Received: by 10.213.65.68 with SMTP id h4csp541003imn; Tue, 27 Mar 2018 04:25:21 -0700 (PDT) X-Google-Smtp-Source: AIpwx49LfVtl9s6nN3Hhnq5b9eg/SL11fPKhJO66ApFQC/Wh88CLguvpRu12bQ7Gh+krZ/XemD6v X-Received: by 2002:a17:902:d68d:: with SMTP id v13-v6mr7265561ply.177.1522149921788; Tue, 27 Mar 2018 04:25:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522149921; cv=none; d=google.com; s=arc-20160816; b=r6WV4kdxgjhHh4p6s3/0ctUQuRrbbHNWJGxz4XTvbv1k3FX+gKduED5MNDPngj/IXs R/Mn8mLuhUeTaiy85UwJ5czBcG2q5v/oAAXSvft0AZHeLu6rgncgfP/ualp0KASoUetQ IqLsLHKWHC8ogm/hIouujwNkX/ZJu15LS5pt9AJgqNe/J08k9x6NFRlI88nFKdwpiwSC wqgRY/O0MyzQVkmHvseDOJ/BTPRmGfnpaBJxQukg009WG57KeP0lMDQa27QPuMUkpWc0 V0sXUELarIUZQ7JRKYfHkfgeZZVzdPuHBlQclkRZxNQ30ZFC17TpyTLCKn8mHR3+Ta2f 2RHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :from:references:cc:to:subject:arc-authentication-results; bh=qkc6L+fXhO7uZI7FXB7VX+3cuh1h7Cd1GGF9obglLiA=; b=GYqQShYmYPM5XORNwiXMNX6CuXeBZvcbhytBZwnBLrvYpl6iOKiQzztcax4I+yztfr 5NrvNnODdCSIjs+CulqzlA9EUxyuLD1Aj5EtRyKxeiNyCnGMmcTN17JX5RrnhVFT9brN e9NRmUxrAnMXO2MZGeNxqXIu2CDmJaNqM3UyJNg3dgxI4Pnl2SdvUCYaF4fQE3kqh7rD mxJMDaz9MN8C/6aL39qXhUUH5qgIUMgThPSPTy2uObwbmChCohsLPD1u8cHOeAIFjKex P2peyrUJFs8+qiYdmg0J7Q1K8u1k5Uc+/5m/ZgxV2an3KcLd/bqbTefosRvdEs2J8ac5 CKaA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m9-v6si1037846plk.464.2018.03.27.04.25.06; Tue, 27 Mar 2018 04:25:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751152AbeC0LXF (ORCPT + 99 others); Tue, 27 Mar 2018 07:23:05 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:37094 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1750898AbeC0LXD (ORCPT ); Tue, 27 Mar 2018 07:23:03 -0400 Received: from pps.filterd (m0098416.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w2RBMDKl033755 for ; Tue, 27 Mar 2018 07:23:03 -0400 Received: from e06smtp14.uk.ibm.com (e06smtp14.uk.ibm.com [195.75.94.110]) by mx0b-001b2d01.pphosted.com with ESMTP id 2gyn15r1k7-1 (version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=NOT) for ; Tue, 27 Mar 2018 07:23:02 -0400 Received: from localhost by e06smtp14.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 27 Mar 2018 12:23:01 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp14.uk.ibm.com (192.168.101.144) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Tue, 27 Mar 2018 12:22:57 +0100 Received: from d06av25.portsmouth.uk.ibm.com (d06av25.portsmouth.uk.ibm.com [9.149.105.61]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w2RBMus154198350; Tue, 27 Mar 2018 11:22:56 GMT Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4241311C04A; Tue, 27 Mar 2018 12:15:21 +0100 (BST) Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B153B11C054; Tue, 27 Mar 2018 12:15:20 +0100 (BST) Received: from [9.152.224.146] (unknown [9.152.224.146]) by d06av25.portsmouth.uk.ibm.com (Postfix) with ESMTP; Tue, 27 Mar 2018 12:15:20 +0100 (BST) Subject: Re: [PATCH v3 03/14] KVM: s390: CPU model support for AP virtualization To: Cornelia Huck , Tony Krowiak Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com References: <1521051954-25715-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1521051954-25715-4-git-send-email-akrowiak@linux.vnet.ibm.com> <20180327125911.5c7ecf34.cohuck@redhat.com> From: Pierre Morel Date: Tue, 27 Mar 2018 13:22:56 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <20180327125911.5c7ecf34.cohuck@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-TM-AS-GCONF: 00 x-cbid: 18032711-0044-0000-0000-0000054057AF