Skip to content

Commit 7cf8a63

Browse files
rmurphy-armjoergroedel
authored andcommitted
iommu: Only log strictness for DMA domains
When passthrough is enabled, the default strictness policy becomes irrelevant, since any subsequent runtime override to a DMA domain type now embodies an explicit choice of strictness as well. Save on noise by only logging the default policy when it is meaningfully in effect. Reviewed-by: John Garry <john.garry@huawei.com> Reviewed-by: Lu Baolu <baolu.lu@linux.intel.com> Signed-off-by: Robin Murphy <robin.murphy@arm.com> Link: https://lore.kernel.org/r/9d2bcba880c6d517d0751ed8bd4960853030b4d7.1628682049.git.robin.murphy@arm.com Signed-off-by: Joerg Roedel <jroedel@suse.de>
1 parent 26225be commit 7cf8a63

1 file changed

Lines changed: 5 additions & 4 deletions

File tree

drivers/iommu/iommu.c

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -144,10 +144,11 @@ static int __init iommu_subsys_init(void)
144144
(iommu_cmd_line & IOMMU_CMD_LINE_DMA_API) ?
145145
"(set via kernel command line)" : "");
146146

147-
pr_info("DMA domain TLB invalidation policy: %s mode %s\n",
148-
iommu_dma_strict ? "strict" : "lazy",
149-
(iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ?
150-
"(set via kernel command line)" : "");
147+
if (!iommu_default_passthrough())
148+
pr_info("DMA domain TLB invalidation policy: %s mode %s\n",
149+
iommu_dma_strict ? "strict" : "lazy",
150+
(iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ?
151+
"(set via kernel command line)" : "");
151152

152153
return 0;
153154
}

0 commit comments

Comments
 (0)