Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp861251ybv; Thu, 20 Feb 2020 08:33:30 -0800 (PST) X-Google-Smtp-Source: APXvYqyCTrYmFc642A0OBw2z33/5j1CKV14HloBtFDgdZtzSDv7UcZQUyWi+h98ksCwWha7emZuC X-Received: by 2002:a9d:6e15:: with SMTP id e21mr10619526otr.289.1582216410833; Thu, 20 Feb 2020 08:33:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582216410; cv=none; d=google.com; s=arc-20160816; b=ZNUScfWIdMqU9HWGWkBXEhoGmV/jXdhzifZMvbD7THXPe9wsyV0iaoU0w+vuReJu2N F+gGT75ft1BAfWhkt+lHiKEQWDFDAB0/U+5Zl/hxvzbsjuAp41GH7hXvsEu1hfa7tq8r KSqqaKO0M526PFelYFcoFO62t/F+Sx7cxiLBSay6xId3kQQBgelG0BGtwYdihdgYO9gW Ix0ztdG3B5L8v9d/VKpt8FTTHSgaYG31EhCZj8MvMHhs5E2davdiGW4/lxtiCt5FIDHA XxdWeoaPOAZT8cW6Pce6zJMXA8iYwz1Zycnsi10ao3xsn2vwOT9WsMjK8iEzEZ6fxH/B VazA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=/thyihuHjlZOo34AYjnUpZ/8JTFlVaxJ7FiCFWyQfU4=; b=mvev/zktsUSdLd4caRMhTaHl1E2BeRxQB+Vf6a/XkuQ3rtgg/JATz3i52zJvZDNKLi zZXo/6OFf5ZlVmKLyV+QdGTW8yVo9/3kszX5VvHfC51Snj2xmGqvapxzIjsJix8EF7pc DsuoL1ojNGfagP9WLoYQ3ak0Mp4yDpnjynsa7/I0yBlJXQFqrhec8/aXHiasWAA94qLw Zbgu5g5PbiWolciXQ+3QJU2vhSeNeHh9TrQAv2lwEXn9lzohByynXTqKDwyMfscZdmPq yDV0zAvNH/lguRNeKpQut6LayW5pJqMPqwFMqPkRG3TSIVgKEXP32EBeVPcHQUs02pzA 5aow== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z26si11210137oid.247.2020.02.20.08.33.16; Thu, 20 Feb 2020 08:33:30 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728938AbgBTQbk (ORCPT + 99 others); Thu, 20 Feb 2020 11:31:40 -0500 Received: from verein.lst.de ([213.95.11.211]:50298 "EHLO verein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728925AbgBTQbj (ORCPT ); Thu, 20 Feb 2020 11:31:39 -0500 Received: by verein.lst.de (Postfix, from userid 2407) id 07B1C68BFE; Thu, 20 Feb 2020 17:31:36 +0100 (CET) Date: Thu, 20 Feb 2020 17:31:35 +0100 From: Christoph Hellwig To: Christian Borntraeger Cc: Christoph Hellwig , Halil Pasic , "Michael S. Tsirkin" , Jason Wang , Marek Szyprowski , Robin Murphy , linux-s390@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org, Janosch Frank , Viktor Mihajlovski , Cornelia Huck , Ram Pai , Thiago Jung Bauermann , David Gibson , "Lendacky, Thomas" , Michael Mueller Subject: Re: [PATCH 1/2] mm: move force_dma_unencrypted() to mem_encrypt.h Message-ID: <20200220163135.GA13192@lst.de> References: <20200220160606.53156-1-pasic@linux.ibm.com> <20200220160606.53156-2-pasic@linux.ibm.com> <20200220161146.GA12709@lst.de> <4369f099-e4e4-4a58-b38b-642cf53ccca6@de.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4369f099-e4e4-4a58-b38b-642cf53ccca6@de.ibm.com> User-Agent: Mutt/1.5.17 (2007-11-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 20, 2020 at 05:23:20PM +0100, Christian Borntraeger wrote: > >From a users perspective it makes absolutely perfect sense to use the > bounce buffers when they are NEEDED. > Forcing the user to specify iommu_platform just because you need bounce buffers > really feels wrong. And obviously we have a severe performance issue > because of the indirections. The point is that the user should not have to specify iommu_platform. We need to make sure any new hypervisor (especially one that might require bounce buffering) always sets it, as was a rather bogus legacy hack that isn't extensibe for cases that for example require bounce buffering.