X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18032711-0045-0000-0000-0000287F72B0 Message-Id: <327f20bc-741d-ac0a-8e3f-929e8ad73159@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-03-27_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1803270116 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27/03/2018 12:59, Cornelia Huck wrote: > On Wed, 14 Mar 2018 14:25:43 -0400 > Tony Krowiak wrote: > >> Introduces a new CPU model feature and two CPU model >> facilities to support AP virtualization for KVM guests. >> >> CPU model feature: >> >> The KVM_S390_VM_CPU_FEAT_AP feature indicates that >> AP instructions are available on the guest. This >> feature will be enabled by the kernel only if the AP >> instructions are installed on the linux host. This feature >> must be specifically turned on for the KVM guest from >> userspace to use the VFIO AP device driver for guest >> access to AP devices. >> >> CPU model facilities: >> >> 1. AP Query Configuration Information (QCI) facility is installed. >> >> This is indicated by setting facilities bit 12 for >> the guest. The kernel will not enable this facility >> for the guest if it is not set on the host. This facility >> must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP >> feature is not installed. >> >> 2. AP Facilities Test facility (APFT) is installed. >> >> This is indicated by setting facilities bit 15 for >> the guest. The kernel will not enable this facility for >> the guest if it is not set on the host. This facility >> must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP >> feature is not installed. >> >> Reviewed-by: Christian Borntraeger >> Reviewed-by: Halil Pasic >> Signed-off-by: Tony Krowiak >> --- >> arch/s390/include/asm/kvm_host.h | 1 + >> arch/s390/include/uapi/asm/kvm.h | 1 + >> arch/s390/kvm/kvm-s390.c | 4 ++++ >> arch/s390/tools/gen_facilities.c | 2 ++ >> 4 files changed, 8 insertions(+), 0 deletions(-) >> >> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c >> index c47731d..a60c45b 100644 >> --- a/arch/s390/kvm/kvm-s390.c >> +++ b/arch/s390/kvm/kvm-s390.c >> @@ -350,6 +350,10 @@ static void kvm_s390_cpu_feat_init(void) >> >> if (MACHINE_HAS_ESOP) >> allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP); >> + >> + if (ap_instructions_installed()) /* AP instructions installed on host */ >> + allow_cpu_feat(KVM_S390_VM_CPU_FEAT_AP); > That's another dependency of the base kvm-s390 module on zcrypt, which > I don't like at all. In fact there is a tricky thing about zcrypt it is that even it is configured a a module CONFIG_ZCRYPT=M, the AP BUS is built statically with the kernel. See drivers/s390/crypto/Makefile " ap-objs := ap_bus.o ap_card.o ap_queue.o obj-$(subst m,y,$(CONFIG_ZCRYPT)) += ap.o " ugly isn't it? > > There are two possibilities here: > - Exposing the features makes sense even if no zcrypt driver is active > in the host. Then, ap_instructions_installed() needs to be moved into > always-built code (see my comments for the interface in patch 1). This is what we need for future enhancement I think. > - Exposing the features makes sense only if we actually want to make > vfio-ap available. Then we should provide the proper check in the > vfio-ap parts (which depends on zcrypt) and stub it out if vfio-ap is > not configured. > >> + >> /* >> * We need SIE support, ESOP (PROT_READ protection for gmap_shadow), >> * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing). -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany