Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4087288ybp; Sun, 13 Oct 2019 21:55:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqy6aW10O1hlKDrAv9L18eJuUi+Q3U3/JFoa0c8BQjO9ONvRhSRW3BJiZ3dqMbCyLNPrhVLr X-Received: by 2002:a17:906:5051:: with SMTP id e17mr26304885ejk.139.1571028943620; Sun, 13 Oct 2019 21:55:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571028943; cv=none; d=google.com; s=arc-20160816; b=w7wsbQSaEHmTWTivT+ySM1N0dIcKG7rnSwqZu8HoWVsIaotiVgYZiUFVjoh2kkSNQT C4qq2V5E+MQ1yYmY0dDrBYD0Oqe6UB/4e1Jplz0CCjDlI6h6heFjd7WqyvrWsT6d52G3 xUPmL3BZTKYscx3qnJ8OKoCN0zvVAnwzbgV0vJGviW0q3XFSr0C9NBExbxMQuqfPmF6F 6s4pHz+LYsK3cKK7ixPsjxpvXLN0+n8gS4uRiromfTa4xnCM8VPFeqHUymJiNDx6M3HO NerL94Tcvox0TkgbllwQq5BBR581yJh+FD3Nr7SBWasmCRoyO+eS6aKjS6ZRBgmvofPO E0gw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=UhHfDWI1cDsfh7UqPX8aH2cUMma979+9bojVzxG8sVE=; b=j2vk5OphalSs779C7PGGpr3qmJMp5FdPgS++oRezO2+ivtDesDJg+cgVeEk/+DerLW zy1/IKBeRNp06eZTmbKU6n23JVwBPpOy3fuxnh0XO2y8q4jVainCbwyF5AAB6s65YkB5 6P0D1tkRjp8QiWknkzaK2RhvEakQcOInFXw+xj+gTgbGQq70KKYPPhCYzZ2XPKa24YM1 xYlutKeYfSe6PPkYcSayPkAzxVSUnR9TJpW5Mz/y4FZBpNkw1o+VOSOxKkU9z43lj6gK lRr9/9i1CC24fPP/gKn4AxMO832dkkgrWqs7epBq2v4CeWimd6oV4ZGRy+4taBHUQ368 EKlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gibson.dropbear.id.au header.s=201602 header.b=BDJfsvOK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o49si11265306edc.261.2019.10.13.21.55.20; Sun, 13 Oct 2019 21:55:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gibson.dropbear.id.au header.s=201602 header.b=BDJfsvOK; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726406AbfJNEwq (ORCPT + 99 others); Mon, 14 Oct 2019 00:52:46 -0400 Received: from ozlabs.org ([203.11.71.1]:60987 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725554AbfJNEwp (ORCPT ); Mon, 14 Oct 2019 00:52:45 -0400 Received: by ozlabs.org (Postfix, from userid 1007) id 46s5lZ6rscz9sP3; Mon, 14 Oct 2019 15:52:42 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gibson.dropbear.id.au; s=201602; t=1571028762; bh=5ic5WJLETE48dYyBLSCb1MM2F7flCGOpH3qsXLyV8n8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=BDJfsvOKlYFniqmjeT/AI6HcNOV1ln1BxU/lRTiSl1OZR30b7aBpr9jdIkYRg/52x NGxFBlDbv1VXrJo3DY0hI4ChehpnlBtf+O+oxCC95ARasIgJ+WLE9nzsP/2cHusaYK LpKGJw6gzFvNYuSsGdCxGjR6ohdcNlzb9UyGkjfk= Date: Mon, 14 Oct 2019 15:52:35 +1100 From: David Gibson To: Ram Pai Cc: linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org, linuxppc-dev@lists.ozlabs.org, virtualization@lists.linux-foundation.org, benh@kernel.crashing.org, mpe@ellerman.id.au, paulus@ozlabs.org, mdroth@linux.vnet.ibm.com, aik@linux.ibm.com, paul.burton@mips.com, robin.murphy@arm.com, b.zolnierkie@samsung.com, m.szyprowski@samsung.com, hch@lst.de, jasowang@redhat.com, andmike@us.ibm.com, sukadev@linux.vnet.ibm.com Subject: Re: [PATCH 2/2] virtio_ring: Use DMA API if memory is encrypted Message-ID: <20191014045235.GO4080@umbus.fritz.box> References: <1570843519-8696-1-git-send-email-linuxram@us.ibm.com> <1570843519-8696-2-git-send-email-linuxram@us.ibm.com> <1570843519-8696-3-git-send-email-linuxram@us.ibm.