Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp164623imm; Mon, 2 Jul 2018 09:22:41 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKWmWjhkDGJuAgMo8Ie3Sc6NwOzAH/eCcnV9AIBJJ4ZWqLEk1kiP5g0+6U5ag/rSWSYQ9sq X-Received: by 2002:a17:902:b494:: with SMTP id y20-v6mr26033808plr.136.1530548561397; Mon, 02 Jul 2018 09:22:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530548561; cv=none; d=google.com; s=arc-20160816; b=KJHdGtmwrxTVGfmFGB4zE5KTtuSgxHB0sTVN+UKEtGhQcFoBdn6zBzvwls+vZyqR8Q DW0HGn8Km6b5QjXTiEbFLAbFVRG55imEvMAG7I8Hnfv65XvhanS21kJ7WT3PydyVNXvs fkg484Cx8io2u3YhYyxJv7V+N5yhNW+Ge9AwNVyK/BJ+U8tLrtMB1/rfBCbLvPZpSRCH SMEFRfTE9RZBnmtAquMa34cyQ2O4ZpHGrrNv2wiVBepO4boRcTQRWetfq0sWCXEiTMAI aeq489BF2xxPmQauiCE+tWRP3++a7BFw8fNmI+IX8PUmvGpKf7jg5h6Q7jBa4jZd/Ubs J25g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:arc-authentication-results; bh=BaM3x8Yq7VRyvZ2AvIOuLXUKps/yzLdH1g2DaQHawt0=; b=FQD4p7yUUDJQe0RWVk6wwkwrRjsY0zPGQRUy9T5nwHX+UI/+YWbiuY8toJU3/VHl1G SFG7ldNMYD2mvNIkfKRnf0GQRTInIVZFQMjzMbD4C7QTtC19kLTA/+sZCBtNrfCnbUeJ 8Q4HTiqDXV8lW5CbJwSuQi7GHy56+XvQOkyMgGHHV1wpfPSnY/71fKaHVehgrzb7kTVu S2GohjoJ4LOlxKXFq9+kUU6XxII1d/xmYorOuPljSFEIMNzX4UvbXnz1gnCHVuGrf2nv 1yUPgyEgIwZozSZ9ht6yBnM+HBO65U4Ab7XbUXzv9aJlA2zCda8MZ9yf2tVBQq6fYhGT ZjtQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l5-v6si17809415pls.360.2018.07.02.09.22.19; Mon, 02 Jul 2018 09:22:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752656AbeGBQVG (ORCPT + 99 others); Mon, 2 Jul 2018 12:21:06 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:50064 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752557AbeGBQVE (ORCPT ); Mon, 2 Jul 2018 12:21:04 -0400 Received: from pps.filterd (m0098393.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w62GE8Fi044559 for ; Mon, 2 Jul 2018 12:21:04 -0400 Received: from e06smtp02.uk.ibm.com (e06smtp02.uk.ibm.com [195.75.94.98]) by mx0a-001b2d01.pphosted.com with ESMTP id 2jykxbhfhh-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 02 Jul 2018 12:21:04 -0400 Received: from localhost by e06smtp02.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 2 Jul 2018 17:21:02 +0100 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp02.uk.ibm.com (192.168.101.132) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Mon, 2 Jul 2018 17:20:58 +0100 Received: from d06av26.portsmouth.uk.ibm.com (d06av26.portsmouth.uk.ibm.com [9.149.105.62]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w62GKvEc15138824 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 2 Jul 2018 16:20:57 GMT Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id A505BAE057; Mon, 2 Jul 2018 17:20:44 +0100 (BST) Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id AAEF9AE045; Mon, 2 Jul 2018 17:20:43 +0100 (BST) Received: from oc3836556865.ibm.com (unknown [9.152.224.39]) by d06av26.portsmouth.uk.ibm.com (Postfix) with ESMTP; Mon, 2 Jul 2018 17:20:43 +0100 (BST) Subject: Re: [PATCH v6 05/21] KVM: s390: CPU model support for AP virtualization To: Cornelia Huck , Tony Krowiak Cc: Christian Borntraeger , Tony Krowiak , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com References: <1530306683-7270-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1530306683-7270-6-git-send-email-akrowiak@linux.vnet.ibm.com> <276b5ae7-7f27-faae-1e5a-0d4c084139e9@linux.ibm.com> <20180702174103.5d1ce603.cohuck@redhat.com> <20180702181108.2c721a86.cohuck@redhat.com> From: Halil Pasic Date: Mon, 2 Jul 2018 18:20:55 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <20180702181108.2c721a86.cohuck@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18070216-0008-0000-0000-0000024ED72A