iommu: Only log strictness for DMA domains

When passthrough is enabled, the default strictness policy becomes
irrelevant, since any subsequent runtime override to a DMA domain type
now embodies an explicit choice of strictness as well. Save on noise by
only logging the default policy when it is meaningfully in effect.

Reviewed-by: John Garry <john.garry@huawei.com>
Reviewed-by: Lu Baolu <baolu.lu@linux.intel.com>
Signed-off-by: Robin Murphy <robin.murphy@arm.com>
Link: https://lore.kernel.org/r/9d2bcba880c6d517d0751ed8bd4960853030b4d7.1628682049.git.robin.murphy@arm.com
Signed-off-by: Joerg Roedel <jroedel@suse.de>
This commit is contained in:
Robin Murphy 2021-08-11 13:21:36 +01:00 committed by Joerg Roedel
parent 26225bea1d
commit 7cf8a63867
1 changed files with 5 additions and 4 deletions

View File

@ -144,10 +144,11 @@ static int __init iommu_subsys_init(void)
(iommu_cmd_line & IOMMU_CMD_LINE_DMA_API) ? (iommu_cmd_line & IOMMU_CMD_LINE_DMA_API) ?
"(set via kernel command line)" : ""); "(set via kernel command line)" : "");
pr_info("DMA domain TLB invalidation policy: %s mode %s\n", if (!iommu_default_passthrough())
iommu_dma_strict ? "strict" : "lazy", pr_info("DMA domain TLB invalidation policy: %s mode %s\n",
(iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ? iommu_dma_strict ? "strict" : "lazy",
"(set via kernel command line)" : ""); (iommu_cmd_line & IOMMU_CMD_LINE_STRICT) ?
"(set via kernel command line)" : "");
return 0; return 0;
} }