Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp2131903ybi; Sat, 1 Jun 2019 10:16:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqyHdKmY98IrpRsMDyW+Xotq4d+nOJRA/2RC1hzERWhuOvCvNkvYedMijYoDY3ksUBCPwQlB X-Received: by 2002:a17:902:b695:: with SMTP id c21mr17413272pls.160.1559409417162; Sat, 01 Jun 2019 10:16:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559409417; cv=none; d=google.com; s=arc-20160816; b=RSY14p3NceHOxWTQjRK3GJXoTC4LOnxITdOhRAzHG7T6X0ScFmD5f14SmLvv+Pr9/1 VUsHvBq74aZgaQnMXWEMoJ3w4PyRdSIyqN0PFJ6/su436PN/boral8O9qk692n1ax8B1 3dyeGaDWh6k8rB0yYNF9sd6rqgsKHvjeJ1fBsY8syQnasUeU4AZGh7X0kZXMuIrhd7hf 4XDeehDMtO9XuRxZ+R3nZvhy0u3Y55RyTZ2PG+gktApiwBxY4njlgBrimws1byVRIPU9 D6/Ed/wwZSAuQ7/ANI+QTSc7mf8Qxk1vr9R47me7USxNAQfeSEvP3MpdH1jxr+A7y4Vh zpDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:mime-version:date:in-reply-to :subject:cc:to:from:user-agent:references; bh=CyIVdOkGEj9KtgvhQFnNKvDl5cX6NFAgTn7Hn3rfHG8=; b=ytz7YJx7xK8QfzUV4ddOFHrgE38iR+HRmCIn5pCFYF7uc8Tt8dfaba6DLhHNPGFneM 73OyHLGUKLFcbluAI9xtndiDHB078M6WCMhIAR7V5Q63f3HjoUdvoHxB+vXkw5u6H/LP V3sYJbXltDK4O1kLflWBNe5xSWT4aaDpfkOXf8XZr2jZTKh3OnzUtqA8e24GslJoQXZU ji8hbIGSm16jhZ48ZquhjwY3mzHRRh0ih00iw79NyBHXO8O9aSau0+P2sS3QBBmuV6rr /ib+WdGXP88zY8qbgn0irRzFvBLqKQ+8SqKfhwnz0dqwZ2+aKqzwnPmOP5sbrLimB0iw Tmeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r127si11057528pgr.359.2019.06.01.10.16.00; Sat, 01 Jun 2019 10:16:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726343AbfFARMI (ORCPT + 99 others); Sat, 1 Jun 2019 13:12:08 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:49916 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726013AbfFARMI (ORCPT ); Sat, 1 Jun 2019 13:12:08 -0400 Received: from pps.filterd (m0098399.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x51H7WU5088742 for ; Sat, 1 Jun 2019 13:12:07 -0400 Received: from e14.ny.us.ibm.com (e14.ny.us.ibm.com [129.33.205.204]) by mx0a-001b2d01.pphosted.com with ESMTP id 2sunh5u9br-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Sat, 01 Jun 2019 13:12:06 -0400 Received: from localhost by e14.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Sat, 1 Jun 2019 18:12:05 +0100 Received: from b01cxnp23033.gho.pok.ibm.com (9.57.198.28) by e14.ny.us.ibm.com (146.89.104.201) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Sat, 1 Jun 2019 18:12:01 +0100 Received: from b01ledav004.gho.pok.ibm.com (b01ledav004.gho.pok.ibm.com [9.57.199.109]) by b01cxnp23033.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x51HC0TI31130018 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 1 Jun 2019 17:12:00 GMT Received: from b01ledav004.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 1A936112062; Sat, 1 Jun 2019 17:12:00 +0000 (GMT) Received: from b01ledav004.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 713DD112061; Sat, 1 Jun 2019 17:11:57 +0000 (GMT) Received: from morokweng.localdomain (unknown [9.80.209.235]) by b01ledav004.gho.pok.ibm.com (Postfix) with ESMTPS; Sat, 1 Jun 2019 17:11:57 +0000 (GMT) References: <20190521044912.1375-1-bauerman@linux.ibm.com> User-agent: mu4e 1.0; emacs 26.2 From: Thiago Jung Bauermann To: linuxppc-dev@lists.ozlabs.org Cc: linux-kernel@vger.kernel.org, Alexey Kardashevskiy , Anshuman Khandual , Benjamin Herrenschmidt , Christoph Hellwig , Michael Ellerman , Mike Anderson , Paul Mackerras , Ram Pai , Claudio Carvalho Subject: Re: [PATCH 00/12] Secure Virtual Machine Enablement In-reply-to: <20190521044912.1375-1-bauerman@linux.ibm.com> Date: Sat, 01 Jun 2019 14:11:53 -0300 MIME-Version: 1.0 Content-Type: text/plain X-TM-AS-GCONF: 00 x-cbid: 19060117-0052-0000-0000-000003CA0417 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00011197; HX=3.00000242; KW=3.00000007; PH=3.00000004; SC=3.00000286; SDB=6.01211780; UDB=6.00636760; IPR=6.00992823; MB=3.00027145; MTD=3.00000008; XFM=3.00000015; UTC=2019-06-01 17:12:04 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19060117-0053-0000-0000-0000612056EE Message-Id: <87imtpgrhi.fsf@morokweng.localdomain> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-06-01_12:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=1 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=956 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1906010124 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, Thiago Jung Bauermann writes: > This series enables Secure Virtual Machines (SVMs) on powerpc. SVMs use the > Protected Execution Facility (PEF) and request to be migrated to secure > memory during prom_init() so by default all of their memory is inaccessible > to the hypervisor. There is an Ultravisor call that the VM can use to > request certain pages to be made accessible to (or shared with) the > hypervisor. > > The objective of these patches is to have the guest perform this request > for buffers that need to be accessed by the hypervisor such as the LPPACAs, > the SWIOTLB memory and the Debug Trace Log. Ping? Any more comments on these patches? Or even acks? :-) -- Thiago Jung Bauermann IBM Linux Technology Center