fMV9+l56uo+5wFdnH9y92aX 4E3xXHja3jJQr+8+1HWMwIUaQtWgTTS+op9uv+G4jkAThqKouUEZmo0+N/0QFAlogJqC ZKFDOlBWd4EqmgVSiVcFb7oxTZ5G9d8jOdT32DXb5wSFli4U1qe4/Fb9iRaiMx303b3z +eOSbIQVOHP9a80bGcnPKR+J0mKojEJg0EuZ7bipQ6XjRL/ZvJHzfnWzkpyaRkv/sh4r bd+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject:cc; bh=+uKaDDpmq7nHmjuPpGEbRJWl0io4JcAE1dE5ez1Toj8=; b=X70RoO9FGKqrEeXncTKoqLZhwS3QElLmoJL99zEEMTANhaeJVscxsTVitluF6BYbtZ IY91prtUAmC9+mHFKLgKB+wjN7UIp2FN+4Cy91NsSzDhbEg+gmcJRCv0KR2tzPbHa3Aw BgTbg7WcSIzpTioewOQfe9Jjjx0sovGWPHnJOc1b+E4m/TMqq2Csj3aHhD/9VJQal3E5 Tsuu2PfcxM332YnLGlnbEjJSVY++tnkRcBc9tsrjyb3eeoKt8dQxCslpxnXhhiBYBQfa /eJeerXedURKihSzPJw2wUPygLhN4HvP/cVBMS4gTTQ9mzdOYoZGuT6sZvGjFC62z/V+ rahg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b15si734161ilv.151.2021.07.29.23.13.19; Thu, 29 Jul 2021 23:13:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237205AbhG3GMU (ORCPT + 99 others); Fri, 30 Jul 2021 02:12:20 -0400 Received: from mga11.intel.com ([192.55.52.93]:42010 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230349AbhG3GMT (ORCPT ); Fri, 30 Jul 2021 02:12:19 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10060"; a="209926112" X-IronPort-AV: E=Sophos;i="5.84,281,1620716400"; d="scan'208";a="209926112" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Jul 2021 23:12:15 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.84,281,1620716400"; d="scan'208";a="465345103" Received: from allen-box.sh.intel.com (HELO [10.239.159.118]) ([10.239.159.118]) by orsmga008.jf.intel.com with ESMTP; 29 Jul 2021 23:12:12 -0700 Cc: baolu.lu@linux.intel.com, iommu@lists.linux-foundation.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, suravee.suthikulpanit@amd.com, john.garry@huawei.com, dianders@chromium.org Subject: Re: [PATCH v2 18/24] iommu: Express DMA strictness via the domain type To: Robin Murphy , joro@8bytes.org, will@kernel.org References: <50bee17e9248ccfccb33a10238210d4ff4f4cf4d.1627468309.git.robin.murphy@arm.com> From: Lu Baolu Message-ID: Date: Fri, 30 Jul 2021 14:09:54 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/29/21 5:36 PM, Robin Murphy wrote: > On 2021-07-29 08:13, Lu Baolu wrote: >> Hi Robin, >> >> On 7/28/21 11:58 PM, Robin Murphy wrote: >>> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c >>> index 982545234cf3..eecb5657de69 100644 >>> --- a/drivers/iommu/iommu.c >>> +++ b/drivers/iommu/iommu.c >>> @@ -136,6 +136,9 @@ static int __init iommu_subsys_init(void) >>>           } >>>       } >>> +    if (!iommu_default_passthrough() && !iommu_dma_strict) >>> +        iommu_def_domain_type = IOMMU_DOMAIN_DMA_FQ; >> >> iommu_dma_strict could be changed later by the vendor iommu driver via >> iommu_set_dma_strict(). This seems not to be the right place to set >> iommu_def_domain_type. > > Ah yes, good catch once again, thanks! > > I think this *is* the right place to initially set it to honour the > command-line option, since that matches what we do for passthrough. > However also like passthrough we'll need to keep things in sync if it's > updated later, like this: > > > diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c > index 87d7b299436e..593d4555bc57 100644 > --- a/drivers/iommu/iommu.c > +++ b/drivers/iommu/iommu.c > @@ -359,6 +359,8 @@ early_param("iommu.strict", iommu_dma_setup); >  void iommu_set_dma_strict(void) >  { >         iommu_dma_strict = true; > +       if (iommu_def_domain_type == IOMMU_DOMAIN_DMA_FQ) > +               iommu_def_domain_type = IOMMU_DOMAIN_DMA; >  } > >  static ssize_t iommu_group_attr_show(struct kobject *kobj, > > > Does that seem reasonable? I'm not sure there's any cleaner way to do it > since we don't want to inadvertently clobber the default type if the > user has given us something funky like "intel_iommu=strict > iommu.passthrough=1". > > Cheers, > Robin. > >> >>> + >>>       pr_info("Default domain type: %s %s\n", >>>           iommu_domain_type_str(iommu_def_domain_type), >>>           (iommu_cmd_line & IOMMU_CMD_LINE_DMA_API) ? >> >> Best regards, >> baolu With above fixed, Reviewed-by: Lu Baolu Best regards, baolu