Re: [PATCH v4 00/14] x86: Trenchboot secure dynamic launch Linux kernel support

2021-12-02 Thread Daniel P. Smith
Hi Paul! On 11/30/21 8:06 PM, Paul Moore wrote: > On Fri, Aug 27, 2021 at 9:20 AM Ross Philipson > wrote: >> >> The larger focus of the Trechboot project (https://github.com/TrenchBoot) is >> to >> enhance the boot security and integrity in a unified manner. The first area >> of >> focus has

Re: [patch 21/32] NTB/msi: Convert to msi_on_each_desc()

2021-12-02 Thread Thomas Gleixner
Jason, On Thu, Dec 02 2021 at 09:55, Jason Gunthorpe wrote: > On Thu, Dec 02, 2021 at 01:01:42AM +0100, Thomas Gleixner wrote: >> On Wed, Dec 01 2021 at 21:21, Thomas Gleixner wrote: >> > On Wed, Dec 01 2021 at 14:14, Jason Gunthorpe wrote: >> > Which in turn is consistent all over the place and

Re: [patch 21/32] NTB/msi: Convert to msi_on_each_desc()

2021-12-02 Thread Jason Gunthorpe via iommu
On Thu, Dec 02, 2021 at 08:25:48PM +0100, Thomas Gleixner wrote: > Jason, > > On Thu, Dec 02 2021 at 09:55, Jason Gunthorpe wrote: > > On Thu, Dec 02, 2021 at 01:01:42AM +0100, Thomas Gleixner wrote: > >> On Wed, Dec 01 2021 at 21:21, Thomas Gleixner wrote: > >> > On Wed, Dec 01 2021 at 14:14,

Re: [patch 21/32] NTB/msi: Convert to msi_on_each_desc()

2021-12-02 Thread Thomas Gleixner
Jason, On Thu, Dec 02 2021 at 16:00, Jason Gunthorpe wrote: > On Thu, Dec 02, 2021 at 08:25:48PM +0100, Thomas Gleixner wrote: >> We seem to have a serious problem of terminology and the understanding >> of topology which is why we continue to talk past each other forever. > > I think I

Re: [PATCH v3 2/5] iommu/virtio: Support bypass domains

2021-12-02 Thread Eric Auger
On 12/1/21 6:33 PM, Jean-Philippe Brucker wrote: > The VIRTIO_IOMMU_F_BYPASS_CONFIG feature adds a new flag to the ATTACH > request, that creates a bypass domain. Use it to enable identity > domains. > > When VIRTIO_IOMMU_F_BYPASS_CONFIG is not supported by the device, we > currently fail

Re: [PATCH] mm: kmemleak: Ignore kmemleak scanning on CMA regions

2021-12-02 Thread Catalin Marinas
On Sun, Nov 28, 2021 at 09:50:53AM +0800, Calvin Zhang wrote: > On Sat, Nov 27, 2021 at 04:07:18PM -0800, Andrew Morton wrote: > >On Fri, 26 Nov 2021 10:47:11 +0800 Calvin Zhang > >wrote: > >> Just like this: > >> commit 620951e27457 ("mm/cma: make kmemleak ignore CMA regions"). > >> > >> Add

Re: [PATCH v4 04/14] Documentation/x86: Secure Launch kernel documentation

2021-12-02 Thread Robin Murphy
On 2021-08-27 14:28, Ross Philipson wrote: [...] +IOMMU Configuration +--- + +When doing a Secure Launch, the IOMMU should always be enabled and the drivers +loaded. However, IOMMU passthrough mode should never be used. This leaves the +MLE completely exposed to DMA after the

Re: [PATCH v3 1/5] iommu/virtio: Add definitions for VIRTIO_IOMMU_F_BYPASS_CONFIG

2021-12-02 Thread Eric Auger
Hi Jean, On 12/1/21 6:33 PM, Jean-Philippe Brucker wrote: > Add definitions for the VIRTIO_IOMMU_F_BYPASS_CONFIG, which supersedes > VIRTIO_IOMMU_F_BYPASS. > > Reviewed-by: Kevin Tian > Signed-off-by: Jean-Philippe Brucker Reviewed-by: Eric Auger Eric > --- >

Re: [patch 21/32] NTB/msi: Convert to msi_on_each_desc()

2021-12-02 Thread Jason Gunthorpe via iommu
On Thu, Dec 02, 2021 at 11:31:11PM +0100, Thomas Gleixner wrote: > The software representation aka struct msi_desc is a different > story. That's what we are debating. Okay, I did mean msi_desc storage, so we are talking about the same thigns > >> Of course we can store them in

Re: [PATCH] mm: kmemleak: Ignore kmemleak scanning on CMA regions

2021-12-02 Thread Calvin Zhang
On Thu, Dec 02, 2021 at 06:11:12PM +, Catalin Marinas wrote: >On Sun, Nov 28, 2021 at 09:50:53AM +0800, Calvin Zhang wrote: >> On Sat, Nov 27, 2021 at 04:07:18PM -0800, Andrew Morton wrote: >> >On Fri, 26 Nov 2021 10:47:11 +0800 Calvin Zhang >> > wrote: >> >> Just like this: >> >> commit

[PATCH 1/4] dt-bindings: memory: mediatek: Correct the minItems of clk for larbs

2021-12-02 Thread Yong Wu
If a platform's larb support gals, there will be some larbs have a one more "gals" clock while the others still only need "apb"/"smi" clocks. then the minItems is 2 and the maxItems is 3. Fixes: 27bb0e42855a ("dt-bindings: memory: mediatek: Convert SMI to DT schema") Signed-off-by: Yong Wu ---

[PATCH 2/4] dt-bindings: memory: mediatek: Add mt8186 support

2021-12-02 Thread Yong Wu
Add mt8186 smi support in the bindings. Signed-off-by: Yong Wu --- .../bindings/memory-controllers/mediatek,smi-common.yaml | 4 +++- .../bindings/memory-controllers/mediatek,smi-larb.yaml| 3 +++ 2 files changed, 6 insertions(+), 1 deletion(-) diff --git

[PATCH 0/4] MT8186 SMI SUPPORT

2021-12-02 Thread Yong Wu
This patchset add mt8186 smi support. mainly add a sleep control function. Base on v5.16-rc1. Yong Wu (4): dt-bindings: memory: mediatek: Correct the minItems of clk for larbs dt-bindings: memory: mediatek: Add mt8186 support memory: mtk-smi: Add sleep ctrl function memory: mtk-smi:

[PATCH 3/4] memory: mtk-smi: Add sleep ctrl function

2021-12-02 Thread Yong Wu
sleep control means that when the larb go to sleep, we should wait a bit until all the current commands are finished. thus, when the larb runtime suspend, we need enable this function to wait until all the existed command are finished. when the larb resume, just disable this function. This

[PATCH 4/4] memory: mtk-smi: mt8186: Add smi support

2021-12-02 Thread Yong Wu
Add mt8186 SMI support. Signed-off-by: Yong Wu --- drivers/memory/mtk-smi.c | 13 + 1 file changed, 13 insertions(+) diff --git a/drivers/memory/mtk-smi.c b/drivers/memory/mtk-smi.c index 4b59b28e4d73..29d7cd1cc8f8 100644 --- a/drivers/memory/mtk-smi.c +++

Re: [PATCH v2 00/33] Separate struct slab from struct page

2021-12-02 Thread Vlastimil Babka
On 12/1/21 19:14, Vlastimil Babka wrote: > Folks from non-slab subsystems are Cc'd only to patches affecting them, and > this cover letter. > > Series also available in git, based on 5.16-rc3: > https://git.kernel.org/pub/scm/linux/kernel/git/vbabka/linux.git/log/?h=slab-struct_slab-v2r2 I have

Re: [patch 21/32] NTB/msi: Convert to msi_on_each_desc()

2021-12-02 Thread Jason Gunthorpe via iommu
On Thu, Dec 02, 2021 at 01:01:42AM +0100, Thomas Gleixner wrote: > Jason, > > On Wed, Dec 01 2021 at 21:21, Thomas Gleixner wrote: > > On Wed, Dec 01 2021 at 14:14, Jason Gunthorpe wrote: > > Which in turn is consistent all over the place and does not require any > > special case for anything.

Re: [patch 21/32] NTB/msi: Convert to msi_on_each_desc()

2021-12-02 Thread Greg Kroah-Hartman
On Thu, Dec 02, 2021 at 09:55:02AM -0400, Jason Gunthorpe wrote: > Further, there is no reason why IMS should be reserved exclusively for > VFIO! Why shouldn't the cdev be able to use IMS vectors too? It is > just a feature of the PCI device like MSI. If the queue has a PASID it > can use IDXD's

Re: [PATCH V3 2/5] x86/hyper-v: Add hyperv Isolation VM check in the cc_platform_has()

2021-12-02 Thread Wei Liu
On Wed, Dec 01, 2021 at 11:02:53AM -0500, Tianyu Lan wrote: > From: Tianyu Lan > > Hyper-V provides Isolation VM which has memory encrypt support. Add > hyperv_cc_platform_has() and return true for check of GUEST_MEM_ENCRYPT > attribute. > > Signed-off-by: Tianyu Lan > --- >

Re: [PATCH V3 1/5] Swiotlb: Add Swiotlb bounce buffer remap function for HV IVM

2021-12-02 Thread Tom Lendacky via iommu
On 12/1/21 10:02 AM, Tianyu Lan wrote: From: Tianyu Lan In Isolation VM with AMD SEV, bounce buffer needs to be accessed via extra address space which is above shared_gpa_boundary (E.G 39 bit address line) reported by Hyper-V CPUID ISOLATION_CONFIG. The access physical address will be original

Re: [PATCH V3 3/5] hyperv/IOMMU: Enable swiotlb bounce buffer for Isolation VM

2021-12-02 Thread Wei Liu
On Wed, Dec 01, 2021 at 11:02:54AM -0500, Tianyu Lan wrote: [...] > diff --git a/arch/x86/xen/pci-swiotlb-xen.c b/arch/x86/xen/pci-swiotlb-xen.c > index 46df59aeaa06..30fd0600b008 100644 > --- a/arch/x86/xen/pci-swiotlb-xen.c > +++ b/arch/x86/xen/pci-swiotlb-xen.c > @@ -4,6 +4,7 @@ > > #include

Re: [patch 21/32] NTB/msi: Convert to msi_on_each_desc()

2021-12-02 Thread Jason Gunthorpe via iommu
On Thu, Dec 02, 2021 at 03:23:38PM +0100, Greg Kroah-Hartman wrote: > On Thu, Dec 02, 2021 at 09:55:02AM -0400, Jason Gunthorpe wrote: > > Further, there is no reason why IMS should be reserved exclusively for > > VFIO! Why shouldn't the cdev be able to use IMS vectors too? It is > > just a