Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp790097ybl; Mon, 2 Dec 2019 18:16:02 -0800 (PST) X-Google-Smtp-Source: APXvYqxYwOeBNx+rR6OPOMmYFOxDXxWty19e3GaoZ/LGEnFUgnmeB7r6VAUXDInm+3EnAZTIdODL X-Received: by 2002:a05:6808:687:: with SMTP id k7mr1892317oig.115.1575339361930; Mon, 02 Dec 2019 18:16:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575339361; cv=none; d=google.com; s=arc-20160816; b=JJrLfSpflyhCnMVLxc51Yztzyh0QevOrqpI0Ms8/f16OjKVVhr93eD6X0QPUPQeh3d gMYTXE0m4PESgSmofurY2weeGlhahaQV1iAgiH1mDx17weC3xKQfBdaYugSRDpl5TWpz i7jkfSU2PK5iiVtyepcGvvMPAFFP+rmW8hOEzeHWwAoOa2eE88Zlk5k9BlwMarzU6Tmj FY5Uzve1FcKrc42bad87zXQ4KyoxjB4OMfCg0bHZu2QMDxW18XQWcZWIxEkKaAih7a1T RO0XsEX9uBvsIh7t3fhmI33aMQJEsRXB/P8s1po/Hggf1DwIlTxnY3qwqr9+WgpFQ0z8 Onfw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:from:references:cc:to:subject:dkim-signature; bh=WfwngVdTs1PjEttJ5i7/FuDbROHVZaaW4VEsg78HE7w=; b=Ufta4PNH+R5oVRU6FpK2wXsgz1TfvgqVjTs+FssvMK3SudKYReAugDMYSXD4o1VlJ3 Z5bmwCzEipOWBs+ckjlBL5KR3uofnkvZjexGOI43QBhnIgt22l7Ls7uzrNp787Q6V9Ao je/ydoSGm2JmDRVNQ95CawqBqg0DzXKzaq5NTHl01yEFimcfnBwvvllv5eUaF3mqhQcu daLddkAKl3jUQl+BMnr/rdvbBm2j1RQ5nFdZZnPh9oBXgirTTgcqpnfXCropKWoucXFE 3PcXI+xGbA3sR8pIVTQLXwNk9CUwjTHc3nlLr2hgU/pnzQadLlC++lIfnBOGo0q/6OrE BtJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ozlabs-ru.20150623.gappssmtp.com header.s=20150623 header.b=PDuUafvq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f17si497245otq.96.2019.12.02.18.15.48; Mon, 02 Dec 2019 18:16:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ozlabs-ru.20150623.gappssmtp.com header.s=20150623 header.b=PDuUafvq; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726079AbfLCCPN (ORCPT + 99 others); Mon, 2 Dec 2019 21:15:13 -0500 Received: from mail-pf1-f195.google.com ([209.85.210.195]:41439 "EHLO mail-pf1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725899AbfLCCPN (ORCPT ); Mon, 2 Dec 2019 21:15:13 -0500 Received: by mail-pf1-f195.google.com with SMTP id s18so949377pfd.8 for ; Mon, 02 Dec 2019 18:15:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ozlabs-ru.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:autocrypt:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=WfwngVdTs1PjEttJ5i7/FuDbROHVZaaW4VEsg78HE7w=; b=PDuUafvq1tQ2wp83IeCoJfJQG/bP3XOB3F2S5S3j+YaEeq5L1KhT3oKEgcOTMvV0p3 WGbGmnlsLeiNfOMYlh5eKPRTUTLaXiHm7uXiqaR8kG/t3XVsNwI/SpoA3P/aKtO++6tE /16lTjFC9W88LdQUJQO3Tdcji9L9KNfKDp7TCeEQqg9qQ4Xayu4SbahTLoFySgKLCX30 uC3U5k4Ic11q1lgYLfBLMGjulE3IlGMwGUBpw5fL7TNoIk/Q2RRDWWxnoR0ZFG+zxVxE M8BwwZ98Qv+gkL3yyC82CmRN1fdS54Y6nmuPVqR0Lp41IvgEHKtvQGym+x+CTaedXT8Z wCUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=WfwngVdTs1PjEttJ5i7/FuDbROHVZaaW4VEsg78HE7w=; b=pIJvTuxVdWtwE3bCm0R7knU7fp0cBaRtnt2VRa6AjNr73hmYSoU/yeidp7J+H9qeWE jncwA7RyYmkCOebwpGhSq08FupAFRV6tipUA3f+o8PesKbouiUh7h20slGXIQIbN1VUY WumVjOwPqoK3Jp6VZEHTkaWjax9NIBbQaAR70T1Fs7jtAVmzv+B9csGMYQLYPyEXM+ZW wN+zXky+m3Y8mU4NxU+tPZrrEleex3H1L0CUEaWUt8gHDut9/SzW3GeRHZ0EsmdIiv/Y 5S2lMf+9NNWZzAvPxXBLm87TU76xuK6e+YnKgzGqXiN1hQBv+2Zx3yMRsX50fgrFHESM kB3g== X-Gm-Message-State: APjAAAUfeB8K2HPlFBB62h1gBbQAZcESMqjSaeo1b4n1oMZJ+MRfVJLW FPh3KuEEIiZ1OMjueAP82Ns6kMjZsbE= X-Received: by 2002:aa7:8753:: with SMTP id g19mr2318729pfo.40.1575339312003; Mon, 02 Dec 2019 18:15:12 -0800 (PST) Received: from [10.61.2.175] ([122.99.82.10]) by smtp.gmail.com with ESMTPSA id q9sm651910pjb.27.2019.12.02.18.15.06 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 02 Dec 2019 18:15:11 -0800 (PST) Subject: Re: [PATCH v4 1/2] powerpc/pseries/iommu: Share the per-cpu TCE page with the hypervisor. To: Ram Pai Cc: linuxppc-dev@lists.ozlabs.org, mpe@ellerman.id.au, benh@kernel.crashing.org, david@gibson.dropbear.id.au, paulus@ozlabs.org, mdroth@linux.vnet.ibm.com, hch@lst.de, andmike@us.ibm.com, sukadev@linux.vnet.ibm.com, mst@redhat.com, ram.n.pai@gmail.com, cai@lca.pw, tglx@linutronix.de, bauerman@linux.ibm.com, linux-kernel@vger.kernel.org References: <1575269124-17885-1-git-send-email-linuxram@us.ibm.com> <1575269124-17885-2-git-send-email-linuxram@us.ibm.com> <20191203020850.GA12354@oc0525413822.ibm.com> From: Alexey Kardashevskiy Autocrypt: addr=aik@ozlabs.ru; keydata= mQINBE+rT0sBEADFEI2UtPRsLLvnRf+tI9nA8T91+jDK3NLkqV+2DKHkTGPP5qzDZpRSH6mD EePO1JqpVuIow/wGud9xaPA5uvuVgRS1q7RU8otD+7VLDFzPRiRE4Jfr2CW89Ox6BF+q5ZPV /pS4v4G9eOrw1v09lEKHB9WtiBVhhxKK1LnUjPEH3ifkOkgW7jFfoYgTdtB3XaXVgYnNPDFo PTBYsJy+wr89XfyHr2Ev7BB3Xaf7qICXdBF8MEVY8t/UFsesg4wFWOuzCfqxFmKEaPDZlTuR tfLAeVpslNfWCi5ybPlowLx6KJqOsI9R2a9o4qRXWGP7IwiMRAC3iiPyk9cknt8ee6EUIxI6 t847eFaVKI/6WcxhszI0R6Cj+N4y+1rHfkGWYWupCiHwj9DjILW9iEAncVgQmkNPpUsZECLT WQzMuVSxjuXW4nJ6f4OFHqL2dU//qR+BM/eJ0TT3OnfLcPqfucGxubhT7n/CXUxEy+mvWwnm