From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3E89EC54EE9 for ; Fri, 2 Sep 2022 07:33:48 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235317AbiIBHdr (ORCPT ); Fri, 2 Sep 2022 03:33:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35588 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234101AbiIBHdp (ORCPT ); Fri, 2 Sep 2022 03:33:45 -0400 Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 54C14B95B2; Fri, 2 Sep 2022 00:33:43 -0700 (PDT) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4MJqQl58dbz4x3w; Fri, 2 Sep 2022 17:33:35 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ellerman.id.au; s=201909; t=1662104018; bh=hJz4SNP/i8v13NyeDRi0y+oMlEr1XHuTWGnDprX6daM=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=YyrF+RKm94p4H69k34qmNhTyfugOGBhOU1aA+9znafWxn/h4F9PHIWnES/jeymJrG Otp/P6Sjl6ZBkzMpdoWscYZJV/urdVVi/ZtVji9B1j4DVjZEcdEMaAsgv8GPnPKX/J 0WJmvCVhTVgSRMngStPYDiUBoEf/tXQbwKJNBRqBiik7ii2FyafHLgqB1zSpTLdhzD iiLxB6w6xVwGBix9fSd4eEBalk8whscbiUr7mRZh1RtCYd/FvlE1U9ULY4pf2q6fKy qeqEOZJjT1enTLdk1hl2sl+p0hkG2ZKL7x061Fzi1at9SKk2H7jESsTY0clYyPHt3U z8ptz8ECcdmxA== From: Michael Ellerman To: Jason Gunthorpe , Alexey Kardashevskiy Cc: linuxppc-dev@lists.ozlabs.org, kvm@vger.kernel.org, kvm-ppc@vger.kernel.org, Deming Wang , Robin Murphy , Alex Williamson , Daniel Henrique Barboza , Fabiano Rosas , Murilo Opsfelder Araujo , Nicholas Piggin Subject: Re: [PATCH kernel 0/3] powerpc/iommu: Add iommu_ops to report capabilities and allow blocking domains In-Reply-To: References: <20220714081822.3717693-1-aik@ozlabs.ru> Date: Fri, 02 Sep 2022 17:33:30 +1000 Message-ID: <87tu5qtelx.fsf@mpe.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org Jason Gunthorpe writes: > On Thu, Jul 14, 2022 at 06:18:19PM +1000, Alexey Kardashevskiy wrote: >> Here is another take on iommu_ops on POWER to make VFIO work >> again on POWERPC64. >> >> The tree with all prerequisites is here: >> https://github.com/aik/linux/tree/kvm-fixes-wip >> >> The previous discussion is here: >> https://patchwork.ozlabs.org/project/linuxppc-dev/patch/20220707135552.3688927-1-aik@ozlabs.ru/ >> https://patchwork.ozlabs.org/project/kvm-ppc/patch/20220701061751.1955857-1-aik@ozlabs.ru/ >> >> Please comment. Thanks. >> >> >> >> Alexey Kardashevskiy (3): >> powerpc/iommu: Add "borrowing" iommu_table_group_ops >> powerpc/pci_64: Init pcibios subsys a bit later >> powerpc/iommu: Add iommu_ops to report capabilities and allow blocking >> domains > > It has been a little while - and I think this series is still badly > needed by powerpc, right? Your comments on patch 3 left me with the impression it needed a respin, but maybe I misread that. Alexey's reply that it needed testing also made me think it wasn't ready to pick up. cheers