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="8N0TQpGUCeEQshoq" Content-Disposition: inline In-Reply-To: <1570843519-8696-3-git-send-email-linuxram@us.ibm.com> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --8N0TQpGUCeEQshoq Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, Oct 11, 2019 at 06:25:19PM -0700, Ram Pai wrote: > From: Thiago Jung Bauermann >=20 > Normally, virtio enables DMA API with VIRTIO_F_IOMMU_PLATFORM, which must > be set by both device and guest driver. However, as a hack, when DMA API > returns physical addresses, guest driver can use the DMA API; even though > device does not set VIRTIO_F_IOMMU_PLATFORM and just uses physical > addresses. >=20 > Doing this works-around POWER secure guests for which only the bounce > buffer is accessible to the device, but which don't set > VIRTIO_F_IOMMU_PLATFORM due to a set of hypervisor and architectural bugs. > To guard against platform changes, breaking any of these assumptions down > the road, we check at probe time and fail if that's not the case. >=20 > cc: Benjamin Herrenschmidt > cc: David Gibson > cc: Michael Ellerman > cc: Paul Mackerras > cc: Michael Roth > cc: Alexey Kardashevskiy > cc: Jason Wang > cc: Christoph Hellwig > Suggested-by: Michael S. Tsirkin > Signed-off-by: Ram Pai > Signed-off-by: Thiago Jung Bauermann Reviewed-by: David Gibson I don't know that this is the most elegant solution possible. But it's simple, gets the job done and pretty unlikely to cause mysterious breakage down the road. --=20 David Gibson | I'll have my music baroque, and my code david AT gibson.dropbear.id.au | minimalist, thank you. NOT _the_ _other_ | _way_ _around_! http://www.ozlabs.org/~dgibson --8N0TQpGUCeEQshoq Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEdfRlhq5hpmzETofcbDjKyiDZs5IFAl2j/xMACgkQbDjKyiDZ s5KZJw/7BRxGaRXVs4GwonOJMnJpzq+0zo4Rex4IzZu98y/3bSw1XB+cNfhAwGdo 00Qpp0+AGxMNUmcXy+ilSprBokq1gDBh1hbq2ap/1yoK/fcW2L5ZuyoT5m9d1AMR 4sExuhtQpr7ZMAHHC5Q99jOi44i4BNixlNI62OwtYwOoSvGz1dar6PthN/D6zZ1N k5ViBzqOY4CIoK/Onqlf47P0ZbgP2XP7rfri0m+PbY0ipOw7E+8zMl4NMIu+dGeU RQm5e1v8wX/5MUS50gAL+lW/QUxsneaCs3WLCXvHqSJL+shLJnV8Bnomgw+zsBCb lkLKb+MqdRLt+OMjmIzAtJ2Sza6CU5cpvOAWmIeTlxiwEdD5qrVzAryhFU204vwP J4ovQSOyR4geqNF3uzTvvVhdme9dNLHkwp7h9PnFwVQEYK6/BlUXxi6WXQXbcthz PDIj5YdYOwnHLsAv0uaEqRb8/n8ULgyLMfMI4EJOomafMlXF+VD0UPsOEC5glAJ4 TQ6Q0MMzMJ48BhOhwoAZDEYCJYPSXDaKKxEPgvr+uY+VeGTMuMUC8W8VyKFfEZr2 jKpt2P6u/9cPgZWI02Ve5xbRDHJ38cW74JxnTK21zEiF5m14JTYxU6lTTyPQZhFe DWvkWwsvDz0JvMt8z5DU+FZZbYAnax5XWnEqIl2urw/ChF6DHOY= =kf/I -----END PGP SIGNATURE----- --8N0TQpGUCeEQshoq--