Received: by 10.213.65.68 with SMTP id h4csp517068imn; Tue, 27 Mar 2018 04:00:25 -0700 (PDT) X-Google-Smtp-Source: AG47ELueyowmJzKI8of3W+S4kTHAOjHWuhSm+aUk3wVVwTRlKdjE1wiV2JiKnGDIMZSb0hLzxTF8 X-Received: by 2002:a17:902:8c8c:: with SMTP id t12-v6mr34175677plo.100.1522148425754; Tue, 27 Mar 2018 04:00:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522148425; cv=none; d=google.com; s=arc-20160816; b=lviA5OPg6Bd4s7MXBng+0YO9TKmc1SahNx8+AdKAKJIxaGcKaQAnIyWWJFAZGdk1qI oxh0q4tVKqGXnoGjDMLPnm0E7HOLIsD0InZehza/uVak90kW0zsjcGNWyvNUS/c5ZPCg OmRftsnlJWZfx4VvE44UAiglJk5KJwkZXvv7m4PQYz9ie0I5+UUuL2YMUuTffipnW2mJ XYxAQfkJTJ0bflxEIom1HFzKKUP58l6gUe4BNDk2QjG7iJjMM5cZQGVOp3LhS/AQ1YUC AlUxhSjCNJ4p0p5J9RWVnRnH8QWgGCjFeO1Qc6sS1dZLySz3zyvUrbxfs0HAWPVfkm1f 920w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=gu2i5dGG1+SjAFF1xGwJ6DDxPCHMgwjidiLAsQmSpXs=; b=yk3701Y68WNxN2TZ2TS0cOgh4zvPb4xUqGgEnTwWgKPZojgO9c0wXD+yK8nItK9HvQ IXiZCztrBPbgTEeFsRYn9hjc/3ZNm3UqTpKBS50JN7Cc2NezXuNAWH61YPAC7vbIimt6 xO9YllE5yb+6LoWVEcWWbFTNyUzF7clPbtMQAqOl2qh0FNJqd4cb4HW/yIsewn2rD2Nb CLNWgODFkUZaKbm+54We8/JDzcWhShzj9J/gI0Q+30BkMNetAS23nSn7FJV98sCZxw7p N55GAlhfzf03WO6i6f88i5eXInWtCoOBmbdomzTeafuJ3mA3Os2TZHIbO/g5ZL5XZEWJ zUDA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 85si611238pfo.234.2018.03.27.04.00.10; Tue, 27 Mar 2018 04:00:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751686AbeC0K7T (ORCPT + 99 others); Tue, 27 Mar 2018 06:59:19 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:37062 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751030AbeC0K7R (ORCPT ); Tue, 27 Mar 2018 06:59:17 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D12BB77067; Tue, 27 Mar 2018 10:59:16 +0000 (UTC) Received: from gondolin (dhcp-192-222.str.redhat.com [10.33.192.222]) by smtp.corp.redhat.com (Postfix) with ESMTP id E2F31215CDB5; Tue, 27 Mar 2018 10:59:13 +0000 (UTC) Date: Tue, 27 Mar 2018 12:59:11 +0200 From: Cornelia Huck To: Tony Krowiak Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com Subject: Re: [PATCH v3 03/14] KVM: s390: CPU model support for AP virtualization Message-ID: <20180327125911.5c7ecf34.cohuck@redhat.com> In-Reply-To: <1521051954-25715-4-git-send-email-akrowiak@linux.vnet.ibm.com> References: <1521051954-25715-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1521051954-25715-4-git-send-email-akrowiak@linux.vnet.ibm.com> Organization: Red Hat GmbH MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Tue, 27 Mar 2018 10:59:17 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Tue, 27 Mar 2018 10:59:17 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'cohuck@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 14 Mar 2018 14:25:43 -0400 Tony Krowiak wrote: > Introduces a new CPU model feature and two CPU model > facilities to support AP virtualization for KVM guests. > > CPU model feature: > > The KVM_S390_VM_CPU_FEAT_AP feature indicates that > AP instructions are available on the guest. This > feature will be enabled by the kernel only if the AP > instructions are installed on the linux host. This feature > must be specifically turned on for the KVM guest from > userspace to use the VFIO AP device driver for guest > access to AP devices. > > CPU model facilities: > > 1. AP Query Configuration Information (QCI) facility is installed. > > This is indicated by setting facilities bit 12 for > the guest. The kernel will not enable this facility > for the guest if it is not set on the host. This facility > must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP > feature is not installed. > > 2. AP Facilities Test facility (APFT) is installed. > > This is indicated by setting facilities bit 15 for > the guest. The kernel will not enable this facility for > the guest if it is not set on the host. This facility > must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP > feature is not installed. > > Reviewed-by: Christian Borntraeger > Reviewed-by: Halil Pasic > Signed-off-by: Tony Krowiak > --- > arch/s390/include/asm/kvm_host.h | 1 + > arch/s390/include/uapi/asm/kvm.h | 1 + > arch/s390/kvm/kvm-s390.c | 4 ++++ > arch/s390/tools/gen_facilities.c | 2 ++ > 4 files changed, 8 insertions(+), 0 deletions(-) > > diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c > index c47731d..a60c45b 100644 > --- a/arch/s390/kvm/kvm-s390.c > +++ b/arch/s390/kvm/kvm-s390.c > @@ -350,6 +350,10 @@ static void kvm_s390_cpu_feat_init(void) > > if (MACHINE_HAS_ESOP) > allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP); > + > + if (ap_instructions_installed()) /* AP instructions installed on host */ > + allow_cpu_feat(KVM_S390_VM_CPU_FEAT_AP); That's another dependency of the base kvm-s390 module on zcrypt, which I don't like at all. There are two possibilities here: - Exposing the features makes sense even if no zcrypt driver is active in the host. Then, ap_instructions_installed() needs to be moved into always-built code (see my comments for the interface in patch 1). - Exposing the features makes sense only if we actually want to make vfio-ap available. Then we should provide the proper check in the vfio-ap parts (which depends on zcrypt) and stub it out if vfio-ap is not configured. > + > /* > * We need SIE support, ESOP (PROT_READ protection for gmap_shadow), > * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing).