Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2771351pxj; Mon, 14 Jun 2021 06:52:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyNo7/m7oYLO6UTJjQ6+X7sXPwJ6OXZxQQ0dCbdLaG5k0Z3w3QsME14k498JNCFZmHWqylO X-Received: by 2002:a17:906:4ad2:: with SMTP id u18mr14935703ejt.197.1623678741143; Mon, 14 Jun 2021 06:52:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623678741; cv=none; d=google.com; s=arc-20160816; b=YVnUQ6NYXZvCR8rOGrH+/q7R/0n15Tc4HQ1uWsLDP8dugt07mZKoxPMdEmkfzen8xd r7lrer4KFBwwENzMHULVKzEO7lL6yF95Kwca4Xk2xAEwOWCt006I7rXZC6c8kccZodNK LqF0rGzHubyw1+W82T/qvT+q2YMrek9br0JOrJ6wBtH2U/vo/UiV4xD2v/bm6zVpmCHu nUq2t77ebS+oHJQAqUNUJvXlNgi/kmcjzK6/JhZloSqgOOzDdnmZWwoytmAluhfdDTNu /Ngl9l6TFPDbAl9kEOk8EBxtHhRuPIc64cmsCYUVfVueLdXjKo/B6oq/IFj0+kt4lrhW aXiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=QFp8u7UH/oyL0AoCQVdZZMgA4pQXx5RFqprQqZLYOBA=; b=MMB9ytgWaSkbLSJCwRB2y1A1Ksb7XpN99/8PRP83R0hsSe6L5ylz5ikvzdvcxk+R2Z c54iVaTkyVS373VINKFcjyfCpAvKg92QzE5ye8KkWcdQ9IfRhwNAy1ACx5T5U5aJrgul l63zctXQ9+BQB8uyx/IeElwr0xhOy1BkbpzEUliHX18yNZ2I8zRwnHJRCrAVZyQ6Zk0P TFPAXPW6U9D+ngDlI5SmAmo3B8PCe2qspX1SyzMBJW/VE314NdmmtEsaF3bffLyl33BO Qi1YfOzsciWscC5edbjtWaHrUvOwHtISmuTnIY2KucT5rJUOb52yffm3OOILobWJgoUg LMiw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 4si1124593ejb.528.2021.06.14.06.51.58; Mon, 14 Jun 2021 06:52:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233434AbhFNNwL (ORCPT + 99 others); Mon, 14 Jun 2021 09:52:11 -0400 Received: from foss.arm.com ([217.140.110.172]:36608 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233803AbhFNNwH (ORCPT ); Mon, 14 Jun 2021 09:52:07 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 294C36D; Mon, 14 Jun 2021 06:50:04 -0700 (PDT) Received: from [10.57.9.136] (unknown [10.57.9.136]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 4A2A83F70D; Mon, 14 Jun 2021 06:49:57 -0700 (PDT) Subject: Re: [RFC PATCH V3 08/11] swiotlb: Add bounce buffer remap address setting function To: Christoph Hellwig , Tianyu Lan Cc: kys@microsoft.com, haiyangz@microsoft.com, sthemmin@microsoft.com, wei.liu@kernel.org, decui@microsoft.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, x86@kernel.org, hpa@zytor.com, arnd@arndb.de, dave.hansen@linux.intel.com, luto@kernel.org, peterz@infradead.org, akpm@linux-foundation.org, kirill.shutemov@linux.intel.com, rppt@kernel.org, hannes@cmpxchg.org, cai@lca.pw, krish.sadhukhan@oracle.com, saravanand@fb.com, Tianyu.Lan@microsoft.com, konrad.wilk@oracle.com, m.szyprowski@samsung.com, boris.ostrovsky@oracle.com, jgross@suse.com, sstabellini@kernel.org, joro@8bytes.org, will@kernel.org, xen-devel@lists.xenproject.org, davem@davemloft.net, kuba@kernel.org, jejb@linux.ibm.com, martin.petersen@oracle.com, iommu@lists.linux-foundation.org, linux-arch@vger.kernel.org, linux-hyperv@vger.kernel.org, linux-kernel@vger.kernel.org, linux-scsi@vger.kernel.org, netdev@vger.kernel.org, vkuznets@redhat.com, thomas.lendacky@amd.com, brijesh.singh@amd.com, sunilmut@microsoft.com References: <20210530150628.2063957-1-ltykernel@gmail.com> <20210530150628.2063957-9-ltykernel@gmail.com> <20210607064312.GB24478@lst.de> From: Robin Murphy Message-ID: <94038087-a33c-93c5-27bf-7ec1f6f5f0e3@arm.com> Date: Mon, 14 Jun 2021 14:49:51 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: <20210607064312.GB24478@lst.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-06-07 07:43, Christoph Hellwig wrote: > On Sun, May 30, 2021 at 11:06:25AM -0400, Tianyu Lan wrote: >> From: Tianyu Lan >> >> For Hyper-V isolation VM with AMD SEV SNP, the bounce buffer(shared memory) >> needs to be accessed via extra address space(e.g address above bit39). >> Hyper-V code may remap extra address space outside of swiotlb. swiotlb_ >> bounce() needs to use remap virtual address to copy data from/to bounce >> buffer. Add new interface swiotlb_set_bounce_remap() to do that. > > Why can't you use the bus_dma_region ranges to remap to your preferred > address? FWIW, I think a better generalisation for this would be allowing set_memory_decrypted() to return an address rather than implicitly operating in-place, and hide all the various hypervisor hooks behind that. Robin.