s9p4uqVpTfEuzQ0/bE6t7dZdPBua7eYox1AQnk8JQDwC3Rn9kZq2O7u5KuJP5MfludMmQevm pHYEMF4vZuIpWcOrrSctJfIIEyhDoDmR34bCXAZfNJ4p4H6TPqPh671uMQV82CfTxTrMhGFq 8WYU2AH86FrVQfWoH09z1WqhlOm/KZhAV5FndwVjQJs1MRXD8QARAQABtCRBbGV4ZXkgS2Fy ZGFzaGV2c2tpeSA8YWlrQG96bGFicy5ydT6JAjgEEwECACIFAk+rT0sCGwMGCwkIBwMCBhUI AgkKCwQWAgMBAh4BAheAAAoJEIYTPdgrwSC5fAIP/0wf/oSYaCq9PhO0UP9zLSEz66SSZUf7 AM9O1rau1lJpT8RoNa0hXFXIVbqPPKPZgorQV8SVmYRLr0oSmPnTiZC82x2dJGOR8x4E01gK TanY53J/Z6+CpYykqcIpOlGsytUTBA+AFOpdaFxnJ9a8p2wA586fhCZHVpV7W6EtUPH1SFTQ q5xvBmr3KkWGjz1FSLH4FeB70zP6uyuf/B2KPmdlPkyuoafl2UrU8LBADi/efc53PZUAREih sm3ch4AxaL4QIWOmlE93S+9nHZSRo9jgGXB1LzAiMRII3/2Leg7O4hBHZ9Nki8/fbDo5///+ kD4L7UNbSUM/ACWHhd4m1zkzTbyRzvL8NAVQ3rckLOmju7Eu9whiPueGMi5sihy9VQKHmEOx OMEhxLRQbzj4ypRLS9a+oxk1BMMu9cd/TccNy0uwx2UUjDQw/cXw2rRWTRCxoKmUsQ+eNWEd iYLW6TCfl9CfHlT6A7Zmeqx2DCeFafqEd69DqR9A8W5rx6LQcl0iOlkNqJxxbbW3ddDsLU/Y r4cY20++WwOhSNghhtrroP+gouTOIrNE/tvG16jHs8nrYBZuc02nfX1/gd8eguNfVX/ZTHiR gHBWe40xBKwBEK2UeqSpeVTohYWGBkcd64naGtK9qHdo1zY1P55lHEc5Uhlk743PgAnOi27Q ns5zuQINBE+rT0sBEACnV6GBSm+25ACT+XAE0t6HHAwDy+UKfPNaQBNTTt31GIk5aXb2Kl/p AgwZhQFEjZwDbl9D/f2GtmUHWKcCmWsYd5M/6Ljnbp0Ti5/xi6FyfqnO+G/wD2VhGcKBId1X Em/B5y1kZVbzcGVjgD3HiRTqE63UPld45bgK2XVbi2+x8lFvzuFq56E3ZsJZ+WrXpArQXib2 hzNFwQleq/KLBDOqTT7H+NpjPFR09Qzfa7wIU6pMNF2uFg5ihb+KatxgRDHg70+BzQfa6PPA o1xioKXW1eHeRGMmULM0Eweuvpc7/STD3K7EJ5bBq8svoXKuRxoWRkAp9Ll65KTUXgfS+c0x gkzJAn8aTG0z/oEJCKPJ08CtYQ5j7AgWJBIqG+PpYrEkhjzSn+DZ5Yl8r+JnZ2cJlYsUHAB9 jwBnWmLCR3gfop65q84zLXRQKWkASRhBp4JK3IS2Zz7Nd/Sqsowwh8x+3/IUxVEIMaVoUaxk Wt8kx40h3VrnLTFRQwQChm/TBtXqVFIuv7/Mhvvcq11xnzKjm2FCnTvCh6T2wJw3de6kYjCO 7wsaQ2y3i1Gkad45S0hzag/AuhQJbieowKecuI7WSeV8AOFVHmgfhKti8t4Ff758Z0tw5Fpc BFDngh6Lty9yR/fKrbkkp6ux1gJ2QncwK1v5kFks82Cgj+DSXK6GUQARAQABiQIfBBgBAgAJ BQJPq09LAhsMAAoJEIYTPdgrwSC5NYEP/2DmcEa7K9A+BT2+G5GXaaiFa098DeDrnjmRvumJ BhA1UdZRdfqICBADmKHlJjj2xYo387sZpS6ABbhrFxM6s37g/pGPvFUFn49C47SqkoGcbeDz Ha7JHyYUC+Tz1dpB8EQDh5xHMXj7t59mRDgsZ2uVBKtXj2ZkbizSHlyoeCfs1gZKQgQE8Ffc F8eWKoqAQtn3j4nE3RXbxzTJJfExjFB53vy2wV48fUBdyoXKwE85fiPglQ8bU++0XdOr9oyy j1llZlB9t3tKVv401JAdX8EN0++ETiOovQdzE1m+6ioDCtKEx84ObZJM0yGSEGEanrWjiwsa nzeK0pJQM9EwoEYi8TBGhHC9ksaAAQipSH7F2OHSYIlYtd91QoiemgclZcSgrxKSJhyFhmLr QEiEILTKn/pqJfhHU/7R7UtlDAmFMUp7ByywB4JLcyD10lTmrEJ0iyRRTVfDrfVP82aMBXgF tKQaCxcmLCaEtrSrYGzd1sSPwJne9ssfq0SE/LM1J7VdCjm6OWV33SwKrfd6rOtvOzgadrG6 