Message ID | 20231103171641.1703146-1-lulu@redhat.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:8f47:0:b0:403:3b70:6f57 with SMTP id j7csp1195638vqu; Fri, 3 Nov 2023 10:17:51 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFtpCSc+lplUGV67Dcd2cbOXUzQ1shUop5DY7TloaGKc197eJDglp0cvU1CTlpTO8OYpqYb X-Received: by 2002:a05:6a21:338b:b0:159:e0b9:bd02 with SMTP id yy11-20020a056a21338b00b00159e0b9bd02mr22764733pzb.40.1699031871341; Fri, 03 Nov 2023 10:17:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1699031871; cv=none; d=google.com; s=arc-20160816; b=P+VHd3Hb9war1K0LiypXpsH+7Si4phHdbB7VCAWgUc9l62SrioXVIrQCgW6Dp9I6fV or6eu6EzajwiSU2o4Tg81hf4AXCnY3bs+CL7CJ78H8nELOqCiEMzt92qhKnu7VOUkruz S5WhbRUv6dVRJz/YTBT28SbDx3mMZoYPBl91QE7UzV+wQyMw+dQ8XfPBlaBJ3nH5uEGt 98BpwlTTX1OOIuPAbHa8+o6jGrBfhQDQnm6CJw7CzN9OKHVRwki4SG6KDsc+S9ldMAIM atltwqGMc/OXiVy/5MJcF0w5N7nKAzf2TEaPK5sA5SARJcP3OxELYSaIKf2fjKNjOk2Z 9PTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:to:from:dkim-signature; bh=vRd7f5G8x90QkHchEr3Lu9idWoM8f/Qc/4n6P4JgvYc=; fh=xiBZnYthZkU72K3VlivZH8ewgfrUkWRaBxXhAGtxMAw=; b=zkrzGj5et7ZYuTC4XNONFAThgtj4LUhYuvD+AM8sqkRPztsxFLckabRXas1qmX15eq gofZr2eEkNy6kWAiT+J4zrGCNxnJSgJpJMlS2xMpABTbbxeAuC82dl8zoRJmEDw78Vbb GDuraQJ7VAAksnw8vUnpAvnWGYa95QMhvlDcBgcGs5uTyjJyIuiOML15CbK3p986tNad V7unjgB+kiJjcxZI0silm+Wikm7pHEAtyZpWSGyCwPPLi7qaH2AHZoC7US6psl2OhGH4 guY4pazMn9SThj3gB7W8ewZJAGjU3BN2V6UmKDZ8NUxSlPGXADaiijK9XH1GKPzaBIQ2 KM2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PgStz4e3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id g8-20020a656cc8000000b00578c9144913si1895956pgw.364.2023.11.03.10.17.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 03 Nov 2023 10:17:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PgStz4e3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 8F2308061B61; Fri, 3 Nov 2023 10:17:50 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234412AbjKCRRp (ORCPT <rfc822;heyuhang3455@gmail.com> + 35 others); Fri, 3 Nov 2023 13:17:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51618 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234393AbjKCRRo (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 3 Nov 2023 13:17:44 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CAF4BD44 for <linux-kernel@vger.kernel.org>; Fri, 3 Nov 2023 10:16:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1699031813; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=vRd7f5G8x90QkHchEr3Lu9idWoM8f/Qc/4n6P4JgvYc=; b=PgStz4e3nzBQ84CFyCeZfcpqsBsMB8phpd92nw6Sm2pR0dzoRTsoK5f7/tIA5y8j4fsfue cXbr1wAqDp+efWaMC5O9blJ0qV4RLQX91Io9r2f2nRKIfJop4a9H1o1uQjGoiFPMOyBUy/ jouEAGad2Yt0mvkebne5LoxZXt1Uhnk= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-517-Ae_BpGh3OHuKUFySfTAznw-1; Fri, 03 Nov 2023 13:16:49 -0400 X-MC-Unique: Ae_BpGh3OHuKUFySfTAznw-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com [10.11.54.2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 5CD90848A77; Fri, 3 Nov 2023 17:16:48 +0000 (UTC) Received: from server.redhat.com (unknown [10.72.112.41]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2CAA440C6EBC; Fri, 3 Nov 2023 17:16:44 +0000 (UTC) From: Cindy Lu <lulu@redhat.com> To: lulu@redhat.com, jasowang@redhat.com, mst@redhat.com, yi.l.liu@intel.com, jgg@nvidia.com, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, netdev@vger.kernel.org Subject: [RFC v1 0/8] vhost-vdpa: add support for iommufd Date: Sat, 4 Nov 2023 01:16:33 +0800 Message-Id: <20231103171641.1703146-1-lulu@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.2 X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Fri, 03 Nov 2023 10:17:50 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1781564043648158744 X-GMAIL-MSGID: 1781564043648158744 |
Series |
vhost-vdpa: add support for iommufd
|
|
Message
Cindy Lu
Nov. 3, 2023, 5:16 p.m. UTC
Hi All
This code provides the iommufd support for vdpa device
This code fixes the bugs from the last version and also add the asid support. rebase on kernel
v6,6-rc3
Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net),
I will continue working on it
The kernel code is
https://gitlab.com/lulu6/vhost/-/tree/iommufdRFC_v1
Signed-off-by: Cindy Lu <lulu@redhat.com>
Cindy Lu (8):
vhost/iommufd: Add the functions support iommufd
Kconfig: Add the new file vhost/iommufd
vhost: Add 3 new uapi to support iommufd
vdpa: Add new vdpa_config_ops to support iommufd
vdpa_sim :Add support for iommufd
vdpa: change the map/unmap process to support iommufd
vp_vdpa::Add support for iommufd
iommu: expose the function iommu_device_use_default_domain
drivers/iommu/iommu.c | 2 +
drivers/vdpa/vdpa_sim/vdpa_sim.c | 8 ++
drivers/vdpa/virtio_pci/vp_vdpa.c | 4 +
drivers/vhost/Kconfig | 1 +
drivers/vhost/Makefile | 1 +
drivers/vhost/iommufd.c | 178 +++++++++++++++++++++++++
drivers/vhost/vdpa.c | 210 +++++++++++++++++++++++++++++-
drivers/vhost/vhost.h | 21 +++
include/linux/vdpa.h | 38 +++++-
include/uapi/linux/vhost.h | 66 ++++++++++
10 files changed, 525 insertions(+), 4 deletions(-)
create mode 100644 drivers/vhost/iommufd.c
Comments
On Sat, Nov 4, 2023 at 1:16 AM Cindy Lu <lulu@redhat.com> wrote: > > > Hi All > This code provides the iommufd support for vdpa device > This code fixes the bugs from the last version and also add the asid support. rebase on kernel > v6,6-rc3 > Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net), > I will continue working on it > > The kernel code is > https://gitlab.com/lulu6/vhost/-/tree/iommufdRFC_v1 > > Signed-off-by: Cindy Lu <lulu@redhat.com> It would be better to have a change summary here. Thanks > > > Cindy Lu (8): > vhost/iommufd: Add the functions support iommufd > Kconfig: Add the new file vhost/iommufd > vhost: Add 3 new uapi to support iommufd > vdpa: Add new vdpa_config_ops to support iommufd > vdpa_sim :Add support for iommufd > vdpa: change the map/unmap process to support iommufd > vp_vdpa::Add support for iommufd > iommu: expose the function iommu_device_use_default_domain > > drivers/iommu/iommu.c | 2 + > drivers/vdpa/vdpa_sim/vdpa_sim.c | 8 ++ > drivers/vdpa/virtio_pci/vp_vdpa.c | 4 + > drivers/vhost/Kconfig | 1 + > drivers/vhost/Makefile | 1 + > drivers/vhost/iommufd.c | 178 +++++++++++++++++++++++++ > drivers/vhost/vdpa.c | 210 +++++++++++++++++++++++++++++- > drivers/vhost/vhost.h | 21 +++ > include/linux/vdpa.h | 38 +++++- > include/uapi/linux/vhost.h | 66 ++++++++++ > 10 files changed, 525 insertions(+), 4 deletions(-) > create mode 100644 drivers/vhost/iommufd.c > > -- > 2.34.3 >
On 2023/11/6 12:11, Jason Wang wrote: > On Sat, Nov 4, 2023 at 1:16 AM Cindy Lu <lulu@redhat.com> wrote: >> >> >> Hi All >> This code provides the iommufd support for vdpa device >> This code fixes the bugs from the last version and also add the asid support. rebase on kernel >> v6,6-rc3 >> Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net), >> I will continue working on it >> >> The kernel code is >> https://gitlab.com/lulu6/vhost/-/tree/iommufdRFC_v1 >> >> Signed-off-by: Cindy Lu <lulu@redhat.com> > > It would be better to have a change summary here. yeah, the version number is also incorrect. > Thanks > >> >> >> Cindy Lu (8): >> vhost/iommufd: Add the functions support iommufd >> Kconfig: Add the new file vhost/iommufd >> vhost: Add 3 new uapi to support iommufd >> vdpa: Add new vdpa_config_ops to support iommufd >> vdpa_sim :Add support for iommufd >> vdpa: change the map/unmap process to support iommufd >> vp_vdpa::Add support for iommufd >> iommu: expose the function iommu_device_use_default_domain >> >> drivers/iommu/iommu.c | 2 + >> drivers/vdpa/vdpa_sim/vdpa_sim.c | 8 ++ >> drivers/vdpa/virtio_pci/vp_vdpa.c | 4 + >> drivers/vhost/Kconfig | 1 + >> drivers/vhost/Makefile | 1 + >> drivers/vhost/iommufd.c | 178 +++++++++++++++++++++++++ >> drivers/vhost/vdpa.c | 210 +++++++++++++++++++++++++++++- >> drivers/vhost/vhost.h | 21 +++ >> include/linux/vdpa.h | 38 +++++- >> include/uapi/linux/vhost.h | 66 ++++++++++ >> 10 files changed, 525 insertions(+), 4 deletions(-) >> create mode 100644 drivers/vhost/iommufd.c >> >> -- >> 2.34.3 >> >
On Sat, Nov 04, 2023 at 01:16:33AM +0800, Cindy Lu wrote: > > Hi All > This code provides the iommufd support for vdpa device > This code fixes the bugs from the last version and also add the asid support. rebase on kernel > v6,6-rc3 > Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net), What kind of problems? Understanding that will make it easier to figure out whether this is worth reviewing. > I will continue working on it > > The kernel code is > https://gitlab.com/lulu6/vhost/-/tree/iommufdRFC_v1 > > Signed-off-by: Cindy Lu <lulu@redhat.com> Please also Cc iommufd maintainers: Jason Gunthorpe <jgg@ziepe.ca> (maintainer:IOMMUFD) Kevin Tian <kevin.tian@intel.com> (maintainer:IOMMUFD) Joerg Roedel <joro@8bytes.org> (maintainer:IOMMU SUBSYSTEM) Will Deacon <will@kernel.org> (maintainer:IOMMU SUBSYSTEM) Robin Murphy <robin.murphy@arm.com> (reviewer:IOMMU SUBSYSTEM) iommu@lists.linux.dev (open list:IOMMUFD) linux-kernel@vger.kernel.org (open list)
On Tue, Nov 07, 2023 at 02:30:34AM -0500, Michael S. Tsirkin wrote: > On Sat, Nov 04, 2023 at 01:16:33AM +0800, Cindy Lu wrote: > > > > Hi All > > This code provides the iommufd support for vdpa device > > This code fixes the bugs from the last version and also add the asid support. rebase on kernel > > v6,6-rc3 > > Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net), > > What kind of problems? Understanding that will make it easier > to figure out whether this is worth reviewing. IMHO, this patch series needs to spend more time internally to Red Hat before it is presented to the community. It is too far away from something worth reviewing at this point. Jason
On Sat, Nov 04, 2023 at 01:16:33AM +0800, Cindy Lu wrote:
> Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net),
I'm not sure there's even value in bothering with iommufd for the
simulator. Just find a way to disable it and fail gracefully.
On Tue, Nov 07, 2023 at 08:49:02AM -0400, Jason Gunthorpe wrote: > On Tue, Nov 07, 2023 at 02:30:34AM -0500, Michael S. Tsirkin wrote: > > On Sat, Nov 04, 2023 at 01:16:33AM +0800, Cindy Lu wrote: > > > > > > Hi All > > > This code provides the iommufd support for vdpa device > > > This code fixes the bugs from the last version and also add the asid support. rebase on kernel > > > v6,6-rc3 > > > Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net), > > > > What kind of problems? Understanding that will make it easier > > to figure out whether this is worth reviewing. > > IMHO, this patch series needs to spend more time internally to Red Hat > before it is presented to the community. It is too far away from > something worth reviewing at this point. > > Jason I am always trying to convince people to post RFCs early instead of working for months behind closed doors only to be told to rewrite everything in Rust. Why does it have to be internal to a specific company? I see Yi Liu from Intel is helping Cindy get it into shape and that's classic open source ethos. I know some subsystems ignore the RFC tag but I didn't realize iommu is one of these. Is that really true?
On Tue, Nov 07, 2023 at 08:28:32AM -0500, Michael S. Tsirkin wrote: > On Tue, Nov 07, 2023 at 08:49:02AM -0400, Jason Gunthorpe wrote: > > On Tue, Nov 07, 2023 at 02:30:34AM -0500, Michael S. Tsirkin wrote: > > > On Sat, Nov 04, 2023 at 01:16:33AM +0800, Cindy Lu wrote: > > > > > > > > Hi All > > > > This code provides the iommufd support for vdpa device > > > > This code fixes the bugs from the last version and also add the asid support. rebase on kernel > > > > v6,6-rc3 > > > > Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net), > > > > > > What kind of problems? Understanding that will make it easier > > > to figure out whether this is worth reviewing. > > > > IMHO, this patch series needs to spend more time internally to Red Hat > > before it is presented to the community. It is too far away from > > something worth reviewing at this point. > > > > Jason > > I am always trying to convince people to post RFCs early > instead of working for months behind closed doors only > to be told to rewrite everything in Rust. The community has a limited review bandwidth, things should meet a minimum standard before there is an expectation that other people should review it on the list. > Why does it have to be internal to a specific company? > I see Yi Liu from Intel is helping Cindy get it into shape > and that's classic open source ethos. Big company's should take the responsibility to train and provide skill development for their own staff. > I know some subsystems ignore the RFC tag but I didn't realize > iommu is one of these. Is that really true? At least I've looked at this twice now and been disappointed. Neither have been a well thought out RFC, this is a brain dump of unfinished work. Jason
On Tue, Nov 07, 2023 at 10:12:37AM -0400, Jason Gunthorpe wrote: > Big company's should take the responsibility to train and provide > skill development for their own staff. That would result in a beautiful cathedral of a patch. I know this is how some companies work. We are doing more of a bazaar thing here, though. In a bunch of subsystems it seems that you don't get the necessary skills until you have been publically shouted at by maintainers - better to start early ;). Not a nice environment for novices, for sure.
On Tue, Nov 07, 2023 at 08:49:02AM -0400, Jason Gunthorpe wrote: > IMHO, this patch series needs to spend more time internally to Red Hat > before it is presented to the community. Just to add an example why I think this "internal review" is a bad idea I seem to recall that someone internal to nvidia at some point attempted to implement this already. The only output from that work we have is that "it's tough" - no pointers to what's tough, no code to study even as a bad path to follow. And while Red Hat might be big, the virt team is rather smaller.
On Tue, Nov 07, 2023 at 09:55:26AM -0500, Michael S. Tsirkin wrote: > On Tue, Nov 07, 2023 at 08:49:02AM -0400, Jason Gunthorpe wrote: > > IMHO, this patch series needs to spend more time internally to Red Hat > > before it is presented to the community. > > Just to add an example why I think this "internal review" is a bad idea > I seem to recall that someone internal to nvidia at some point > attempted to implement this already. The only output from that > work we have is that "it's tough" - no pointers to what's tough, > no code to study even as a bad path to follow. > And while Red Hat might be big, the virt team is rather smaller. I don't think Nicolin got to a presentable code point. But you can start to see the issues even in this series, like simulator is complicated. mlx5 is complicated. Deciding to omit those is one path. Come with a proposal and justification to take it out, not a patch with an unexplained #ifdef. Again, I'm not talking about big impactful decisions I'm saying RH should take it internally to get a RFC proposal to the level where it is actually an RFC proposal and not a brain dump. Make sure it has logical commit messages, make sure the basic thinking about the idea is done and the proposal is self consistent and explained. Make sure the patches and series construction meet a kernel standard. The purpose of the RFC is to clearly articulate what it is you are asking to do, why you want to do it, and how you intend to get there. There is still alot of basic work to achieve this and properly communicate it. Training to do that should rightly come from the employeer, not the community. We've seen some big blow ups because some companies have been trying to externalize their training to the community. Jason
On Tue, Nov 07, 2023 at 09:30:21AM -0500, Michael S. Tsirkin wrote: > On Tue, Nov 07, 2023 at 10:12:37AM -0400, Jason Gunthorpe wrote: > > Big company's should take the responsibility to train and provide > > skill development for their own staff. > > That would result in a beautiful cathedral of a patch. I know this is > how some companies work. We are doing more of a bazaar thing here, > though. In a bunch of subsystems it seems that you don't get the > necessary skills until you have been publically shouted at by > maintainers - better to start early ;). Not a nice environment for > novices, for sure. In my view the "shouting from maintainers" is harmful to the people buidling skills and it is an unkind thing to dump employees into that kind of situation. They should have help to establish the basic level of competence where they may do the wrong thing, but all the process and presentation of the wrong thing is top notch. You get a much better reception. Jason
On Tue, Nov 07, 2023 at 11:48:48AM -0400, Jason Gunthorpe wrote: > On Tue, Nov 07, 2023 at 09:55:26AM -0500, Michael S. Tsirkin wrote: > > On Tue, Nov 07, 2023 at 08:49:02AM -0400, Jason Gunthorpe wrote: > > > IMHO, this patch series needs to spend more time internally to Red Hat > > > before it is presented to the community. > > > > Just to add an example why I think this "internal review" is a bad idea > > I seem to recall that someone internal to nvidia at some point > > attempted to implement this already. The only output from that > > work we have is that "it's tough" - no pointers to what's tough, > > no code to study even as a bad path to follow. > > And while Red Hat might be big, the virt team is rather smaller. > > I don't think Nicolin got to a presentable code point. > > But you can start to see the issues even in this series, like > simulator is complicated. mlx5 is complicated. Deciding to omit those > is one path. Come with a proposal and justification to take it out, > not a patch with an unexplained #ifdef. Right. Simulator I don't think we need to support, or at least not necessarily to get this merged - it does not really benefit from any iommufd features.
On Tue, 7 Nov 2023 08:28:32 -0500 Michael S. Tsirkin wrote: > I am always trying to convince people to post RFCs early > instead of working for months behind closed doors only > to be told to rewrite everything in Rust. > > Why does it have to be internal to a specific company? > I see Yi Liu from Intel is helping Cindy get it into shape > and that's classic open source ethos. +1, FWIW.
On Tue, Nov 07, 2023 at 11:52:17AM -0400, Jason Gunthorpe wrote: > On Tue, Nov 07, 2023 at 09:30:21AM -0500, Michael S. Tsirkin wrote: > > On Tue, Nov 07, 2023 at 10:12:37AM -0400, Jason Gunthorpe wrote: > > > Big company's should take the responsibility to train and provide > > > skill development for their own staff. > > > > That would result in a beautiful cathedral of a patch. I know this is > > how some companies work. We are doing more of a bazaar thing here, > > though. In a bunch of subsystems it seems that you don't get the > > necessary skills until you have been publically shouted at by > > maintainers - better to start early ;). Not a nice environment for > > novices, for sure. > > In my view the "shouting from maintainers" is harmful to the people > buidling skills and it is an unkind thing to dump employees into that > kind of situation. > > They should have help to establish the basic level of competence where > they may do the wrong thing, but all the process and presentation of > the wrong thing is top notch. You get a much better reception. > > Jason What - like e.g. mechanically fixing checkpatch warnings without understanding? I actually very much dislike it when people take a bad patch and just polish the presentation - it is easier for me if I can judge patch quality quickly from the presentation. Matter of taste I guess.
On Thu, Nov 09, 2023 at 06:48:46PM -0500, Michael S. Tsirkin wrote: > On Tue, Nov 07, 2023 at 11:52:17AM -0400, Jason Gunthorpe wrote: > > On Tue, Nov 07, 2023 at 09:30:21AM -0500, Michael S. Tsirkin wrote: > > > On Tue, Nov 07, 2023 at 10:12:37AM -0400, Jason Gunthorpe wrote: > > > > Big company's should take the responsibility to train and provide > > > > skill development for their own staff. > > > > > > That would result in a beautiful cathedral of a patch. I know this is > > > how some companies work. We are doing more of a bazaar thing here, > > > though. In a bunch of subsystems it seems that you don't get the > > > necessary skills until you have been publically shouted at by > > > maintainers - better to start early ;). Not a nice environment for > > > novices, for sure. > > > > In my view the "shouting from maintainers" is harmful to the people > > buidling skills and it is an unkind thing to dump employees into that > > kind of situation. > > > > They should have help to establish the basic level of competence where > > they may do the wrong thing, but all the process and presentation of > > the wrong thing is top notch. You get a much better reception. > > What - like e.g. mechanically fixing checkpatch warnings without > understanding? No, not at all. I mean actually going through and explaining what the idea is to another person and ensuing that the commit messages convey that idea, that the patches reflect the idea, that everything is convayed, and it isn't obviously internally illogical. Like, why did this series have a giant block of #ifdef 0'd code with no explanation at all? That isn't checkpatch nitpicks, that is not meeting the minimum standard to convey an idea in an RFC. Jason
On Sat, Nov 04, 2023 at 01:16:33AM +0800, Cindy Lu wrote: > > Hi All > This code provides the iommufd support for vdpa device > This code fixes the bugs from the last version and also add the asid support. rebase on kernel > v6,6-rc3 > Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net), > I will continue working on it > > The kernel code is > https://gitlab.com/lulu6/vhost/-/tree/iommufdRFC_v1 > > Signed-off-by: Cindy Lu <lulu@redhat.com> Was this abandoned? > > Cindy Lu (8): > vhost/iommufd: Add the functions support iommufd > Kconfig: Add the new file vhost/iommufd > vhost: Add 3 new uapi to support iommufd > vdpa: Add new vdpa_config_ops to support iommufd > vdpa_sim :Add support for iommufd > vdpa: change the map/unmap process to support iommufd > vp_vdpa::Add support for iommufd > iommu: expose the function iommu_device_use_default_domain > > drivers/iommu/iommu.c | 2 + > drivers/vdpa/vdpa_sim/vdpa_sim.c | 8 ++ > drivers/vdpa/virtio_pci/vp_vdpa.c | 4 + > drivers/vhost/Kconfig | 1 + > drivers/vhost/Makefile | 1 + > drivers/vhost/iommufd.c | 178 +++++++++++++++++++++++++ > drivers/vhost/vdpa.c | 210 +++++++++++++++++++++++++++++- > drivers/vhost/vhost.h | 21 +++ > include/linux/vdpa.h | 38 +++++- > include/uapi/linux/vhost.h | 66 ++++++++++ > 10 files changed, 525 insertions(+), 4 deletions(-) > create mode 100644 drivers/vhost/iommufd.c > > -- > 2.34.3
On Thu, Jan 11, 2024 at 6:25 AM Michael S. Tsirkin <mst@redhat.com> wrote: > > On Sat, Nov 04, 2023 at 01:16:33AM +0800, Cindy Lu wrote: > > > > Hi All > > This code provides the iommufd support for vdpa device > > This code fixes the bugs from the last version and also add the asid support. rebase on kernel > > v6,6-rc3 > > Test passed in the physical device (vp_vdpa), but there are still some problems in the emulated device (vdpa_sim_net), > > I will continue working on it > > > > The kernel code is > > https://gitlab.com/lulu6/vhost/-/tree/iommufdRFC_v1 > > > > Signed-off-by: Cindy Lu <lulu@redhat.com> > > Was this abandoned? > Thanks Micheal. I'm really sorry for the delay. I will continue working on this Thanks Cindy > > > > Cindy Lu (8): > > vhost/iommufd: Add the functions support iommufd > > Kconfig: Add the new file vhost/iommufd > > vhost: Add 3 new uapi to support iommufd > > vdpa: Add new vdpa_config_ops to support iommufd > > vdpa_sim :Add support for iommufd > > vdpa: change the map/unmap process to support iommufd > > vp_vdpa::Add support for iommufd > > iommu: expose the function iommu_device_use_default_domain > > > > drivers/iommu/iommu.c | 2 + > > drivers/vdpa/vdpa_sim/vdpa_sim.c | 8 ++ > > drivers/vdpa/virtio_pci/vp_vdpa.c | 4 + > > drivers/vhost/Kconfig | 1 + > > drivers/vhost/Makefile | 1 + > > drivers/vhost/iommufd.c | 178 +++++++++++++++++++++++++ > > drivers/vhost/vdpa.c | 210 +++++++++++++++++++++++++++++- > > drivers/vhost/vhost.h | 21 +++ > > include/linux/vdpa.h | 38 +++++- > > include/uapi/linux/vhost.h | 66 ++++++++++ > > 10 files changed, 525 insertions(+), 4 deletions(-) > > create mode 100644 drivers/vhost/iommufd.c > > > > -- > > 2.34.3 >