Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp341058ybl; Wed, 11 Dec 2019 00:16:37 -0800 (PST) X-Google-Smtp-Source: APXvYqzmce/xaXD0OlShlk69JurD2sXHmGo5y6aE1OiPTjol6OYhNVejnhN1KfFo5L1NYN+wyuml X-Received: by 2002:a05:6830:1042:: with SMTP id b2mr1373842otp.306.1576052197687; Wed, 11 Dec 2019 00:16:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576052197; cv=none; d=google.com; s=arc-20160816; b=Py7DTb4cYnFnUdlMLEJB1jr0eG4mta6nRm9z1m4ZJRTLc0AcmPRz7ReHIkdaXs05Pr q8CEgye7+iu51gGEe8k38RPprWaQbxOhH0ERioXyhtlAfXEVf7ayzEXdotR9RQPGIhAa 0kYftS42vuxPB/4n1ICcDUZWcFYYYkkgjIF4daqdBarNM1j6eEdxYo9vM3Z6z0hes9sC 0pxSlt36+yySnox5bXSv9yh9gLqAEVRqmckd6dWhsjPyGd38/kiZXdMwbaRKOdKaE73s A4hFTxXgJ23ltS8KkCxhwQleE3L6bASFrKUM7c7QxVyAPNVz/ulhTGnmb4Mr4ssE9zyB 3yhg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:from:references:cc:to:subject:dkim-signature; bh=YdakCL0bZVEMnpfC8eRQK9vZ26HEglM/xaYHaiS1zJM=; b=iXre5rDhlp03UDU2m6wspT8KA4GdAtjSHwrxQPUSKaovP1utI5PYgpA8Hoq8+DpwTs tll8DFLI+a2iuOagtInINLLz0SclkZ8qJFsHSztQbr0I5XNQywZ5PPfCXyEFuQJyG3jg b3+amqAfzORxsG1T3BfKEiACtaIqWGVkXCQ8XqCQ93ehtjcsBsmdyoYdRC0ifitS59J6 lhhNeJERy4xFvVd97AYEebfKAsblA+K0429tCfwnpSIZlCQ03ABOkawlxGV7TcgET+js xcu38AaMTrf2JT0+lBJWhB+PjwgEURVR1sOnv3QUkpoHD3pKgwJ/E+sIqDTanFLLmro4 haTA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ozlabs-ru.20150623.gappssmtp.com header.s=20150623 header.b=CHN1RTJB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i26si570372otp.46.2019.12.11.00.16.24; Wed, 11 Dec 2019 00:16:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ozlabs-ru.20150623.gappssmtp.com header.s=20150623 header.b=CHN1RTJB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728272AbfLKIPy (ORCPT + 99 others); Wed, 11 Dec 2019 03:15:54 -0500 Received: from mail-pg1-f194.google.com ([209.85.215.194]:37750 "EHLO mail-pg1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728141AbfLKIPx (ORCPT ); Wed, 11 Dec 2019 03:15:53 -0500 Received: by mail-pg1-f194.google.com with SMTP id q127so10400669pga.4 for ; Wed, 11 Dec 2019 00:15:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ozlabs-ru.20150623.gappssmtp.com; s=20150623; h=subject:to:cc:references:from:autocrypt:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=YdakCL0bZVEMnpfC8eRQK9vZ26HEglM/xaYHaiS1zJM=; b=CHN1RTJBH3nnK5LFrX45/kr13tXK8lvxSXxTNF6ymxG3Or+h+uJhXLw5HbcTdafh9Q X6BJCG5YTnQm4E5vVxJTnClYhw7L/Jn7R+oVANG+YFHSDtrdxIDXnPagruIFuXr0e755 