3bgUVBw+bsXhWDd8tvuCXmdY4bnUblxF2B6GOwSY43v6suugBttIyW5Bl2tXSTwP+zQisOJo +dpVG2pRr39h+buHB3NY83NEPXm1kUOhduJUA17XUY6QQCAaN4sdwPqHq938S3EmtVhsuQIN BFq54uIBEACtPWrRdrvqfwQF+KMieDAMGdWKGSYSfoEGGJ+iNR8v255IyCMkty+yaHafvzpl PFtBQ/D7Fjv+PoHdFq1BnNTk8u2ngfbre9wd9MvTDsyP/TmpF0wyyTXhhtYvE267Av4X/BQT lT9IXKyAf1fP4BGYdTNgQZmAjrRsVUW0j6gFDrN0rq2J9emkGIPvt9rQt6xGzrd6aXonbg5V j6Uac1F42ESOZkIh5cN6cgnGdqAQb8CgLK92Yc8eiCVCH3cGowtzQ2m6U32qf30cBWmzfSH0 HeYmTP9+5L8qSTA9s3z0228vlaY0cFGcXjdodBeVbhqQYseMF9FXiEyRs28uHAJEyvVZwI49 CnAgVV/n1eZa5qOBpBL+ZSURm8Ii0vgfvGSijPGbvc32UAeAmBWISm7QOmc6sWa1tobCiVmY SNzj5MCNk8z4cddoKIc7Wt197+X/X5JPUF5nQRvg3SEHvfjkS4uEst9GwQBpsbQYH9MYWq2P PdxZ+xQE6v7cNB/pGGyXqKjYCm6v70JOzJFmheuUq0Ljnfhfs15DmZaLCGSMC0Amr+rtefpA y9FO5KaARgdhVjP2svc1F9KmTUGinSfuFm3quadGcQbJw+lJNYIfM7PMS9fftq6vCUBoGu3L j4xlgA/uQl/LPneu9mcvit8JqcWGS3fO+YeagUOon1TRqQARAQABiQRsBBgBCAAgFiEEZSrP ibrORRTHQ99dhhM92CvBILkFAlq54uICGwICQAkQhhM92CvBILnBdCAEGQEIAB0WIQQIhvWx rCU+BGX+nH3N7sq0YorTbQUCWrni4gAKCRDN7sq0YorTbVVSD/9V1xkVFyUCZfWlRuryBRZm S4GVaNtiV2nfUfcThQBfF0sSW/aFkLP6y+35wlOGJE65Riw1C2Ca9WQYk0xKvcZrmuYkK3DZ 0M9/Ikkj5/2v0vxz5Z5w/9+IaCrnk7pTnHZuZqOh23NeVZGBls/IDIvvLEjpD5UYicH0wxv+ X6cl1RoP2Kiyvenf0cS73O22qSEw0Qb9SId8wh0+ClWet2E7hkjWFkQfgJ3hujR/JtwDT/8h 3oCZFR0KuMPHRDsCepaqb/k7VSGTLBjVDOmr6/C9FHSjq0WrVB9LGOkdnr/xcISDZcMIpbRm EkIQ91LkT/HYIImL33ynPB0SmA+1TyMgOMZ4bakFCEn1vxB8Ir8qx5O0lHMOiWMJAp/PAZB2 r4XSSHNlXUaWUg1w3SG2CQKMFX7vzA31ZeEiWO8tj/c2ZjQmYjTLlfDK04WpOy1vTeP45LG2 wwtMA1pKvQ9UdbYbovz92oyZXHq81+k5Fj/YA1y2PI4MdHO4QobzgREoPGDkn6QlbJUBf4To pEbIGgW5LRPLuFlOPWHmIS/sdXDrllPc29aX2P7zdD/ivHABslHmt7vN3QY+hG0xgsCO1JG5 pLORF2N5XpM95zxkZqvYfC5tS/qhKyMcn1kC0fcRySVVeR3tUkU8/caCqxOqeMe2B6yTiU1P aNDq25qYFLeYxg67D/4w/P6BvNxNxk8hx6oQ10TOlnmeWp1q0cuutccblU3ryRFLDJSngTEu ZgnOt5dUFuOZxmMkqXGPHP1iOb+YDznHmC0FYZFG2KAc9pO0WuO7uT70lL6larTQrEneTDxQ CMQLP3qAJ/2aBH6SzHIQ7sfbsxy/63jAiHiT3cOaxAKsWkoV2HQpnmPOJ9u02TPjYmdpeIfa X2tXyeBixa3i/6dWJ4nIp3vGQicQkut1YBwR7dJq67/FCV3Mlj94jI0myHT5PIrCS2S8LtWX ikTJSxWUKmh7OP5mrqhwNe0ezgGiWxxvyNwThOHc5JvpzJLd32VDFilbxgu4Hhnf6LcgZJ2c Zd44XWqUu7FzVOYaSgIvTP0hNrBYm/E6M7yrLbs3JY74fGzPWGRbBUHTZXQEqQnZglXaVB5V ZhSFtHopZnBSCUSNDbB+QGy4B/E++Bb02IBTGl/JxmOwG+kZUnymsPvTtnNIeTLHxN/H/ae0 c7E5M+/NpslPCmYnDjs5qg0/3ihh6XuOGggZQOqrYPC3PnsNs3NxirwOkVPQgO6mXxpuifvJ DG9EMkK8IBXnLulqVk54kf7fE0jT/d8RTtJIA92GzsgdK2rpT1MBKKVffjRFGwN7nQVOzi4T