X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18070216-0009-0000-0000-000021B4E17A Message-Id: <76165cca-b8ec-172a-4a1b-6f3514b44344@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-07-02_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=986 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1807020184 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07/02/2018 06:11 PM, Cornelia Huck wrote: > On Mon, 2 Jul 2018 11:54:28 -0400 > Tony Krowiak wrote: > >> On 07/02/2018 11:41 AM, Cornelia Huck wrote: >>> On Mon, 2 Jul 2018 11:37:11 -0400 >>> Tony Krowiak wrote: >>> >>>> On 07/02/2018 10:38 AM, Christian Borntraeger wrote: >>>>> On 06/29/2018 11:11 PM, Tony Krowiak wrote: >>>>>> Introduces a new CPU model feature and two CPU model >>>>>> facilities to support AP virtualization for KVM guests. >>>>>> >>>>>> CPU model feature: >>>>>> >>>>>> The KVM_S390_VM_CPU_FEAT_AP feature indicates that >>>>>> AP instructions are available on the guest. This >>>>>> feature will be enabled by the kernel only if the AP >>>>>> instructions are installed on the linux host. This feature >>>>>> must be specifically turned on for the KVM guest from >>>>>> userspace to use the VFIO AP device driver for guest >>>>>> access to AP devices. >>>>>> >>>>>> CPU model facilities: >>>>>> >>>>>> 1. AP Query Configuration Information (QCI) facility is installed. >>>>>> >>>>>> This is indicated by setting facilities bit 12 for >>>>>> the guest. The kernel will not enable this facility >>>>>> for the guest if it is not set on the host. This facility >>>>>> must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP >>>>>> feature is not installed. >>>>>> >>>>>> If this facility is not set for the KVM guest, then only >>>>>> APQNs with an APQI less than 16 will be available to the >>>>>> guest regardless of the guest's matrix configuration. This >>>>>> is a limitation of the AP bus running on the guest. >>>>>> >>>>>> 2. AP Facilities Test facility (APFT) is installed. >>>>>> >>>>>> This is indicated by setting facilities bit 15 for >>>>>> the guest. The kernel will not enable this facility for >>>>>> the guest if it is not set on the host. This facility >>>>>> must not be set by userspace if the KVM_S390_VM_CPU_FEAT_AP >>>>>> feature is not installed. >>>>>> >>>>>> If this facility is not set for the KVM guest, then no >>>>>> AP devices will be available to the guest regardless of >>>>>> the guest's matrix configuration. This is a limitation >>>>>> of the AP bus running under the guest. >>>>>> >>>>>> Reviewed-by: Christian Borntraeger >>>>>> Reviewed-by: Halil Pasic >>>>>> Signed-off-by: Tony Krowiak >>>>> I think it probably should be at the end of the series, other than that its good. >>>> If I move this to the end of the series, the very next patch checks the >>>> >>>> KVM_S390_VM_CPU_FEAT_AP feature? >>> Introduce it here, offer it only with the last patch? >> >> I apologize, but I don't know what you mean by this. Are you suggesting >> this patch >> should only include the #define for KVM_S390_VM_CPU_FEAT_AP? > > Yes, just introduce the definition here (so code later in the series > can refer to it) and flip the switch (offer the bit) as the final > patch. > The other features introduced and exposed here are no different. For KVM_S390_VM_CPU_FEAT_AP defer exposing means defer allow_cpu_feat(); for the STFLE features, defer adding to FACILITIES_KVM_CPUMODEL. Anyway, I think the definition should be squashed into #6. Expose the features after patch #6 is in place or expose them at the end of the series is IMHO a matter of taste -- and I lean towards expose at the end of the series. Regards, Halil