hVWEjFjuAmCz4i/SKj5sugVIIsm/BSgHPzkKG/j9OgonIalH9VxjSwNNfg2166tzM9l9 9A4FxdnMcgQFoDVuQpGu6XVuTMP4ZU0DAkRH/ftGEudsHHVl1oE8IH/Qpzn8zB0tRZIf snxcTwlF3qBDYrg3S6r5Y4HKhCy0HfU5yEeqj8tIWgAfdpGq1G82iyqi5C4ldE9Fe0lo xj0g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:autocrypt :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=YdakCL0bZVEMnpfC8eRQK9vZ26HEglM/xaYHaiS1zJM=; b=qzeZVLgKQkWhhjOYZccb/gEJE2sYSEp4tg729XKtDI30YhwL6i6nzeAp7/wnVJ6BF6 a4Z8prQ+BXEgfgGppgp3X9ZJfpbZ/8FrNjXTEBWvCU85dq9kTaFWCUV2WEyVqGGZ5b3W DPQRjB3gUgyP4SooHmVeOEBtNAFz/DhJXNXhdhRWzVXJlKoCzV7xtG4Bzb/O1QvB0gt2 zZb0oCa87Jvld/JE477MzRZSitOGpUvok6vj3yST5zVxIW6eMUtf+PUi2DCbRW7bLzoy g+xXV0jG9+qhapdJVNg71FToIVEm0lV/5lY3Fw5zKpgV/92jiofZ1GG2Qd9McBIJ5eHK hkLw== X-Gm-Message-State: APjAAAVKxofpbrsAnemYi9Zr/2GT4Hy5a54mJeylxN4NgKBODpAVePyf cpOrnyhJdEfhh9fKvTHDGAIGiw== X-Received: by 2002:aa7:94b0:: with SMTP id a16mr2357275pfl.35.1576052152376; Wed, 11 Dec 2019 00:15:52 -0800 (PST) Received: from [10.61.2.175] ([122.99.82.10]) by smtp.gmail.com with ESMTPSA id 200sm1756493pfz.121.2019.12.11.00.15.46 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 11 Dec 2019 00:15:51 -0800 (PST) Subject: Re: [PATCH v5 1/2] powerpc/pseries/iommu: Share the per-cpu TCE page with the hypervisor. To: Ram Pai Cc: mpe@ellerman.id.au, linuxppc-dev@lists.ozlabs.org, benh@kernel.crashing.org, david@gibson.dropbear.id.au, paulus@ozlabs.org, mdroth@linux.vnet.ibm.com, hch@lst.de, andmike@us.ibm.com, sukadev@linux.vnet.ibm.com, mst@redhat.com, ram.n.pai@gmail.com, cai@lca.pw, tglx@linutronix.de, bauerman@linux.ibm.com, linux-kernel@vger.kernel.org, leonardo@linux.ibm.com References: <1575681159-30356-1-git-send-email-linuxram@us.ibm.com> <1575681159-30356-2-git-send-email-linuxram@us.ibm.com> <20191210051244.GB5702@oc0525413822.ibm.com> <20191210153542.GB5709@oc0525413822.ibm.com> From: Alexey Kardashevskiy Autocrypt: addr=aik@ozlabs.ru; keydata= mQINBE+rT0sBEADFEI2UtPRsLLvnRf+tI9nA8T91+jDK3NLkqV+2DKHkTGPP5qzDZpRSH6mD EePO1JqpVuIow/wGud9xaPA5uvuVgRS1q7RU8otD+7VLDFzPRiRE4Jfr2CW89Ox6BF+q5ZPV /pS4v4G9eOrw1v09lEKHB9WtiBVhhxKK1LnUjPEH3ifkOkgW7jFfoYgTdtB3XaXVgYnNPDFo PTBYsJy+wr89XfyHr2Ev7BB3Xaf7qICXdBF8MEVY8t/UFsesg4wFWOuzCfqxFmKEaPDZlTuR tfLAeVpslNfWCi5ybPlowLx6KJqOsI9R2a9o4qRXWGP7IwiMRAC3iiPyk9cknt8ee6EUIxI6 t847eFaVKI/6WcxhszI0R6Cj+N4y+1rHfkGWYWupCiHwj9DjILW9iEAncVgQmkNPpUsZECLT WQzMuVSxjuXW4nJ6f4OFHqL2dU//qR+BM/eJ0TT3OnfLcPqfucGxubhT7n/CXUxEy+mvWwnm s9p4uqVpTfEuzQ0/bE6t7dZdPBua7eYox1AQnk8JQDwC3Rn9kZq2O7u5KuJP5MfludMmQevm pHYEMF4vZuIpWcOrrSctJfIIEyhDoDmR34bCXAZfNJ4p4H6TPqPh671uMQV82CfTxTrMhGFq 8WYU2AH86FrVQfWoH09z1WqhlOm/KZhAV5FndwVjQJs1MRXD8QARAQABtCRBbGV4ZXkgS2Fy ZGFzaGV2c2tpeSA8YWlrQG96bGFicy5ydT6JAjgEEwECACIFAk+rT0sCGwMGCwkIBwMCBhUI AgkKCwQWAgMBAh4BAheAAAoJEIYTPdgrwSC5fAIP/0wf/oSYaCq9PhO0UP9zLSEz66SSZUf7 AM9O1rau1lJpT8RoNa0hXFXIVbqPPKPZgorQV8SVmYRLr0oSmPnTiZC82x2dJGOR8x4E01gK TanY53J/Z6+CpYykqcIpOlGsytUTBA+AFOpdaFxnJ9a8p2wA586fhCZHVpV7W6EtUPH1SFTQ q5xvBmr3KkWGjz1FSLH4FeB70zP6uyuf/B2KPmdlPkyuoafl2UrU8LBADi/efc53PZUAREih sm3ch4AxaL4QIWOmlE93S+9nHZSRo9jgGXB1LzAiMRII3/2Leg7O4hBHZ9Nki8/fbDo5///+ kD4L7UNbSUM/ACWHhd4m1zkzTbyRzvL8NAVQ3rckLOmju7Eu9whiPueGMi5sihy9VQKHmEOx OMEhxLRQbzj4ypRLS9a+oxk1BMMu9cd/TccNy0uwx2UUjDQw/cXw2rRWTRCxoKmUsQ+eNWEd iYLW6TCfl9CfHlT6A7Zmeqx2DCeFafqEd69DqR9A8W5rx6LQcl0iOlkNqJxxbbW3ddDsLU/Y r4cY20++WwOhSNghhtrroP+gouTOIrNE/tvG16jHs8nrYBZuc02nfX1/gd8eguNfVX/ZTHiR gHBWe40xBKwBEK2UeqSpeVTohYWGBkcd64naGtK9qHdo1zY1P55lHEc5Uhlk743PgAnOi27Q ns5zuQINBE+rT0sBEACnV6GBSm+25ACT+XAE0t6HHAwDy+UKfPNaQBNTTt31GIk5aXb2Kl/p AgwZhQFEjZwDbl9D/f2GtmUHWKcCmWsYd5M/6Ljnbp0Ti5/xi6FyfqnO+G/wD2VhGcKBId1X Em/B5y1kZVbzcGVjgD3HiRTqE63UPld45bgK2XVbi2+x8lFvzuFq56E3ZsJZ+WrXpArQXib2 hzNFwQleq/KLBDOqTT7H+NpjPFR09Qzfa7wIU6pMNF2uFg5ihb+KatxgRDHg70+BzQfa6PPA o1xioKXW1eHeRGMmULM0Eweuvpc7/STD3K7EJ5bBq8svoXKuRxoWRkAp9Ll65KTUXgfS+c0x gkzJAn8aTG0z/oEJCKPJ08CtYQ5j7AgWJBIqG+PpYrEkhjzSn+DZ5Yl8r+JnZ2cJlYsUHAB9 jwBnWmLCR3gfop65q84zLXRQKWkASRhBp4JK3IS2Zz7Nd/Sqsowwh8x+3/IUxVEIMaVoUaxk Wt8kx40h3VrnLTFRQwQChm/TBtXqVFIuv7/Mhvvcq11xnzKjm2FCnTvCh6T2wJw3de6kYjCO 7wsaQ2y3i1Gkad45S0hzag/AuhQJbieowKecuI7WSeV8AOFVHmgfhKti8t4Ff758Z0tw5Fpc BFDngh6Lty9yR/fKrbkkp6ux1gJ2QncwK1v5kFks82Cgj+DSXK6GUQARAQABiQIfBBgBAgAJ BQJPq09LAhsMAAoJEIYTPdgrwSC5NYEP/2DmcEa7K9A+BT2+G5GXaaiFa098DeDrnjmRvumJ BhA1UdZRdfqICBADmKHlJjj2xYo387sZpS6ABbhrFxM6s37g/pGPvFUFn49C47SqkoGcbeDz Ha7JHyYUC+Tz1dpB8EQDh5xHMXj7t59mRDgsZ2uVBKtXj2ZkbizSHlyoeCfs1gZKQgQE8Ffc F8eWKoqAQtn3j4nE3RXbxzTJJfExjFB53vy2wV48fUBdyoXKwE85fiPglQ8bU++0XdOr9oyy j1llZlB9t3tKVv401JAdX8EN0++ETiOovQdzE1m+6ioDCtKEx84ObZJM0yGSEGEanrWjiwsa nzeK0pJQM9EwoEYi8TBGhHC9ksaAAQipSH7F2OHSYIlYtd91QoiemgclZcSgrxKSJhyFhmLr QEiEILTKn/pqJfhHU/7R7UtlDAmFMUp7ByywB4JLcyD10lTmrEJ0iyRRTVfDrfVP82aMBXgF tKQaCxcmLCaEtrSrYGzd1sSPwJne9ssfq0SE/LM1J7VdCjm6OWV33SwKrfd6rOtvOzgadrG6 3bgUVBw+bsXhWDd8tvuCXmdY4bnUblxF2B6GOwSY43v6suugBttIyW5Bl2tXSTwP+zQisOJo +dpVG2pRr39h+buHB3NY83NEPXm1kUOhduJUA17XUY6QQCAaN4sdwPqHq938S3EmtVhsuQIN BFq54uIBEACtPWrRdrvqfwQF+KMieDAMGdWKGSYSfoEGGJ+iNR8v255IyCMkty+yaHafvzpl PFtBQ/D7Fjv+PoHdFq1BnNTk8u2ngfbre9wd9MvTDsyP/TmpF0wyyTXhhtYvE267Av4X/BQT lT9IXKyAf1fP4BGYdTNgQZmAjrRsVUW0j6gFDrN0rq2J9emkGIPvt9rQt6xGzrd6aXonbg5V j6Uac1F42ESOZkIh5cN6cgnGdqAQb8CgLK92Yc8eiCVCH3cGowtzQ2m6U32qf30cBWmzfSH0 HeYmTP9+5L8qSTA9s3z0228vlaY0cFGcXjdodBeVbhqQYseMF9FXiEyRs28uHAJEyvVZwI49 CnAgVV/n1eZa5qOBpBL+ZSURm8Ii0vgfvGSijPGbvc32UAeAmBWISm7QOmc6sWa1tobCiVmY SNzj5MCNk8z4cddoKIc7Wt197+X/X5JPUF5nQRvg3SEHvfjkS4uEst9GwQBpsbQYH9MYWq2P PdxZ+xQE6v7cNB/pGGyXqKjYCm6v70JOzJFmheuUq0Ljnfhfs15DmZaLCGSMC0Amr+rtefpA y9FO5KaARgdhVjP2svc1F9KmTUGinSfuFm3quadGcQbJw+lJNYIfM7PMS9fftq6vCUBoGu3L j4xlgA/uQl/LPneu9mcvit8JqcWGS3fO+YeagUOon1TRqQARAQABiQRsBBgBCAAgFiEEZSrP ibrORRTHQ99dhhM92CvBILkFAlq54uICGwICQAkQhhM92CvBILnBdCAEGQEIAB0WIQQIhvWx rCU+BGX+nH3N7sq0YorTbQUCWrni4gAKCRDN7sq0YorTbVVSD/9V1xkVFyUCZfWlRuryBRZm S4GVaNtiV2nfUfcThQBfF0sSW/aFkLP6y+35wlOGJE65Riw1C2Ca9WQYk0xKvcZrmuYkK3DZ 0M9/Ikkj5/2v0vxz5Z5w/9+IaCrnk7pTnHZuZqOh23NeVZGBls/IDIvvLEjpD5UYicH0wxv+ X6cl1RoP2Kiyvenf0cS73O22qSEw0Qb9SId8wh0+ClWet2E7hkjWFkQfgJ3hujR/JtwDT/8h 3oCZFR0KuMPHRDsCepaqb/k7VSGTLBjVDOmr6/C9FHSjq0WrVB9LGOkdnr/xcISDZcMIpbRm EkIQ91LkT/HYIImL33ynPB0SmA+1TyMgOMZ4bakFCEn1vxB8Ir8qx5O0lHMOiWMJAp/PAZB2 r4XSSHNlXUaWUg1w3SG2CQKMFX7vzA31ZeEiWO8tj/c2ZjQmYjTLlfDK04WpOy1vTeP45LG2 wwtMA1pKvQ9UdbYbovz92oyZXHq81+k5Fj/YA1y2PI4MdHO4QobzgREoPGDkn6QlbJUBf4To pEbIGgW5LRPLuFlOPWHmIS/sdXDrllPc29aX2P7zdD/ivHABslHmt7vN3QY+hG0xgsCO1JG5 pLORF2N5XpM95zxkZqvYfC5tS/qhKyMcn1kC0fcRySVVeR3tUkU8/caCqxOqeMe2B6yTiU1P aNDq25qYFLeYxg67D/4w/P6BvNxNxk8hx6oQ10TOlnmeWp1q0cuutccblU3ryRFLDJSngTEu ZgnOt5dUFuOZxmMkqXGPHP1iOb+YDznHmC0FYZFG2KAc9pO0WuO7uT70lL6larTQrEneTDxQ CMQLP3qAJ/2aBH6SzHIQ7sfbsxy/63jAiHiT3cOaxAKsWkoV2HQpnmPOJ9u02TPjYmdpeIfa X2tXyeBixa3i/6dWJ4nIp3vGQicQkut1YBwR7dJq67/FCV3Mlj94jI0myHT5PIrCS2S8LtWX ikTJSxWUKmh7OP5mrqhwNe0ezgGiWxxvyNwThOHc5JvpzJLd32VDFilbxgu4Hhnf6LcgZJ2c Zd44XWqUu7FzVOYaSgIvTP0hNrBYm/E6M7yrLbs3JY74fGzPWGRbBUHTZXQEqQnZglXaVB5V ZhSFtHopZnBSCUSNDbB+QGy4B/E++Bb02IBTGl/JxmOwG+kZUnymsPvTtnNIeTLHxN/H/ae0 c7E5M+/NpslPCmYnDjs5qg0/3ihh6XuOGggZQOqrYPC3PnsNs3NxirwOkVPQgO6mXxpuifvJ DG9EMkK8IBXnLulqVk54kf7fE0jT/d8RTtJIA92GzsgdK2rpT1MBKKVffjRFGwN7nQVOzi4T XrB5p+6ML7Bd84xOEGsj/vdaXmz1esuH7BOZAGEZfLRCHJ0GVCSssg== Message-ID: <90f6019b-d756-7f33-21b0-bb49c1c842da@ozlabs.ru> Date: Wed, 11 Dec 2019 19:15:44 +1100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.3.0 MIME-Version: 1.0 In-Reply-To: <20191210153542.GB5709@oc0525413822.ibm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/12/2019 02:35, Ram Pai wrote: > On Tue, Dec 10, 2019 at 04:32:10PM +1100, Alexey Kardashevskiy wrote: >> >> >> On 10/12/2019 16:12, Ram Pai wrote: >>> On Tue, Dec 10, 2019 at 02:07:36PM +1100, Alexey Kardashevskiy wrote: >>>> >>>> >>>> On 07/12/2019 12:12, Ram Pai wrote: >>>>> H_PUT_TCE_INDIRECT hcall uses a page filled with TCE entries, as one of >>>>> its parameters. On secure VMs, hypervisor cannot access the contents of >>>>> this page since it gets encrypted. Hence share the page with the >>>>> hypervisor, and unshare when done. >>>> >>>> >>>> I thought the idea was to use H_PUT_TCE and avoid sharing any extra >>>> pages. There is small problem that when DDW is enabled, >>>> FW_FEATURE_MULTITCE is ignored (easy to fix); I also noticed complains >>>> about the performance on slack but this is caused by initial cleanup of >>>> the default TCE window (which we do not use anyway) and to battle this >>>> we can simply reduce its size by adding >>> >>> something that takes hardly any time with H_PUT_TCE_INDIRECT, takes >>> 13secs per device for H_PUT_TCE approach, during boot. This is with a >>> 30GB guest. With larger guest, the time will further detoriate. >> >> >> No it will not, I checked. The time is the same for 2GB and 32GB guests- >> the delay is caused by clearing the small DMA window which is small by >> the space mapped (1GB) but quite huge in TCEs as it uses 4K pages; and >> for DDW window + emulated devices the IOMMU page size will be 2M/16M/1G >> (depends on the system) so the number of TCEs is much smaller. > > I cant get your results. What changes did you make to get it? Get what? I passed "-m 2G" and "-m 32G", got the same time - 13s spent in clearing the default window and the huge window took a fraction of a second to create and map. >>>> >>>> -global >>>> spapr-pci-host-bridge.dma_win_size=0x4000000 >>> >>> This option, speeds it up tremendously. But than should this option be >>> enabled in qemu by default? only for secure VMs? for both VMs? >> >> >> As discussed in slack, by default we do not need to clear the entire TCE >> table and we only have to map swiotlb buffer using the small window. It >> is a guest kernel change only. Thanks, > > Can you tell me what code you are talking about here. Where is the TCE > table getting cleared? What code needs to be changed to not clear it? pci_dma_bus_setup_pSeriesLP() iommu_init_table() iommu_table_clear() for () tbl->it_ops->get() We do not really need to clear it there, we only need it for VFIO with IOMMU SPAPR TCE v1 which reuses these tables but there are iommu_take_ownership/iommu_release_ownership to clear these tables. I'll send a patch for this. > Is the code in tce_buildmulti_pSeriesLP(), the one that does the clear > aswell? This one does not need to clear TCEs as this creates a window of known size and maps it all. Well, actually, it only maps actual guest RAM, if there are gaps in RAM, then TCEs for the gaps will have what hypervisor had there (which is zeroes, qemu/kvm clears it anyway). > But before I close, you have not told me clearly, what is the problem > with; 'share the page, make the H_PUT_INDIRECT_TCE hcall, unshare the page'. Between share and unshare you have a (tiny) window of opportunity to attack the guest. No, I do not know how exactly. For example, the hypervisor does a lot of PHB+PCI hotplug-unplug with 64bit devices - each time this will create a huge window which will share/unshare the same page. No, I do not know how exactly how this can be exploited either, we cannot rely of what you or myself know today. My point is that we should not be sharing pages at all unless we really really have to, and this does not seem to be the case. But since this seems to an acceptable compromise anyway, Reviewed-by: Alexey Kardashevskiy > Remember this is the same page that is earmarked for doing > H_PUT_INDIRECT_TCE, not by my patch, but its already earmarked by the > existing code. So it not some random buffer that is picked. Second > this page is temporarily shared and unshared, it does not stay shared > for life. It does not slow the boot. it does not need any > special command line options on the qemu. >> Shared pages technology was put in place, exactly for the purpose of > sharing data with the hypervisor. We are using this technology exactly > for that purpose. And finally I agreed with your concern of having > shared pages staying around. Hence i addressed that concern, by > unsharing the page. At this point, I fail to understand your concern. -- Alexey