Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp852327imm; Tue, 3 Jul 2018 00:48:42 -0700 (PDT) X-Google-Smtp-Source: AAOMgpczEQvaRet/Y3qqWBSVRWZh35WJ6fSrhUmnhHUXobpX55bplEmZeELjNZeILqmXedVaWgW8 X-Received: by 2002:a62:d693:: with SMTP id a19-v6mr23903139pfl.248.1530604122439; Tue, 03 Jul 2018 00:48:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530604122; cv=none; d=google.com; s=arc-20160816; b=d98UInOO8G+anPCV8KqF5cvQnftf6N82dQ70UE7PW4Yi6I8TFemygVdgBUnkkTnBqQ fZXqhMGRcu7iO+AfVyEVaCuELqeHmJEWHyhe6WQjjwiH92tMrmcoXdmC5PUEDGEp1fxv XlZn4QZn98EgSp9rvNHAfLT1K+qLI90kDbhtRZjwSoHitOqNRa8R+9RwIzAin/tjeu3x zF9VYBVL0Bpb3LGxEKIL9d6ci5EUfqyOjRNn1P2Ny7V6Ii7G3kyDyOZ5dgpy3zO08awe 4HSItI0iY/YprqtyTbCYM0lfL9RUVxiABU4LSFFt2J3XTg0ZI/fFLcdm1q4q6PYr50er IQCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :from:references:cc:to:subject:arc-authentication-results; bh=1qSDcMEX3ACr5XX04CuyXls162Ims9I7Xcl78MTzR/s=; b=QA1V/ZqrW4t9r/sG8vHxZXyYSPmTCjdr7PrPpNuu+GP9FfGpxJ5YG6zPrF828GwWy4 lyGwO+QlR+5O9EaFprftRz6eDO5YRaBIT+7qmV+Iw5usNNPzt5IyUx4jO4mRE/BTKHSZ HbmNoMjyzVBUatgFaW9LIYeiC/ZNZRXhv1HBNibaLTyxs/1tOLAHhombZasSMC7lz885 YDSNV31/SX2tq7nkjcdgNB3C1VUZNNf/Fb2fQ+8iBiZyk6R96xIYV93eFMPxHdONrNAB 2Yqx91q798nzMtIa2b76IFuyURWKbLEcyfDwu/70ddlDtqbhuaXzKS5OLlkCTf0qHJiV 8flw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k188-v6si500579pgc.321.2018.07.03.00.48.27; Tue, 03 Jul 2018 00:48:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933022AbeGCHrF (ORCPT + 99 others); Tue, 3 Jul 2018 03:47:05 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:57808 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753835AbeGCHrD (ORCPT ); Tue, 3 Jul 2018 03:47:03 -0400 Received: from pps.filterd (m0098417.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w637iGaE058316 for ; Tue, 3 Jul 2018 03:47:03 -0400 Received: from e06smtp07.uk.ibm.com (e06smtp07.uk.ibm.com [195.75.94.103]) by mx0a-001b2d01.pphosted.com with ESMTP id 2k0473a4u8-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Tue, 03 Jul 2018 03:47:02 -0400 Received: from localhost by e06smtp07.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 3 Jul 2018 08:47:01 +0100 Received: from b06cxnps3075.portsmouth.uk.ibm.com (9.149.109.195) by e06smtp07.uk.ibm.com (192.168.101.137) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Tue, 3 Jul 2018 08:46:58 +0100 Received: from d06av21.portsmouth.uk.ibm.com (d06av21.portsmouth.uk.ibm.com [9.149.105.232]) by b06cxnps3075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w637ku4M38404344 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Tue, 3 Jul 2018 07:46:56 GMT Received: from d06av21.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 5960952052; Tue, 3 Jul 2018 10:47:22 +0100 (BST) Received: from [10.0.2.15] (unknown [9.152.224.35]) by d06av21.portsmouth.uk.ibm.com (Postfix) with ESMTP id 977C15204F; Tue, 3 Jul 2018 10:47:19 +0100 (BST) Subject: Re: [PATCH v6 21/21] s390: doc: detailed specifications for AP virtualization To: Halil Pasic , Tony Krowiak , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, cohuck@redhat.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, Tony Krowiak References: <1530306683-7270-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1530306683-7270-22-git-send-email-akrowiak@linux.vnet.ibm.com> <49b11ac2-2230-ad74-1583-c6a57f8b31e3@linux.ibm.com> From: Harald Freudenberger Date: Tue, 3 Jul 2018 09:46:54 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <49b11ac2-2230-ad74-1583-c6a57f8b31e3@linux.ibm.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US X-TM-AS-GCONF: 00 x-cbid: 18070307-0028-0000-0000-000002D79BB4 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18070307-0029-0000-0000-0000238F1B50 Message-Id: <6a330cae-2fe2-54df-edce-c3360117cf3c@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-07-03_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=2 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1806210000 definitions=main-1807030089 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02.07.2018 18:28, Halil Pasic wrote: > > > On 06/29/2018 11:11 PM, Tony Krowiak wrote: >> This patch provides documentation describing the AP architecture and >> design concepts behind the virtualization of AP devices. It also >> includes an example of how to configure AP devices for exclusive >> use of KVM guests. >> >> Signed-off-by: Tony Krowiak >> --- > [..] >> + >> +Reserve APQNs for exclusive use of KVM guests >> +--------------------------------------------- >> +The following block diagram illustrates the mechanism by which APQNs are >> +reserved: >> + >> +                              +------------------+ >> +                 remove       |                  |   unbind >> +         +------------------->+ cex4queue driver +<-----------+ >> +         |                    |                  |            | >> +         |                    +------------------+            | >> +         |                                                    | >> +         |                                                    | >> +         |                                                    | >> ++--------+---------+ register +------------------+      +-----+------+ >> +|                  +<---------+                  | bind |            | >> +|      ap_bus      |          |  vfio_ap driver  +<-----+    admin   | >> +|                  +--------->+                  |      |            | >> ++------------------+  probe   +---+--------+-----+      +------------+ >> +                                  |        | >> +                           create |        | store APQN >> +                                  |        | >> +                                  v        v >> +                              +---+--------+-----+ >> +                              |                  | >> +                              |  matrix device   | >> +                              |                  | >> +                              +------------------+ >> + >> +The process for reserving an AP queue for use by a KVM guest is: >> + >> +* The vfio-ap driver during its initialization will perform the following: >> +  * Create the 'vfio_ap' root device - /sys/devices/vfio_ap >> +  * Create the 'matrix' device in the 'vfio_ap' root >> +  * Register the matrix device with the device core >> +* Register with the ap_bus for AP queue devices of type 10 devices (CEX4 and >> +  newer) and to provide the vfio_ap driver's probe and remove callback >> +  interfaces. The reason why older devices are not supported is because there >> +  are no systems available on which to test. >> +* The admin unbinds queue cc.qqqq from the cex4queue device driver. This results >> +  in the ap_bus calling the the device driver's remove interface which >> +  unbinds the cc.qqqq queue device from the driver. > > What if the queue cc.qqqq is already in use? AFAIU unbind is almost as radical as > pulling a cable. What is the proper procedure an admin should follow before doing > the unbind? What do you mean on this level with 'in use'? A unbind destroys the association between device and driver. There is no awareness of 'in use' or 'not in use' on this level. This is a hard unbind. > >> +* The admin binds the cc.qqqq queue to the vfio_ap device driver. This results >> +  in the ap_bus calling the device vfio_ap driver's probe interface to bind >> +  queue cc.qqqq to the driver. The vfio_ap device driver will store the APQN for >> +  the queue in the matrix device >> + > [..] > > -- > To unsubscribe from this list: send the line "unsubscribe linux-s390" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at  http://vger.kernel.org/majordomo-info.html >