Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp6692376pxv; Thu, 29 Jul 2021 23:15:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJygbQzBEPhw98SghEERgnbYSmPszhSpmy1R0FUMXdtxtZNQWaoVSVRnZF3wDZoVL+rX6D3f X-Received: by 2002:a92:700b:: with SMTP id l11mr44494ilc.272.1627625745280; Thu, 29 Jul 2021 23:15:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627625745; cv=none; d=google.com; s=arc-20160816; b=Nb7FaAFErBEH9DlDonV/pw+8aVK1MTfjXqDt3GrvtPjT5T3U51v7ACzZWrcYlA5oy6 rozP9qap8qZuoArILYctYeu6RGuGB1nuNCKpyOhhJDUlMti7dgS/HRY9NmYg2+CbejTR aSgVPWmHmkceSAuuekpfZMRq4RU4EausDcYai5Br9c9hOpAu0fugGrpbRHFYxkoBeEHD dSfaQ5r0v6bwc6TVvaopVntoX7em61HCWqtQb0DIOLov9Ja10O4rKgGBg5RKdjqixN34 W+G/Ke2s3eQPFPLe0BcIBQcc5GepydZLELYLMG8TweF0jVbp37QImqps9svD0g3RYAvu H2KA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject:cc; bh=gqImYdfiR40bAyweruCMOMPPWJxYvusSAfG6P+Rn9D4=; b=zJXsbucPCq65j+vbzTZw7s10KrTq8GqDyorN2OMPJqyoKS0NLxvYZPF5vC4AWHxk65 9BK3JonOhT1LP00J0fGaaZbDi9bIz6Qr7RUB229G3eCw4Pl1LGzffg8mOE4W2uShuen2 +ezdJ9rXp1Y/3lTEq+3FRsoS9Cx9bSjQY68vUPye3gbvdd3JgHKOoRyK5RzEiIFrAvV8 haNYqp1u0oFtjTAdbV34ZOJpaUJpsDC1ewGz/Nt6YIdQRjQOJSfGs8Ld0jkLxWgaJXo+ nb0o5e/Iy68MF+dODYlX4LXajxU4Z6mmpN/IlZC8ofgqhfvlsBiq1xjTFiqm9CBO7/7A bDnw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b15si757949ilv.151.2021.07.29.23.15.33; Thu, 29 Jul 2021 23:15:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237392AbhG3GOq (ORCPT + 99 others); Fri, 30 Jul 2021 02:14:46 -0400 Received: from mga12.intel.com ([192.55.52.136]:61597 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237294AbhG3GOp (ORCPT ); Fri, 30 Jul 2021 02:14:45 -0400 X-IronPort-AV: E=McAfee;i="6200,9189,10060"; a="192634130" X-IronPort-AV: E=Sophos;i="5.84,281,1620716400"; d="scan'208";a="192634130" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Jul 2021 23:14:41 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.84,281,1620716400"; d="scan'208";a="465345547" Received: from allen-box.sh.intel.com (HELO [10.239.159.118]) ([10.239.159.118]) by orsmga008.jf.intel.com with ESMTP; 29 Jul 2021 23:14:37 -0700 Cc: baolu.lu@linux.intel.com, iommu@lists.linux-foundation.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, suravee.suthikulpanit@amd.com, john.garry@huawei.com, dianders@chromium.org Subject: Re: [PATCH v2 24/24] iommu: Only log strictness for DMA domains To: Robin Murphy , joro@8bytes.org, will@kernel.org References: From: Lu Baolu Message-ID: <7a071314-ee88-fcff-baf0-fb8e33a86dd4@linux.intel.com> Date: Fri, 30 Jul 2021 14:12:19 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 7/28/21 11:58 PM, Robin Murphy wrote: > When passthrough is enabled, the default strictness policy becomes > irrelevant, since any subsequent runtime override to a DMA domain type > now embodies an explicit choice of strictness as well. Save on noise by > only logging the default policy when it is meaningfully in effect. > > Signed-off-by: Robin Murphy > --- > drivers/iommu/iommu.c | 9 +++++---- > 1 file changed, 5 insertions(+), 4 deletions(-) > > diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c > index be399d630953..87d7b299436e 100644 > --- a/drivers/iommu/iommu.c > +++ b/drivers/iommu/iommu.c > @@ -144,10 +144,11 @@ static int __init iommu_subsys_init(void) > (iommu_cmd_line & IOMMU_CMD_LINE_DMA_API) ? > "(set via kernel command line)" : ""); > > - pr_info("DMA domain TLB invalidation policy: %s mode %s\n", > - iommu_dma_strict ? "strict" : "lazy", > - (iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ? > - "(set via kernel command line)" : ""); > + if (!iommu_default_passthrough()) > + pr_info("DMA domain TLB invalidation policy: %s mode %s\n", > + iommu_dma_strict ? "strict" : "lazy", > + (iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ? > + "(set via kernel command line)" : ""); > > return 0; > } > Reviewed-by: Lu Baolu Best regards, baolu