Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp257935pxt; Wed, 4 Aug 2021 10:19:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyDx+jxNfIwTXAxM+fSbc6Vfgef/m5+XzIQ6uYsjy3uH63mE4Pl3U+MxK1OsgZK5+bUtZMO X-Received: by 2002:a02:8241:: with SMTP id q1mr488109jag.134.1628097591952; Wed, 04 Aug 2021 10:19:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628097591; cv=none; d=google.com; s=arc-20160816; b=Rhf/nQUq62FFp9YHnFyxB9fo5VVdeRT1R1+WEUFeBmKPO0w1SKmj3pHfcks+AlF+xv QcL3r06qqeUsoaxh0kRfy3OLNXetsQL5n9A1dII6RIAiINhLMxq/C3wGDSda6qvRWp8k pZ9OcyKvUPqxkVexh4JBoxa0DSvxXdKOPmFd4Xf7u3ei+t4/E/E4tT9jKFQRu3Ffiwvc Rryxt84EerESw/JCENLxh8xbPCg/KBU2XFWGWI262AM6oH2dtnkHyWpB4JoIuKKf1DuR lbkTGaaoicBqpjf5E0UDtETJVBotmvi3T9/7Zjl8qv1t8kZLg65zaUlWGr5mMrY7i5k6 Nzgw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=bxGEcvauI3+fVhK7k1JJVoPeNYxDrMuFhI8N9xwnIdY=; b=smA2IvuWrk8rU7iut4FWpEKyMdfrPWxSL0+Kz9UC+P+XiSeKzpKhYNKCE7KGxg9PRl u0pgfGgbwbSoM6hMO/ZuL74Ad0EF8bVRtr7D44Tagv7XgIbd41OQP7RXhVABVazpRCki 3thToc/MjvrO1HcPwtFke+PVdXYBhUayJD9aYwNpM8W9s0aqri9NBjRJSsaq/8dU125z assniUsFXsJSj7MP1+iL0uSpQcUF2q7f1x2jYka3vLhAmKAj42e/CeXVMNGvJCT7arxU xnRnylKf7FJfoWc0N026gNqao59l/dKW+Iyzhq81bolT3rlOewnQC6KGBO6nw03T6i4K axDQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d2si2546736iow.58.2021.08.04.10.19.39; Wed, 04 Aug 2021 10:19:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240020AbhHDRRa (ORCPT + 99 others); Wed, 4 Aug 2021 13:17:30 -0400 Received: from foss.arm.com ([217.140.110.172]:35274 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239998AbhHDRRH (ORCPT ); Wed, 4 Aug 2021 13:17:07 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 22EE914BF; Wed, 4 Aug 2021 10:16:54 -0700 (PDT) Received: from 010265703453.arm.com (unknown [10.57.36.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 5BFC43F66F; Wed, 4 Aug 2021 10:16:52 -0700 (PDT) From: Robin Murphy To: joro@8bytes.org, will@kernel.org Cc: iommu@lists.linux-foundation.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, suravee.suthikulpanit@amd.com, baolu.lu@linux.intel.com, john.garry@huawei.com, dianders@chromium.org, rajatja@google.com, chenxiang66@hisilicon.com Subject: [PATCH v3 22/25] iommu: Only log strictness for DMA domains Date: Wed, 4 Aug 2021 18:15:50 +0100 Message-Id: <8cd363849974d02f8372b86dec5c39cc42b66c34.1628094601.git.robin.murphy@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When passthrough is enabled, the default strictness policy becomes irrelevant, since any subsequent runtime override to a DMA domain type now embodies an explicit choice of strictness as well. Save on noise by only logging the default policy when it is meaningfully in effect. Reviewed-by: John Garry Reviewed-by: Lu Baolu Signed-off-by: Robin Murphy --- drivers/iommu/iommu.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index b141161d5bbc..63face36fc49 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -144,10 +144,11 @@ static int __init iommu_subsys_init(void) (iommu_cmd_line & IOMMU_CMD_LINE_DMA_API) ? "(set via kernel command line)" : ""); - pr_info("DMA domain TLB invalidation policy: %s mode %s\n", - iommu_dma_strict ? "strict" : "lazy", - (iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ? - "(set via kernel command line)" : ""); + if (!iommu_default_passthrough()) + pr_info("DMA domain TLB invalidation policy: %s mode %s\n", + iommu_dma_strict ? "strict" : "lazy", + (iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ? + "(set via kernel command line)" : ""); return 0; } -- 2.25.1