XrB5p+6ML7Bd84xOEGsj/vdaXmz1esuH7BOZAGEZfLRCHJ0GVCSssg== Message-ID: <0b56ce3e-6c32-5f3b-e7cc-0d419a61d71d@ozlabs.ru> Date: Tue, 3 Dec 2019 13:15:04 +1100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.2 MIME-Version: 1.0 In-Reply-To: <20191203020850.GA12354@oc0525413822.ibm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/12/2019 13:08, Ram Pai wrote: > On Tue, Dec 03, 2019 at 11:56:43AM +1100, Alexey Kardashevskiy wrote: >> >> >> On 02/12/2019 17:45, Ram Pai wrote: >>> H_PUT_TCE_INDIRECT hcall uses a page filled with TCE entries, as one of >>> its parameters. One page is dedicated per cpu, for the lifetime of the >>> kernel for this purpose. On secure VMs, contents of this page, when >>> accessed by the hypervisor, retrieves encrypted TCE entries. Hypervisor >>> needs to know the unencrypted entries, to update the TCE table >>> accordingly. There is nothing secret or sensitive about these entries. >>> Hence share the page with the hypervisor. >> >> This unsecures a page in the guest in a random place which creates an >> additional attack surface which is hard to exploit indeed but >> nevertheless it is there. >> A safer option would be not to use the >> hcall-multi-tce hyperrtas option (which translates FW_FEATURE_MULTITCE >> in the guest). > > > Hmm... How do we not use it? AFAICT hcall-multi-tce option gets invoked > automatically when IOMMU option is enabled. It is advertised by QEMU but the guest does not have to use it. > This happens even > on a normal VM when IOMMU is enabled. > > >> >> Also what is this for anyway? > > This is for sending indirect-TCE entries to the hypervisor. > The hypervisor must be able to read those TCE entries, so that it can > use those entires to populate the TCE table with the correct mappings. > >> if I understand things right, you cannot >> map any random guest memory, you should only be mapping that 64MB-ish >> bounce buffer array but 1) I do not see that happening (I may have >> missed it) 2) it should be done once and it takes a little time for >> whatever memory size we allow for bounce buffers anyway. Thanks, > > Any random guest memory can be shared by the guest. Yes but we do not want this to be this random. I thought the whole idea of swiotlb was to restrict the amount of shared memory to bare minimum, what do I miss? > Maybe you are confusing this with the SWIOTLB bounce buffers