Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp813800ybx; Wed, 6 Nov 2019 08:48:17 -0800 (PST) X-Google-Smtp-Source: APXvYqyjeq7RDZpg3HlNDAi/ke5hkjwYFtE7DTQGoGm9neGH4JEgaxt9XHRxXZDhRNx0AtMpsH8m X-Received: by 2002:a17:906:5a83:: with SMTP id l3mr15245014ejq.194.1573058897172; Wed, 06 Nov 2019 08:48:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573058897; cv=none; d=google.com; s=arc-20160816; b=rCg6KdXZYRZ2J2POrs/yozMxWMsOqFUfjGMX5qoFEjyvQdCoPahQUrIvrLNfe17+ge wIf1C7GIRfT+38RMFF8ep9Hxhvxg8GjBEzx3edRAvnMDTVboGa4a4h4tMcib8Gvzks25 RRPQck/C2aWZqxgQb6PIx1e8a/v6/E4pF4jUKOgpxMGx92GQdrYm0T3VVFy0MgONq5Pi 1XS6AysBnwx6NWzPdt3/qDjB2WhsecQqVQxtvDsA8IztfohEaCJSACWBn3egdvV8rm7t fWeGQkb4JPBJYKduU0qWx6evd0aQD5qwYUPCuEfIeuSh+z9NgF77c7ZqNuFNS7RNBGqK vQjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:message-id:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:cc:to:from :date; bh=2bKOHuwYrl1Vdbzd1bBBozGne41175c8dFuezOMqK7A=; b=H8SjeNJWG6FFaTppt1ydcq0+0nreCm+fRn+Yq4mBqSjF7WvWT4V8/4+IZgGiaTqC7k tSr766yE38vBEH5TCblH5g9oqLRWaWLS4OhXbUw7IZzdn7xE+KM72DV/IWYPkAOgXOhH L+S43bcDsVBOTAJr4gvpGgZBbudP14K1OsGE/9mA0hvfJ3fD3nsF9YYBGUlcbH11TMac VG3VHhGDtewRpTzw2B2Sm/fUbRW9Cnkug1ilV4C5Df9vdH8IFrpsUkDmesG8dOGETtvv jPJ1e7pctuRV5PyrZL9RuzXRvc8aaVAqzdHYVA/RpIOSdrSlUX2/J/OJbt418qjFDs2F 3HSQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p7si11699374edq.227.2019.11.06.08.47.52; Wed, 06 Nov 2019 08:48:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732216AbfKFQqw (ORCPT + 99 others); Wed, 6 Nov 2019 11:46:52 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:54580 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727285AbfKFQqw (ORCPT ); Wed, 6 Nov 2019 11:46:52 -0500 Received: from pps.filterd (m0098421.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id xA6Gfvna008943 for ; Wed, 6 Nov 2019 11:46:50 -0500 Received: from e06smtp04.uk.ibm.com (e06smtp04.uk.ibm.com [195.75.94.100]) by mx0a-001b2d01.pphosted.com with ESMTP id 2w41wug488-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 06 Nov 2019 11:46:49 -0500 Received: from localhost by e06smtp04.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 6 Nov 2019 16:46:42 -0000 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp04.uk.ibm.com (192.168.101.134) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 6 Nov 2019 16:46:38 -0000 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id xA6Gkb5357802864 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 6 Nov 2019 16:46:37 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id AF90B4C046; Wed, 6 Nov 2019 16:46:37 +0000 (GMT) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id ED6954C058; Wed, 6 Nov 2019 16:46:33 +0000 (GMT) Received: from oc0525413822.ibm.com (unknown [9.80.236.142]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTPS; Wed, 6 Nov 2019 16:46:33 +0000 (GMT) Date: Wed, 6 Nov 2019 08:46:30 -0800 From: Ram Pai To: Alexey Kardashevskiy Cc: linuxppc-dev@lists.ozlabs.org, benh@kernel.crashing.org, david@gibson.dropbear.id.au, mpe@ellerman.id.au, paulus@ozlabs.org, mdroth@linux.vnet.ibm.com, hch@lst.de, andmike@us.ibm.com, sukadev@linux.vnet.ibm.com, mst@redhat.com, ram.n.pai@gmail.com, cai@lca.pw, tglx@linutronix.de, bauerman@linux.ibm.com, linux-kernel@vger.kernel.org Reply-To: Ram Pai References: <1572902923-8096-1-git-send-email-linuxram@us.ibm.com> <265679db-9cb3-1660-0cf6-97f740b1b48b@ozlabs.ru> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <265679db-9cb3-1660-0cf6-97f740b1b48b@ozlabs.ru> User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 19110616-0016-0000-0000-000002C14FB3 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19110616-0017-0000-0000-00003322CCF4 Message-Id: <20191106164630.GB5201@oc0525413822.ibm.com> Subject: RE: [RFC v1 0/2] Enable IOMMU support for pseries Secure VMs X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-11-06_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=18 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=597 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1910280000 definitions=main-1911060160 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 06, 2019 at 12:59:50PM +1100, Alexey Kardashevskiy wrote: > > > On 05/11/2019 08:28, Ram Pai wrote: > > This patch series enables IOMMU support for pseries Secure VMs. > > > > > > Tested using QEMU command line option: > > > > "-device virtio-scsi-pci,id=scsi0,bus=pci.0,addr=0x4, > > iommu_platform=on,disable-modern=off,disable-legacy=on" > > and > > > > "-device virtio-blk-pci,scsi=off,bus=pci.0, > > addr=0x5,drive=drive-virtio-disk0,id=virtio-disk0, > > iommu_platform=on,disable-modern=off,disable-legacy=on" > > > Worth mentioning that SLOF won't boot with such devices as SLOF does not know about iommu_platform=on. I did see SLOF complaining, but that did not stop it from booting the guest. My boot device was a virtio device, with iommu platform flag enabled. So I am not sure, under what conditions SLOF will fail to boot. Any idea? RP