Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp413043ybt; Wed, 17 Jun 2020 04:26:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyWfe04/GFZGioQRgrn8OO9/omwcE9ArZ1SUMP1Wb5N0g5GoHfB6RbTHTCZKY1QUIiDTxd5 X-Received: by 2002:a17:906:1e92:: with SMTP id e18mr7397245ejj.254.1592393210515; Wed, 17 Jun 2020 04:26:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592393210; cv=none; d=google.com; s=arc-20160816; b=NeSlZ6C0jyX5+rCMRwJfreRkZFM+GmLfjTLuK6NkVGpwgkUOtNI+TEPtBVDiElw/id PNJKsxTIFOlGeuAOHT+2WH1bCv9WMlI8qVkV/CxkGCezgXvVfMUE4DHwh5LS8a+yEWse YjC2CizkTf2ZOLIPB1NxBUNskdaSeIi5bKAAvkCfYGyY4BNRWFkJ1PBpzCeGbDfWT4EK em9oUu3qDjDRl/DxJtsPt1S48V40sy0dYRmp7mozWz7w4ggpnQmJBSnKe9R4ZMi98FOW eyvRx5UhCkv9Oc9PhoV9vkVspxzntQDM4ZTFmRbqSb5NUqGESdlLfs5sy/H7h9ubNz4k Nv2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=8t8fjdSraucY6M07qJnf+QcY+Ztvn06S4gNMjF6mn98=; b=EqNXBqIJ1tWxoyEEsjF92XyYfP3bZxZ8GecNztoSijBVzRguHIfXt5Qpb+ee8RmgyG 36wvs2RtURceDyzKTayl75lpTnCpjT06o0DrP23LupEuyZsprcbPjJDjBh0YK0nfSa6e Kj7YtTIRvnHogbp/Ugo+Sj1fyW9WSBzgMusRmCuOzzGSjjcEwUSEHxAYYr1cvFtZz+oT a/gyu8lGVGrLHcZ+fHgMPpxlnAdwlTEe/uwJBdLc2rFxCT0LiY2eNyBgPdT99BmZOzKI 8ujPrVcMopRz3G4G7tgyk5qY9DPyQJKKvCAf09a6m0zNuO0xyN7LbDubiPjoxZkdZ2ek Tfgw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i11si12135025ejr.28.2020.06.17.04.26.27; Wed, 17 Jun 2020 04:26:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726761AbgFQLWk (ORCPT + 99 others); Wed, 17 Jun 2020 07:22:40 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:34280 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725894AbgFQLWj (ORCPT ); Wed, 17 Jun 2020 07:22:39 -0400 Received: from pps.filterd (m0098396.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 05HB3SBG124022; Wed, 17 Jun 2020 07:22:30 -0400 Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 31q6j3jnpq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 17 Jun 2020 07:22:30 -0400 Received: from m0098396.ppops.net (m0098396.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.36/8.16.0.36) with SMTP id 05HBHbu5176128; Wed, 17 Jun 2020 07:22:30 -0400 Received: from ppma05fra.de.ibm.com (6c.4a.5195.ip4.static.sl-reverse.com [149.81.74.108]) by mx0a-001b2d01.pphosted.com with ESMTP id 31q6j3jnnx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 17 Jun 2020 07:22:29 -0400 Received: from pps.filterd (ppma05fra.de.ibm.com [127.0.0.1]) by ppma05fra.de.ibm.com (8.16.0.42/8.16.0.42) with SMTP id 05HBLLMO027045; Wed, 17 Jun 2020 11:22:27 GMT Received: from b06cxnps4074.portsmouth.uk.ibm.com (d06relay11.portsmouth.uk.ibm.com [9.149.109.196]) by ppma05fra.de.ibm.com with ESMTP id 31q6c8rcah-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 17 Jun 2020 11:22:27 +0000 Received: from b06wcsmtp001.portsmouth.uk.ibm.com (b06wcsmtp001.portsmouth.uk.ibm.com [9.149.105.160]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 05HBMO8Y59179156 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 17 Jun 2020 11:22:24 GMT Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id AF95CA405C; Wed, 17 Jun 2020 11:22:24 +0000 (GMT) Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 1A86DA405B; Wed, 17 Jun 2020 11:22:24 +0000 (GMT) Received: from osiris (unknown [9.171.12.194]) by b06wcsmtp001.portsmouth.uk.ibm.com (Postfix) with ESMTPS; Wed, 17 Jun 2020 11:22:24 +0000 (GMT) Date: Wed, 17 Jun 2020 13:22:22 +0200 From: Heiko Carstens To: Pierre Morel Cc: linux-kernel@vger.kernel.org, pasic@linux.ibm.com, borntraeger@de.ibm.com, frankja@linux.ibm.com, mst@redhat.com, jasowang@redhat.com, cohuck@redhat.com, kvm@vger.kernel.org, linux-s390@vger.kernel.org, virtualization@lists.linux-foundation.org, thomas.lendacky@amd.com, david@gibson.dropbear.id.au, linuxram@us.ibm.com, gor@linux.ibm.com Subject: Re: [PATCH v3 1/1] s390: virtio: let arch accept devices without IOMMU feature Message-ID: <20200617112222.GF4479@osiris> References: <1592390637-17441-1-git-send-email-pmorel@linux.ibm.com> <1592390637-17441-2-git-send-email-pmorel@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1592390637-17441-2-git-send-email-pmorel@linux.ibm.com> X-TM-AS-GCONF: 00 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216,18.0.687 definitions=2020-06-17_03:2020-06-17,2020-06-17 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 lowpriorityscore=0 malwarescore=0 phishscore=0 clxscore=1011 cotscore=-2147483648 suspectscore=1 spamscore=0 mlxscore=0 priorityscore=1501 bulkscore=0 mlxlogscore=648 adultscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2004280000 definitions=main-2006170087 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 17, 2020 at 12:43:57PM +0200, Pierre Morel wrote: > An architecture protecting the guest memory against unauthorized host > access may want to enforce VIRTIO I/O device protection through the > use of VIRTIO_F_IOMMU_PLATFORM. > > Let's give a chance to the architecture to accept or not devices > without VIRTIO_F_IOMMU_PLATFORM. > > Signed-off-by: Pierre Morel > Acked-by: Jason Wang > Acked-by: Christian Borntraeger > --- > arch/s390/mm/init.c | 6 ++++++ > drivers/virtio/virtio.c | 22 ++++++++++++++++++++++ > include/linux/virtio.h | 2 ++ > 3 files changed, 30 insertions(+) > > diff --git a/arch/s390/mm/init.c b/arch/s390/mm/init.c > index 6dc7c3b60ef6..215070c03226 100644 > --- a/arch/s390/mm/init.c > +++ b/arch/s390/mm/init.c > @@ -45,6 +45,7 @@ > #include > #include > #include > +#include > > pgd_t swapper_pg_dir[PTRS_PER_PGD] __section(.bss..swapper_pg_dir); > > @@ -161,6 +162,11 @@ bool force_dma_unencrypted(struct device *dev) > return is_prot_virt_guest(); > } > > +int arch_needs_virtio_iommu_platform(struct virtio_device *dev) > +{ > + return is_prot_virt_guest(); > +} > + > /* protected virtualization */ > static void pv_init(void) Can we please stop dumping random code to arch/s390/mm/init.c? All the protected virtualization functions should go into a separate file (e.g. mem_encrypt.c like on x86), some of which could also be in header files. Please consider this a comment for the future.. just go ahead with this patch as-is.