> -----Original Message-----
> From: Sean Christopherson <sea...@google.com>
> Sent: Monday, June 24, 2024 4:32 PM
> To: Shameerali Kolothum Thodi <shameerali.kolothum.th...@huawei.com>
> Cc: Catalin Marinas <catalin.mari...@arm.com>; Will Deacon
> <w...@kernel.org>; Marc Zyngier <m...@kernel.org>; Oliver Upton
> <oliver.up...@linux.dev>; Huacai Chen <chenhua...@kernel.org>; Michael
> Ellerman <m...@ellerman.id.au>; Anup Patel <a...@brainfault.org>; Paul
> Walmsley <paul.walms...@sifive.com>; Palmer Dabbelt
> <pal...@dabbelt.com>; Albert Ou <a...@eecs.berkeley.edu>; Heiko
> Carstens <h...@linux.ibm.com>; Vasily Gorbik <g...@linux.ibm.com>;
> Alexander Gordeev <agord...@linux.ibm.com>; Christian Borntraeger
> <borntrae...@linux.ibm.com>; Janosch Frank <fran...@linux.ibm.com>;
> Claudio Imbrenda <imbre...@linux.ibm.com>; Thomas Gleixner
> <t...@linutronix.de>; Ingo Molnar <mi...@redhat.com>; Borislav Petkov
> <b...@alien8.de>; Dave Hansen <dave.han...@linux.intel.com>;
> x...@kernel.org; Peter Zijlstra <pet...@infradead.org>; Arnaldo Carvalho de
> Melo <a...@kernel.org>; Paolo Bonzini <pbonz...@redhat.com>; Tony
> Krowiak <akrow...@linux.ibm.com>; Halil Pasic <pa...@linux.ibm.com>;
> Jason Herne <jjhe...@linux.ibm.com>; Harald Freudenberger
> <fre...@linux.ibm.com>; Alex Williamson <alex.william...@redhat.com>;
> Andy Lutomirski <l...@kernel.org>; linux-arm-ker...@lists.infradead.org;
> kvm...@lists.linux.dev; linux-m...@vger.kernel.org; k...@vger.kernel.org;
> linuxppc-dev@lists.ozlabs.org; kvm-ri...@lists.infradead.org; linux-
> ri...@lists.infradead.org; linux-s...@vger.kernel.org; linux-
> ker...@vger.kernel.org; linux-perf-us...@vger.kernel.org; Anish Ghulati
> <aghul...@google.com>; Venkatesh Srinivas <venkate...@chromium.org>;
> Andrew Thornton <andre...@google.com>
> Subject: Re: [PATCH 00/26] KVM: vfio: Hide KVM internals from others
> 
> On Thu, Jun 20, 2024, Shameerali Kolothum Thodi wrote:
> > > This is a borderline RFC series to hide KVM's internals from the rest of
> > > the kernel, where "internals" means data structures, enums, #defines,
> > > APIs, etc. that are intended to be KVM-only, but are exposed
> everywhere
> > > due to kvm_host.h (and other headers) living in the global include paths.
> >
> > Hi Sean,
> >
> > Just thought of checking with you on this series. Do you have plans to
> revive this
> > series?
> 
> Yep!
> 
> > The reason I am asking is, on ARM64/KVM side we do have a requirement
> > to share the KVM VMID with SMMUV3. Please see the RFC I sent out
> earlier this
> > year[1]. The series basically provides a way for KVM to pin a VMID and also
> > associates an iommufd ctx with a struct kvm * to retrieve that VMID.
> >
> > As mentioned above, some of the patches in this series(especially 1-4 & 6)
> that
> > does the VFIO cleanups and dropping CONFIG_KVM_VFIO looks very
> straightforward
> > and useful. I am thinking of including those when I re-spin my RFC series, 
> > if
> > that’s ok.
> 
> Please don't include them, as the patch they build towards (patch 5) is
> buggy[*],
> and I am fairly certain that at least some of the patches will change
> significantly.

Ok. Got it. Thanks for taking a look at the KVM pinned VMID series and comments
there.

Shameer

Reply via email to