Re: [PATCH] MAINTAINERS: refurbish SWIOTLB SUBSYSTEM sections after refactoring

2022-06-01 Thread Juergen Gross via iommu
ecific one file that matches this pattern. Signed-off-by: Lukas Bulwahn Acked-by: Juergen Gross Juergen OpenPGP_0xB0DE9DD628BF132F.asc Description: OpenPGP public key OpenPGP_signature Description: OpenPGP digital signature ___ iommu mailing

Re: [PATCH V4 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM

2021-12-05 Thread Juergen Gross via iommu
On 05.12.21 09:48, Tianyu Lan wrote: On 12/5/2021 4:34 PM, Juergen Gross wrote: On 05.12.21 09:18, Tianyu Lan wrote: From: Tianyu Lan hyperv Isolation VM requires bounce buffer support to copy data from/to encrypted memory and so enable swiotlb force mode to use swiotlb bounce buffer

Re: [PATCH V4 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM

2021-12-05 Thread Juergen Gross via iommu
On 05.12.21 09:18, Tianyu Lan wrote: From: Tianyu Lan hyperv Isolation VM requires bounce buffer support to copy data from/to encrypted memory and so enable swiotlb force mode to use swiotlb bounce buffer for DMA transaction. In Isolation VM with AMD SEV, the bounce buffer needs to be

Re: [PATCH 3/3] memblock: cleanup memblock_free interface

2021-09-23 Thread Juergen Gross via iommu
); void memblock_free(void *ptr, size_t size); Replace intermediate memblock_free_ptr() with memblock_free() and drop unnecessary aliases memblock_free_early() and memblock_free_early_nid(). Suggested-by: Linus Torvalds Signed-off-by: Mike Rapoport arch/x86/xen/ parts: Reviewed-by: Juergen

Re: [PATCH 2/3] xen/x86: free_p2m_page: use memblock_free_ptr() to free a virtual pointer

2021-09-23 Thread Juergen Gross via iommu
-by: Juergen Gross Juergen OpenPGP_0xB0DE9DD628BF132F.asc Description: OpenPGP public key OpenPGP_signature Description: OpenPGP digital signature ___ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo

Re: [PATCH v2 0/4] swiotlb-xen: remaining fixes and adjustments

2021-09-20 Thread Juergen Gross via iommu
On 17.09.21 12:43, Jan Beulich wrote: The primary intention really was the last patch, there you go (on top of what is already in xen/tip.git for-linus-5.15) ... 1: swiotlb-xen: ensure to issue well-formed XENMEM_exchange requests 2: PCI: only build xen-pcifront in PV-enabled environments 3:

Re: [PATCH 00/12] swiotlb-xen: fixes and adjustments

2021-09-08 Thread Juergen Gross via iommu
On 07.09.21 14:03, Jan Beulich wrote: The primary intention really was the last patch, there you go ... 01: swiotlb-xen: avoid double free 02: swiotlb-xen: fix late init retry 03: swiotlb-xen: maintain slab count properly 04: swiotlb-xen: ensure to issue well-formed XENMEM_exchange requests 05:

Re: [PATCH 03/13] x86/HV: Add new hvcall guest address host visibility support

2021-08-02 Thread Juergen Gross via iommu
On 02.08.21 14:01, Joerg Roedel wrote: On Wed, Jul 28, 2021 at 08:29:41AM -0700, Dave Hansen wrote: __set_memory_enc_dec() is turning into a real mess. SEV, TDX and now Hyper-V are messing around in here. I was going to suggest a PV_OPS call where the fitting implementation for the guest

Re: [PATCH] swiotlb-zen: Convert to use macro

2019-09-02 Thread Juergen Gross
On 01.09.19 21:28, Souptick Joarder wrote: Rather than using static int max_dma_bits, this can be coverted to use as macro. Signed-off-by: Souptick Joarder s/zen/xen/ in the patch title, other than that: Reviewed-by: Juergen Gross Juergen

[PATCH v3 0/3] xen/swiotlb: fix an issue and improve swiotlb-xen

2019-06-13 Thread Juergen Gross
While hunting an issue in swiotlb-xen I stumbled over a wrong test and found some areas for improvement. Juergen Gross (3): xen/swiotlb: fix condition for calling xen_destroy_contiguous_region() xen/swiotlb: simplify range_straddles_page_boundary() xen/swiotlb: remember having called

[PATCH v3 1/3] xen/swiotlb: fix condition for calling xen_destroy_contiguous_region()

2019-06-13 Thread Juergen Gross
to the same MFN. This will lead to various strange crashes or data corruption. Instead of calling xen_destroy_contiguous_region() in that case a warning should be issued as that situation should never occur. Cc: sta...@vger.kernel.org Signed-off-by: Juergen Gross Reviewed-by: Boris Ostrovsky Reviewed

[PATCH v3 2/3] xen/swiotlb: simplify range_straddles_page_boundary()

2019-06-13 Thread Juergen Gross
-by: Juergen Gross Reviewed-by: Boris Ostrovsky --- drivers/xen/swiotlb-xen.c | 28 ++-- 1 file changed, 6 insertions(+), 22 deletions(-) diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c index 50fd7de54969..37ddcfcfbb21 100644 --- a/drivers/xen/swiotlb-xen.c

[PATCH v3 3/3] xen/swiotlb: remember having called xen_create_contiguous_region()

2019-06-13 Thread Juergen Gross
. As the memory in question is owned by swiotlb-xen the PG_owner_priv_1 flag of the first allocated page can be used for remembering. Signed-off-by: Juergen Gross --- V2: add PG_xen_remapped alias for PG_owner_priv_1 (Boris Ostrovsky) only clear page flag in case of sane conditions (Jan Beulich) V3

Re: [PATCH v2 3/3] xen/swiotlb: remember having called xen_create_contiguous_region()

2019-06-05 Thread Juergen Gross
On 31.05.19 13:38, Juergen Gross wrote: On 30/05/2019 14:46, Boris Ostrovsky wrote: On 5/30/19 5:04 AM, Christoph Hellwig wrote: Please don't add your private flag to page-flags.h. The whole point of the private flag is that you can use it in any way you want withou touching the common code

Re: [PATCH v2 3/3] xen/swiotlb: remember having called xen_create_contiguous_region()

2019-05-31 Thread Juergen Gross
On 30/05/2019 14:46, Boris Ostrovsky wrote: > On 5/30/19 5:04 AM, Christoph Hellwig wrote: >> Please don't add your private flag to page-flags.h. The whole point of >> the private flag is that you can use it in any way you want withou >> touching the common code. > > > There is already a bunch

Re: [Xen-devel] [PATCH v2 3/3] xen/swiotlb: remember having called xen_create_contiguous_region()

2019-05-29 Thread Juergen Gross
On 29/05/2019 11:57, Jan Beulich wrote: On 29.05.19 at 11:04, wrote: >> @@ -345,8 +346,11 @@ xen_swiotlb_free_coherent(struct device *hwdev, size_t >> size, void *vaddr, >> size = 1UL << (order + XEN_PAGE_SHIFT); >> >> if (!WARN_ON((dev_addr + size - 1 > dma_mask) || >> -

[PATCH v2 1/3] xen/swiotlb: fix condition for calling xen_destroy_contiguous_region()

2019-05-29 Thread Juergen Gross
to the same MFN. This will lead to various strange crashes or data corruption. Instead of calling xen_destroy_contiguous_region() in that case a warning should be issued as that situation should never occur. Cc: sta...@vger.kernel.org Signed-off-by: Juergen Gross Reviewed-by: Boris Ostrovsky --- V2

[PATCH v2 0/3] xen/swiotlb: fix an issue and improve swiotlb-xen

2019-05-29 Thread Juergen Gross
While hunting an issue in swiotlb-xen I stumbled over a wrong test and found some areas for improvement. Juergen Gross (3): xen/swiotlb: fix condition for calling xen_destroy_contiguous_region() xen/swiotlb: simplify range_straddles_page_boundary() xen/swiotlb: remember having called

[PATCH v2 3/3] xen/swiotlb: remember having called xen_create_contiguous_region()

2019-05-29 Thread Juergen Gross
. As the memory in question is owned by swiotlb-xen the PG_owner_priv_1 flag of the first allocated page can be used for remembering. Signed-off-by: Juergen Gross --- V2: add PG_xen_remapped alias for PG_owner_priv_1 (Boris Ostrovsky) only clear page flag in case of sane conditions (Jan Beulich

[PATCH v2 2/3] xen/swiotlb: simplify range_straddles_page_boundary()

2019-05-29 Thread Juergen Gross
-by: Juergen Gross Reviewed-by: Boris Ostrovsky --- drivers/xen/swiotlb-xen.c | 28 ++-- 1 file changed, 6 insertions(+), 22 deletions(-) diff --git a/drivers/xen/swiotlb-xen.c b/drivers/xen/swiotlb-xen.c index 1caadca124b3..aba5247b9145 100644 --- a/drivers/xen/swiotlb-xen.c

Re: [Xen-devel] [PATCH 3/3] xen/swiotlb: remember having called xen_create_contiguous_region()

2019-04-25 Thread Juergen Gross
On 25/04/2019 11:01, Jan Beulich wrote: >>>> On 23.04.19 at 20:36, wrote: >> On 23/04/2019 19:05, Stefano Stabellini wrote: >>> On Tue, 23 Apr 2019, Juergen Gross wrote: >>>> Instead of always calling xen_destroy_contiguous_region() in case the >>>

Re: [Xen-devel] [PATCH 1/3] xen/swiotlb: fix condition for calling xen_destroy_contiguous_region()

2019-04-25 Thread Juergen Gross
On 25/04/2019 10:53, Jan Beulich wrote: On 23.04.19 at 12:54, wrote: >> --- a/drivers/xen/swiotlb-xen.c >> +++ b/drivers/xen/swiotlb-xen.c >> @@ -360,8 +360,8 @@ xen_swiotlb_free_coherent(struct device *hwdev, size_t >> size, void *vaddr, >> /* Convert the size to actually allocated.

Re: [PATCH 3/3] xen/swiotlb: remember having called xen_create_contiguous_region()

2019-04-23 Thread Juergen Gross
On 23/04/2019 19:05, Stefano Stabellini wrote: > On Tue, 23 Apr 2019, Juergen Gross wrote: >> Instead of always calling xen_destroy_contiguous_region() in case the >> memory is DMA-able for the used device, do so only in case it has been >> made DMA-able via xen_create_conti

[PATCH 0/3] xen/swiotlb: fix an issue and improve swiotlb-xen

2019-04-23 Thread Juergen Gross
While hunting an issue in swiotlb-xen I stumbled over a wrong test and found some areas for improvement. Juergen Gross (3): xen/swiotlb: fix condition for calling xen_destroy_contiguous_region() xen/swiotlb: simplify range_straddles_page_boundary() xen/swiotlb: remember having called

[PATCH 1/3] xen/swiotlb: fix condition for calling xen_destroy_contiguous_region()

2019-04-23 Thread Juergen Gross
to the same MFN. This will lead to various strange crashes or data corruption. Instead of calling xen_destroy_contiguous_region() in that case a warning should be issued as that situation should never occur. Cc: sta...@vger.kernel.org Signed-off-by: Juergen Gross --- drivers/xen/swiotlb-xen.c | 4 ++-- 1

[PATCH 3/3] xen/swiotlb: remember having called xen_create_contiguous_region()

2019-04-23 Thread Juergen Gross
. As the memory in question is owned by swiotlb-xen the PG_owner_priv_1 flag of the first allocated page can be used for remembering. Signed-off-by: Juergen Gross --- drivers/xen/swiotlb-xen.c | 9 ++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/drivers/xen/swiotlb-xen.c b/drivers

Re: [PATCH v7 32/36] xen/x86: Remove SME feature in PV guests

2017-06-17 Thread Juergen Gross
On 16/06/17 20:55, Tom Lendacky wrote: > Xen does not currently support SME for PV guests. Clear the SME cpu > capability in order to avoid any ambiguity. > > Signed-off-by: Tom Lendacky <thomas.lenda...@amd.com> Reviewed-by: Juergen Gross <jgr...@suse.com> Juerge