)]}'
{
  "commit": "4a92a5b9f08eef570eeea72da3aec7ea7ded38bd",
  "tree": "8820919e0496fbb21f63dc0cb8a60a799124f06e",
  "parents": [
    "76def52fec5b5b2e81d25a6bb0570c052128513c"
  ],
  "author": {
    "name": "Ashish Kalra",
    "email": "ashish.kalra@amd.com",
    "time": "Thu Dec 10 01:25:15 2020 +0000"
  },
  "committer": {
    "name": "Robert Kolchmeyer",
    "email": "rkolchmeyer@google.com",
    "time": "Wed Feb 16 20:10:42 2022 +0000"
  },
  "message": "x86,swiotlb: Adjust SWIOTLB bounce buffer size for SEV guests\n\n[e998879d4fb7991856916972168cf27c0d86ed12 upstream]\n\nFor SEV, all DMA to and from guest has to use shared (un-encrypted) pages.\nSEV uses SWIOTLB to make this happen without requiring changes to device\ndrivers.  However, depending on the workload being run, the default 64MB\nof it might not be enough and it may run out of buffers to use for DMA,\nresulting in I/O errors and/or performance degradation for high\nI/O workloads.\n\nAdjust the default size of SWIOTLB for SEV guests using a\npercentage of the total memory available to guest for the SWIOTLB buffers.\n\nAdds a new sev_setup_arch() function which is invoked from setup_arch()\nand it calls into a new swiotlb generic code function swiotlb_adjust_size()\nto do the SWIOTLB buffer adjustment.\n\nv5 fixed build errors and warnings as\nReported-by: kbuild test robot \u003clkp@intel.com\u003e\n\nSigned-off-by: Ashish Kalra \u003cashish.kalra@amd.com\u003e\nCo-developed-by: Borislav Petkov \u003cbp@suse.de\u003e\nSigned-off-by: Borislav Petkov \u003cbp@suse.de\u003e\nSigned-off-by: Konrad Rzeszutek Wilk \u003ckonrad.wilk@oracle.com\u003e\n(cherry picked from commit e998879d4fb7991856916972168cf27c0d86ed12)\nSigned-off-by: Robert Kolchmeyer \u003crkolchmeyer@google.com\u003e\n\nConflicts:\n  arch/x86/mm/mem_encrypt.c\n\nBUG\u003db/210929026\nTEST\u003dpresubmit\nSOURCE\u003dUPSTREAM(e998879d4fb7991856916972168cf27c0d86ed12)\nRELEASE_NOTE\u003dFixed an issue in the Linux kernel where I/Os would\nsometimes fail on SEV-enabled machines due to a full swiotlb buffer.\n\nChange-Id: Idbf9dcee97ccd5deebad3a97cf06aa0618de1601\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/29440\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\nReviewed-by: Oleksandr Tymoshenko \u003covt@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "29e2d4def7d809a9660a3ca97ffaeffd4ab751d9",
      "old_mode": 33188,
      "old_path": "arch/x86/include/asm/mem_encrypt.h",
      "new_id": "a912ef96f49452cbe6dcddcb7589e725cdde9daf",
      "new_mode": 33188,
      "new_path": "arch/x86/include/asm/mem_encrypt.h"
    },
    {
      "type": "modify",
      "old_id": "9b9e24c96e9374b1c5ebdeb37fa40af996cf0c35",
      "old_mode": 33188,
      "old_path": "arch/x86/kernel/setup.c",
      "new_id": "392bd819f9ec93bee1daa8d7094c50f80601e604",
      "new_mode": 33188,
      "new_path": "arch/x86/kernel/setup.c"
    },
    {
      "type": "modify",
      "old_id": "e59077b50cbf1e1351b3ec459c93138eea040ae0",
      "old_mode": 33188,
      "old_path": "arch/x86/mm/mem_encrypt.c",
      "new_id": "0cb049083d1f53b2cde80316a3f6a93ce8e6db2e",
      "new_mode": 33188,
      "new_path": "arch/x86/mm/mem_encrypt.c"
    },
    {
      "type": "modify",
      "old_id": "5d2dbe7e04c3cb1773c9da4befee61dbe40f96c0",
      "old_mode": 33188,
      "old_path": "include/linux/swiotlb.h",
      "new_id": "5857a937c63722a3c75a24e098fa4740de0c32e8",
      "new_mode": 33188,
      "new_path": "include/linux/swiotlb.h"
    },
    {
      "type": "modify",
      "old_id": "0ed0e1f215c75ea11c17cc3ecb66c9ad2fd57e57",
      "old_mode": 33188,
      "old_path": "kernel/dma/swiotlb.c",
      "new_id": "c5b3b3b13885508f8938f60a7163cfac81933fdc",
      "new_mode": 33188,
      "new_path": "kernel/dma/swiotlb.c"
    }
  ]
}
