Received: by 10.223.185.116 with SMTP id b49csp6078516wrg; Wed, 28 Feb 2018 03:42:23 -0800 (PST) X-Google-Smtp-Source: AH8x225QBZKo9rCTkDq6vI7+5QHShwv7i6ixBVoKhA6J0lhUw2M4zoHjllr7KAxp5qcswIx8lk3k X-Received: by 2002:a17:902:7c11:: with SMTP id x17-v6mr17892191pll.59.1519818143870; Wed, 28 Feb 2018 03:42:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519818143; cv=none; d=google.com; s=arc-20160816; b=VrY1DBExaf/xrcnfz87E122GpSLXNNj6q8HzOcSJZ1GNJyZSiDb5nPZSMZpCJG6VFg FFaRek6EmWHB7CUeZVu34YKJIlc/0PtBvUstwyidUErby3PNbLHusNTLcBJMGkN0hXCZ 3TYz+S2ll1otqqzSrDLzq5uBEe2YHy0S6HV07IAppuBZvxBkd762S0OWOXOAcgiE0V4G HjN+OhLbHJkmNmTCP99BiV/Khw5KWv2LoiyCtR/+JIn/2EaJSBPtRHwcRH+tMNADFuow 8lFeYWONHODJabvsAUzbrETOWNL+XyJKjYC02kbjNHhBLTmPoDgrYc7flt2svW54xBU0 NhWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:arc-authentication-results; bh=cPoY5JF1jjpyHd9pI8zaNugWsNaxCD0c2DntzTtsVMU=; b=cxPDS9hpIS/rGEkPdVJBEOu6A0Ql+y0hFlY5mRqTbfvI/QW3Z7YlUiO1Y9aC0IuAbM pqyBYrrH9kwrV166yV64wHO4XQslvwjnzC3XTQCSFh2/mr9c6TGByEQhouD9v6URHkuw El5PfbS31soI+qHEZJaa/LDjcORvFf5QUdzhsK5nFHxHihakfXdX5jQwU6zxIeCMWA4Z PobF4b7y10gCHoCMm36aPTA7F/5MbhHHnFDG51uowxXOL1f4Inm4HaSMzlD3I8i9r9l/ B61BfFjRhevR7gbIoZRDyI0Vw60sJl86THl3ZINVq6KAM0LFjBswiDQ5SBXrY3CeOBgh VS2Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e3si890034pgs.809.2018.02.28.03.42.08; Wed, 28 Feb 2018 03:42:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752439AbeB1Lk6 (ORCPT + 99 others); Wed, 28 Feb 2018 06:40:58 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:53150 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752396AbeB1Lk4 (ORCPT ); Wed, 28 Feb 2018 06:40:56 -0500 Received: from pps.filterd (m0098414.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w1SBdBDf043123 for ; Wed, 28 Feb 2018 06:40:55 -0500 Received: from e06smtp10.uk.ibm.com (e06smtp10.uk.ibm.com [195.75.94.106]) by mx0b-001b2d01.pphosted.com with ESMTP id 2gdtb8bdtt-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Wed, 28 Feb 2018 06:40:55 -0500 Received: from localhost by e06smtp10.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 28 Feb 2018 11:40:53 -0000 Received: from b06cxnps3075.portsmouth.uk.ibm.com (9.149.109.195) by e06smtp10.uk.ibm.com (192.168.101.140) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Wed, 28 Feb 2018 11:40:49 -0000 Received: from d06av24.portsmouth.uk.ibm.com (mk.ibm.com [9.149.105.60]) by b06cxnps3075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w1SBenZD64291044; Wed, 28 Feb 2018 11:40:49 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 17BC142045; Wed, 28 Feb 2018 11:33:19 +0000 (GMT) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4E8424203F; Wed, 28 Feb 2018 11:33:18 +0000 (GMT) Received: from oc7330422307.ibm.com (unknown [9.152.224.228]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 28 Feb 2018 11:33:18 +0000 (GMT) Subject: Re: [PATCH v2 04/15] KVM: s390: CPU model support for AP virtualization To: David Hildenbrand , Tony Krowiak , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, cohuck@redhat.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com References: <1519741693-17440-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1519741693-17440-5-git-send-email-akrowiak@linux.vnet.ibm.com> <38deecae-53b4-c5cb-3dba-24bdfab3d9d0@redhat.com> From: Christian Borntraeger Date: Wed, 28 Feb 2018 12:40:48 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <38deecae-53b4-c5cb-3dba-24bdfab3d9d0@redhat.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18022811-0040-0000-0000-000004184B3F X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18022811-0041-0000-0000-0000261B4D90 Message-Id: <3a3ff176-4e6b-963c-7831-cdcd10b556eb@de.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-02-28_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1802280141 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/28/2018 10:48 AM, David Hildenbrand wrote: > On 27.02.2018 15:28, Tony Krowiak wrote: >> Introduces a new CPU model feature and two CPU model >> facilities to support AP virtualization for KVM guests. >> >> CPU model feature: >> >> The KVM_S390_VM_CPU_FEAT_AP feature indicates that the >> AP facilities are installed on the KVM guest. This >> feature will be enabled by the kernel only if the AP >> facilities are installed on the linux host. This feature >> must be specifically turned on for the KVM guest from >> userspace to allow guest access to AP devices installed >> on the linux host. >> >> CPU model facilities: >> >> 1. AP Query Configuration Information (QCI) facility is installed. >> >> This is indicated by setting facilities bit 12 for >> the guest. The kernel will not enable this facility >> for the guest if it is not set on the host. This facility >> must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP >> feature is not installed. >> >> 2. AP Facilities Test facility (APFT) is installed. >> >> This is indicated by setting facilities bit 15 for >> the guest. The kernel will not enable this facility for >> the guest if it is not set on the host. This facility >> must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP >> feature is not installed. >> >> Reviewed-by: Christian Borntraeger >> Reviewed-by: Halil Pasic >> Signed-off-by: Tony Krowiak >> --- >> arch/s390/include/uapi/asm/kvm.h | 1 + >> arch/s390/kvm/kvm-s390.c | 4 ++++ >> arch/s390/tools/gen_facilities.c | 2 ++ >> 3 files changed, 7 insertions(+), 0 deletions(-) >> >> diff --git a/arch/s390/include/uapi/asm/kvm.h b/arch/s390/include/uapi/asm/kvm.h >> index 4cdaa55..a580dec 100644 >> --- a/arch/s390/include/uapi/asm/kvm.h >> +++ b/arch/s390/include/uapi/asm/kvm.h >> @@ -130,6 +130,7 @@ struct kvm_s390_vm_cpu_machine { >> #define KVM_S390_VM_CPU_FEAT_PFMFI 11 >> #define KVM_S390_VM_CPU_FEAT_SIGPIF 12 >> #define KVM_S390_VM_CPU_FEAT_KSS 13 >> +#define KVM_S390_VM_CPU_FEAT_AP 14 >> struct kvm_s390_vm_cpu_feat { >> __u64 feat[16]; >> }; >> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c >> index de1e299..c68ca86 100644 >> --- a/arch/s390/kvm/kvm-s390.c >> +++ b/arch/s390/kvm/kvm-s390.c >> @@ -347,6 +347,10 @@ static void kvm_s390_cpu_feat_init(void) >> >> if (MACHINE_HAS_ESOP) >> allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP); >> + >> + if (ap_instructions_installed()) /* AP instructions installed on host */ >> + allow_cpu_feat(KVM_S390_VM_CPU_FEAT_AP); > > Don't we have a SIE specific AP feature? So is it true, that once we > have AP instructions, we are allowed to use them for SIE? Isn't there a > "AP interpretation facility" or anything like that? (that unlocks ECA_APIE) This seems to be coupled to the AP facility and there is no facility or scp bit. AP is too old to have that (predates STFLE)