Received: by 10.223.185.116 with SMTP id b49csp6348972wrg; Wed, 28 Feb 2018 08:00:35 -0800 (PST) X-Google-Smtp-Source: AH8x227TPKR0gaOzPjsZ/hR6H7kbbfg9F5FOtfd3Mx4mq0UvpzbnRvUayssfU/XhdfquqUGnYrc7 X-Received: by 2002:a17:902:7789:: with SMTP id o9-v6mr18839977pll.422.1519833635884; Wed, 28 Feb 2018 08:00:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519833635; cv=none; d=google.com; s=arc-20160816; b=xdEc5Vgvj2oMaI/VaQdTiI4VkGB/Pqb1vku4Gz8WTjZ0vHZv85qmY5/pUORtc9SBDz bje2Ye++XU/7Q+wEgBVV484opudlXVZ4FFUmWMOJFD7Wl0IlM7ayokItiODBfTsA5t7/ Sy/iMqMP0DBZBehGTp5kv/MeKp87B/jv6JiqX6hOPoHf8WW9eMa408VWLJTVMhgiictP TvXHLxfrMudEG6+fEatPrYsy++YoxmL4qpi0tL952dIBy0kLxD1HS+njXU2fq0/GPuWO Kt7b11NvXg302nRyN81PJG/6wclIfKKfUGfmQoXK2Lx4q3+0wG25kpH8nz2oTEMBSLjm B6kA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :from:references:cc:to:subject:arc-authentication-results; bh=rILUQOY9iiFoNl9AesTYLrxv876XulFdpbzPItwGdIc=; b=CYSB3orMMuB+9xUG74dRO2I+fwbRliYBRkb0AdmXlWacdYWBB0mNjah1wWCXnWE0AL nI/xpFfaTebEJ/RL5fpJfZIj8g8LuC0qw+v9V/fNmvsstdHSxlJobiY7r2Os5667z8NY YWZ9zKMpMQJP0PQED4h4U/ugfXwDh9zwWla2Vthj5aVpdpvofRzv8QgOgX1qt/Fyuta9 Rncn9tkiWjnxLeQZ2iDSObr+LXA9RgZf/HayOE6UEG58V1nQ7zlan8dvNmrHUwLzYsgd nzOgHcS5IrFQfy3BiTtOLDzGdTzAKLxrkzLkKUSrEeljuEqBCIz72XM+5tgBZQzyuuZT y4xA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e13si1096423pgt.569.2018.02.28.08.00.13; Wed, 28 Feb 2018 08:00:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934391AbeB1P7a (ORCPT + 99 others); Wed, 28 Feb 2018 10:59:30 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:44524 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934015AbeB1P70 (ORCPT ); Wed, 28 Feb 2018 10:59:26 -0500 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w1SFtWII143622 for ; Wed, 28 Feb 2018 10:59:26 -0500 Received: from e19.ny.us.ibm.com (e19.ny.us.ibm.com [129.33.205.209]) by mx0a-001b2d01.pphosted.com with ESMTP id 2gdwa3qapv-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Wed, 28 Feb 2018 10:59:25 -0500 Received: from localhost by e19.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 28 Feb 2018 10:59:24 -0500 Received: from b01cxnp23032.gho.pok.ibm.com (9.57.198.27) by e19.ny.us.ibm.com (146.89.104.206) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Wed, 28 Feb 2018 10:59:20 -0500 Received: from b01ledav005.gho.pok.ibm.com (b01ledav005.gho.pok.ibm.com [9.57.199.110]) by b01cxnp23032.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w1SFxJUK43647080; Wed, 28 Feb 2018 15:59:19 GMT Received: from b01ledav005.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 484D1AE03B; Wed, 28 Feb 2018 11:00:42 -0500 (EST) Received: from oc8043147753.ibm.com (unknown [9.60.75.238]) by b01ledav005.gho.pok.ibm.com (Postfix) with ESMTP id 2A1E6AE04B; Wed, 28 Feb 2018 11:00:41 -0500 (EST) Subject: Re: [PATCH v2 04/15] KVM: s390: CPU model support for AP virtualization To: David Hildenbrand , Christian Borntraeger , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, cohuck@redhat.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com References: <1519741693-17440-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1519741693-17440-5-git-send-email-akrowiak@linux.vnet.ibm.com> <38deecae-53b4-c5cb-3dba-24bdfab3d9d0@redhat.com> <3a3ff176-4e6b-963c-7831-cdcd10b556eb@de.ibm.com> <10cfdb2a-304c-989b-4765-84e19fcd423f@redhat.com> From: Tony Krowiak Date: Wed, 28 Feb 2018 10:59:17 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.0 MIME-Version: 1.0 In-Reply-To: <10cfdb2a-304c-989b-4765-84e19fcd423f@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-TM-AS-GCONF: 00 x-cbid: 18022815-0056-0000-0000-000004260D35 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00008602; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000254; SDB=6.00996371; UDB=6.00506534; IPR=6.00775695; MB=3.00019779; MTD=3.00000008; XFM=3.00000015; UTC=2018-02-28 15:59:22 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18022815-0057-0000-0000-000008680D30 Message-Id: <06f77e0c-a99f-b8c8-750e-7ba148d374ed@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-02-28_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1802280193 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/28/2018 06:58 AM, David Hildenbrand wrote: > On 28.02.2018 12:40, Christian Borntraeger wrote: >> >> On 02/28/2018 10:48 AM, David Hildenbrand wrote: >>> On 27.02.2018 15:28, Tony Krowiak wrote: >>>> Introduces a new CPU model feature and two CPU model >>>> facilities to support AP virtualization for KVM guests. >>>> >>>> CPU model feature: >>>> >>>> The KVM_S390_VM_CPU_FEAT_AP feature indicates that the >>>> AP facilities are installed on the KVM guest. This >>>> feature will be enabled by the kernel only if the AP >>>> facilities are installed on the linux host. This feature >>>> must be specifically turned on for the KVM guest from >>>> userspace to allow guest access to AP devices installed >>>> on the linux host. >>>> >>>> CPU model facilities: >>>> >>>> 1. AP Query Configuration Information (QCI) facility is installed. >>>> >>>> This is indicated by setting facilities bit 12 for >>>> the guest. The kernel will not enable this facility >>>> for the guest if it is not set on the host. This facility >>>> must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP >>>> feature is not installed. >>>> >>>> 2. AP Facilities Test facility (APFT) is installed. >>>> >>>> This is indicated by setting facilities bit 15 for >>>> the guest. The kernel will not enable this facility for >>>> the guest if it is not set on the host. This facility >>>> must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP >>>> feature is not installed. >>>> >>>> Reviewed-by: Christian Borntraeger >>>> Reviewed-by: Halil Pasic >>>> Signed-off-by: Tony Krowiak >>>> --- >>>> arch/s390/include/uapi/asm/kvm.h | 1 + >>>> arch/s390/kvm/kvm-s390.c | 4 ++++ >>>> arch/s390/tools/gen_facilities.c | 2 ++ >>>> 3 files changed, 7 insertions(+), 0 deletions(-) >>>> >>>> diff --git a/arch/s390/include/uapi/asm/kvm.h b/arch/s390/include/uapi/asm/kvm.h >>>> index 4cdaa55..a580dec 100644 >>>> --- a/arch/s390/include/uapi/asm/kvm.h >>>> +++ b/arch/s390/include/uapi/asm/kvm.h >>>> @@ -130,6 +130,7 @@ struct kvm_s390_vm_cpu_machine { >>>> #define KVM_S390_VM_CPU_FEAT_PFMFI 11 >>>> #define KVM_S390_VM_CPU_FEAT_SIGPIF 12 >>>> #define KVM_S390_VM_CPU_FEAT_KSS 13 >>>> +#define KVM_S390_VM_CPU_FEAT_AP 14 >>>> struct kvm_s390_vm_cpu_feat { >>>> __u64 feat[16]; >>>> }; >>>> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c >>>> index de1e299..c68ca86 100644 >>>> --- a/arch/s390/kvm/kvm-s390.c >>>> +++ b/arch/s390/kvm/kvm-s390.c >>>> @@ -347,6 +347,10 @@ static void kvm_s390_cpu_feat_init(void) >>>> >>>> if (MACHINE_HAS_ESOP) >>>> allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP); >>>> + >>>> + if (ap_instructions_installed()) /* AP instructions installed on host */ >>>> + allow_cpu_feat(KVM_S390_VM_CPU_FEAT_AP); >>> Don't we have a SIE specific AP feature? So is it true, that once we >>> have AP instructions, we are allowed to use them for SIE? Isn't there a >>> "AP interpretation facility" or anything like that? (that unlocks ECA_APIE) >> This seems to be coupled to the AP facility and there is no facility or scp bit. >> AP is too old to have that (predates STFLE) >> > Interesting, so we (I :) ) didn't implement vSIE support back then > because we never indicated the AP facility (sensed by executing the > instruction) to the guest. > > So ECA_APIE can be used when we sense the AP facility. Thanks! All true. >