Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4447531ybx; Mon, 4 Nov 2019 13:33:40 -0800 (PST) X-Google-Smtp-Source: APXvYqxLZMTqeoUQn27VQda7CeTexFZWA7tVRE2/LCseFHRf52jMFG32RIoAZ95HFowvitu8O3E2 X-Received: by 2002:a50:bac2:: with SMTP id x60mr14361809ede.114.1572903220777; Mon, 04 Nov 2019 13:33:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572903220; cv=none; d=google.com; s=arc-20160816; b=R6JUspqpa95o/7suqp4OdAsVNHqgOaznLXXnJLgJAa69yZgY3/+UxL3seTm1YNBHz4 Ztl2pvxShhbz4JWi1wshE6v0qL6mb0cZnmIZWzzZqXD6AekHN77XdthZjs54i7eOcCrx wYxuN/mpq1hTQSQJKKd0TppJU6aCWpV69HEm+U51zTf1TSWRiKMuj9RLFOvcsVMffxyZ lYxzRx6lX8gHxLEYXDhGMV50WqcwoIEDlXGHIRJYmgtxkm78O0Bk3klnKemW5sLSHFr0 opoGCTkfZb72Vr0UGmCpVMNR3orurZbQqcpdgLmNPpXHKCTTcgcP96GxKKC2KVl8T1dh S/og== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:references:in-reply-to:date :subject:cc:to:from; bh=DDa31auyz2WtxNnalW9KvdPdqDG0M3u4t/1CxG8BoJM=; b=OQLXcG7MN4xTP6Y3G4sE/AQgZkuAKiIklmLx7Hitl5zHUli0m+FGiNLkczBP64HiGh 6sIzUgpfvd0mCt2rdicsLTnruqN6SEcLsZIJAOnpj2rBqHEESB1Q9DzyShsr1fBge8wo FhoBnYZB4rQL5vEETAVZma8BFjoFMXZ1ZI1zLhO0Qwp+OG8HLhrujOWg07cpT9TfOprv uzE60DuvNdYdvvCWPQ3F+9uIoLYXx2atJQK/QMT+DjB8LiavJ6dMUrxYgs2nK8GzJevU xQxOOMOrzxvHkN1igjOPIPEd5AP/LyGz3DvU1apdCLtiyXpWI2J58S74rschrt4kapYb tYug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id mj10si8604708ejb.7.2019.11.04.13.33.17; Mon, 04 Nov 2019 13:33:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729668AbfKDV3r (ORCPT + 99 others); Mon, 4 Nov 2019 16:29:47 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:61034 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728377AbfKDV3r (ORCPT ); Mon, 4 Nov 2019 16:29:47 -0500 Received: from pps.filterd (m0098417.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id xA4LT2Sm070305 for ; Mon, 4 Nov 2019 16:29:46 -0500 Received: from e06smtp02.uk.ibm.com (e06smtp02.uk.ibm.com [195.75.94.98]) by mx0a-001b2d01.pphosted.com with ESMTP id 2w2un30r1p-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 04 Nov 2019 16:29:45 -0500 Received: from localhost by e06smtp02.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 4 Nov 2019 21:29:44 -0000 Received: from b06cxnps4076.portsmouth.uk.ibm.com (9.149.109.198) by e06smtp02.uk.ibm.com (192.168.101.132) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Mon, 4 Nov 2019 21:29:39 -0000 Received: from b06wcsmtp001.portsmouth.uk.ibm.com (b06wcsmtp001.portsmouth.uk.ibm.com [9.149.105.160]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id xA4LTcsj38862960 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 4 Nov 2019 21:29:38 GMT Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 5F7C7A4066; Mon, 4 Nov 2019 21:29:38 +0000 (GMT) Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7149FA4054; Mon, 4 Nov 2019 21:29:34 +0000 (GMT) Received: from oc0525413822.ibm.com (unknown [9.85.192.56]) by b06wcsmtp001.portsmouth.uk.ibm.com (Postfix) with ESMTP; Mon, 4 Nov 2019 21:29:34 +0000 (GMT) From: Ram Pai To: linuxppc-dev@lists.ozlabs.org Cc: benh@kernel.crashing.org, david@gibson.dropbear.id.au, mpe@ellerman.id.au, paulus@ozlabs.org, mdroth@linux.vnet.ibm.com, hch@lst.de, linuxram@us.ibm.com, andmike@us.ibm.com, sukadev@linux.vnet.ibm.com, mst@redhat.com, ram.n.pai@gmail.com, aik@ozlabs.ru, cai@lca.pw, tglx@linutronix.de, bauerman@linux.ibm.com, linux-kernel@vger.kernel.org Subject: [RFC v1 1/2] powerpc/pseries/iommu: Share the per-cpu TCE page with the hypervisor. Date: Mon, 4 Nov 2019 13:28:42 -0800 X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1572902923-8096-1-git-send-email-linuxram@us.ibm.com> References: <1572902923-8096-1-git-send-email-linuxram@us.ibm.com> X-TM-AS-GCONF: 00 x-cbid: 19110421-0008-0000-0000-0000032AAC48 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19110421-0009-0000-0000-00004A4A03AF Message-Id: <1572902923-8096-2-git-send-email-linuxram@us.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-11-04_11:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=3 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=867 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1911040205 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The hypervisor needs to access the contents of the page holding the TCE entries while setting up the TCE entries in the IOMMU's TCE table. For SecureVMs, since this page is encrypted, the hypervisor cannot access valid entries. Share the page with the hypervisor. This ensures that the hypervisor sees the valid entries. Signed-off-by: Ram Pai --- arch/powerpc/platforms/pseries/iommu.c | 20 +++++++++++++++++--- 1 file changed, 17 insertions(+), 3 deletions(-) diff --git a/arch/powerpc/platforms/pseries/iommu.c b/arch/powerpc/platforms/pseries/iommu.c index 8d9c2b1..07f0847 100644 --- a/arch/powerpc/platforms/pseries/iommu.c +++ b/arch/powerpc/platforms/pseries/iommu.c @@ -37,6 +37,7 @@ #include #include #include +#include #include "pseries.h" @@ -179,6 +180,19 @@ static int tce_build_pSeriesLP(struct iommu_table *tbl, long tcenum, static DEFINE_PER_CPU(__be64 *, tce_page); +/* + * Allocate a tce page. If secure VM, share the page with the hypervisor. + */ +static __be64 *alloc_tce_page(void) +{ + __be64 *tcep = (__be64 *)__get_free_page(GFP_ATOMIC); + + if (tcep && is_secure_guest()) + uv_share_page(PHYS_PFN(__pa(tcep)), 1); + + return tcep; +} + static int tce_buildmulti_pSeriesLP(struct iommu_table *tbl, long tcenum, long npages, unsigned long uaddr, enum dma_data_direction direction, @@ -206,8 +220,7 @@ static int tce_buildmulti_pSeriesLP(struct iommu_table *tbl, long tcenum, * from iommu_alloc{,_sg}() */ if (!tcep) { - tcep = (__be64 *)__get_free_page(GFP_ATOMIC); - /* If allocation fails, fall back to the loop implementation */ + tcep = alloc_tce_page(); if (!tcep) { local_irq_restore(flags); return tce_build_pSeriesLP(tbl, tcenum, npages, uaddr, @@ -391,6 +404,7 @@ static int tce_clearrange_multi_pSeriesLP(unsigned long start_pfn, return rc; } + static int tce_setrange_multi_pSeriesLP(unsigned long start_pfn, unsigned long num_pfn, const void *arg) { @@ -405,7 +419,7 @@ static int tce_setrange_multi_pSeriesLP(unsigned long start_pfn, tcep = __this_cpu_read(tce_page); if (!tcep) { - tcep = (__be64 *)__get_free_page(GFP_ATOMIC); + tcep = alloc_tce_page(); if (!tcep) { local_irq_enable(); return -ENOMEM; -- 1.8.3.1