used by PCI > devices, to transfer data to the hypervisor? Is not this for pci+swiotlb? The cover letter suggests it is for virtio-scsi-_pci_ with iommu_platform=on which makes it a normal pci device just like emulated XHCI. Thanks, > >> >> >>> >>> Signed-off-by: Ram Pai >>> --- >>> arch/powerpc/platforms/pseries/iommu.c | 23 ++++++++++++++++++++--- >>> 1 file changed, 20 insertions(+), 3 deletions(-) >>> >>> diff --git a/arch/powerpc/platforms/pseries/iommu.c b/arch/powerpc/platforms/pseries/iommu.c >>> index 6ba081d..0720831 100644 >>> --- a/arch/powerpc/platforms/pseries/iommu.c >>> +++ b/arch/powerpc/platforms/pseries/iommu.c >>> @@ -37,6 +37,7 @@ >>> #include >>> #include >>> #include >>> +#include >>> >>> #include "pseries.h" >>> >>> @@ -179,6 +180,23 @@ static int tce_build_pSeriesLP(struct iommu_table *tbl, long tcenum, >>> >>> static DEFINE_PER_CPU(__be64 *, tce_page); >>> >>> +/* >>> + * Allocate a tce page. If secure VM, share the page with the hypervisor. >>> + * >>> + * NOTE: the TCE page is shared with the hypervisor explicitly and remains >>> + * shared for the lifetime of the kernel. It is implicitly unshared at kernel >>> + * shutdown through a UV_UNSHARE_ALL_PAGES ucall. >>> + */ >>> +static __be64 *alloc_tce_page(void) >>> +{ >>> + __be64 *tcep = (__be64 *)__get_free_page(GFP_ATOMIC); >>> + >>> + if (tcep && is_secure_guest()) >>> + uv_share_page(PHYS_PFN(__pa(tcep)), 1); >>> + >>> + return tcep; >>> +} >>> + >>> static int tce_buildmulti_pSeriesLP(struct iommu_table *tbl, long tcenum, >>> long npages, unsigned long uaddr, >>> enum dma_data_direction direction, >>> @@ -206,8 +224,7 @@ static int tce_buildmulti_pSeriesLP(struct iommu_table *tbl, long tcenum, >>> * from iommu_alloc{,_sg}() >>> */ >>> if (!tcep) { >>> - tcep = (__be64 *)__get_free_page(GFP_ATOMIC); >>> - /* If allocation fails, fall back to the loop implementation */ >>> + tcep = alloc_tce_page(); >>> if (!tcep) { >>> local_irq_restore(flags); >>> return tce_build_pSeriesLP(tbl, tcenum, npages, uaddr, >>> @@ -405,7 +422,7 @@ static int tce_setrange_multi_pSeriesLP(unsigned long start_pfn, >>> tcep = __this_cpu_read(tce_page); >>> >>> if (!tcep) { >>> - tcep = (__be64 *)__get_free_page(GFP_ATOMIC); >>> + tcep = alloc_tce_page(); >>> if (!tcep) { >>> local_irq_enable(); >>> return -ENOMEM; >>> >> >> -- >> Alexey > -- Alexey