Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp566554imm; Wed, 22 Aug 2018 08:52:22 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwZL0eWD+c6psYvJBVNNz/Kmtw3m1l+bTaHQoszDhQR2wQGC/Q2wjC5vtFOEAhmIL7N3jsk X-Received: by 2002:a17:902:3a2:: with SMTP id d31-v6mr55019888pld.287.1534953142473; Wed, 22 Aug 2018 08:52:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534953142; cv=none; d=google.com; s=arc-20160816; b=ZyhzcIjFopbHr6fmluom3zL2RNmIHsTuHOI8nyCpzZ5hrX6VQbZu339+wOlUb4gM72 ieiuMfffrxENCkpqWsDEtE8LCeJ6vciYKphboLCCrSaeD0ASjBPdyFv2cldSIiNxrXa4 b+fChzi4U9kX01yQGwmSO278ln/jFb5HvlXXpXFamObfeE0Mr030rQNqw6ZTCrr8yJ2W opM0WA7WUn+JRxPTTcZyHVtn7ZtMhbBzD0pqKZ+9f5GlyeiPPacwB0DagVHBrF118Ve6 CtUqmeRTsa/EIMMtdyFnTFlWTijRARgIn9imPhrqYW93ZmgXbJW03GVK1ORqmN2loGQI Pd3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:reply-to:arc-authentication-results; bh=DtS+IbBcpd8rgi3N5inil9CEsIlHcip+Gek7zFYzSFE=; b=QUjOV+SCHekXrZR1RVEFYkEM/E7wu18PeyP8vaR15avQGRZyVTA0JRxPh+ThkLXe2m K4eu5tTzYaXv9wwmLjPaU072DOSelZLlzwVDpLv7++lPVSRjNfVpymt9ziWgWwuJkjiF 4+4ZNrWWpWsQlUCo2wYsAUob0KVjOVyJJ5LdkZp0TGfwPkyLrzWYl4N2Nw9yQCYTKWa6 o66Fq7X7mwRqBpMJNr26ppl2ZK3Vuu5Hgki6aPYeO4c8ahG43vJICC1SBi1mjqIej/Ma SiTMGL9F5sTejTANNcjvDoWxFHL+XYqzjgz22kV62ggp5qagnunmfdWku+psvHYFXh/Q RHrA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1-v6si2179454pfb.280.2018.08.22.08.52.06; Wed, 22 Aug 2018 08:52:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729447AbeHVTPm (ORCPT + 99 others); Wed, 22 Aug 2018 15:15:42 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:52270 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729426AbeHVTPm (ORCPT ); Wed, 22 Aug 2018 15:15:42 -0400 Received: from pps.filterd (m0098421.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7MFjwpT060837 for ; Wed, 22 Aug 2018 11:50:16 -0400 Received: from e06smtp05.uk.ibm.com (e06smtp05.uk.ibm.com [195.75.94.101]) by mx0a-001b2d01.pphosted.com with ESMTP id 2m18dbq7ve-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 22 Aug 2018 11:50:15 -0400 Received: from localhost by e06smtp05.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 22 Aug 2018 16:50:11 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp05.uk.ibm.com (192.168.101.135) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 22 Aug 2018 16:50:07 +0100 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w7MFo5Qa34799820 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 22 Aug 2018 15:50:05 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 69D45A4053; Wed, 22 Aug 2018 18:50:05 +0100 (BST) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 95DBDA4057; Wed, 22 Aug 2018 18:50:04 +0100 (BST) Received: from [9.152.224.111] (unknown [9.152.224.111]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 22 Aug 2018 18:50:04 +0100 (BST) Reply-To: pmorel@linux.ibm.com Subject: Re: [PATCH v9 21/22] KVM: s390: CPU model support for AP virtualization To: David Hildenbrand , Tony Krowiak , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, cohuck@redhat.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, frankja@linux.ibm.com, Tony Krowiak References: <1534196899-16987-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1534196899-16987-22-git-send-email-akrowiak@linux.vnet.ibm.com> <2c2c4859-ed3e-a492-dd59-78529c7768b2@redhat.com> From: Pierre Morel Date: Wed, 22 Aug 2018 17:50:04 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18082215-0020-0000-0000-000002BA3DCB X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18082215-0021-0000-0000-000021079501 Message-Id: <9f512d55-ef10-e2ae-f34e-e003c929bc3f@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-22_08:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808220158 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 22/08/2018 17:04, David Hildenbrand wrote: > On 22.08.2018 16:33, Pierre Morel wrote: >> On 22/08/2018 13:19, David Hildenbrand wrote: >>> On 13.08.2018 23:48, Tony Krowiak wrote: >>>> From: Tony Krowiak >>>> >>>> Introduces a new CPU model feature and two CPU model >>>> facilities to support AP virtualization for KVM guests. >>>> >>>> CPU model feature: >>>> >>>> The KVM_S390_VM_CPU_FEAT_AP feature indicates that >>>> AP instructions are available on the guest. This >>>> feature will be enabled by the kernel only if the AP >>>> instructions are installed on the linux host. This feature >>>> must be specifically turned on for the KVM guest from >>>> userspace to use the VFIO AP device driver for guest >>>> access to AP devices. >>>> >>>> CPU model facilities: >>>> >>>> 1. AP Query Configuration Information (QCI) facility is installed. >>>> >>>> This is indicated by setting facilities bit 12 for >>>> the guest. The kernel will not enable this facility >>>> for the guest if it is not set on the host. >>>> >>>> If this facility is not set for the KVM guest, then only >>>> APQNs with an APQI less than 16 will be used by a Linux >>>> guest regardless of the matrix configuration for the virtual >>>> machine. This is a limitation of the Linux AP bus. >>>> >>>> 2. AP Facilities Test facility (APFT) is installed. >>>> >>>> This is indicated by setting facilities bit 15 for >>>> the guest. The kernel will not enable this facility for >>>> the guest if it is not set on the host. >>>> >>>> If this facility is not set for the KVM guest, then no >>>> AP devices will be available to the guest regardless of >>>> the guest's matrix configuration for the virtual >>>> machine. This is a limitation of the Linux AP bus. >>>> >>>> Signed-off-by: Tony Krowiak >>>> Reviewed-by: Christian Borntraeger >>>> Reviewed-by: Halil Pasic >>>> Tested-by: Michael Mueller >>>> Tested-by: Farhan Ali >>>> Signed-off-by: Christian Borntraeger >>>> --- >>>> arch/s390/kvm/kvm-s390.c | 5 +++++ >>>> arch/s390/tools/gen_facilities.c | 2 ++ >>>> 2 files changed, 7 insertions(+), 0 deletions(-) >>>> >>>> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c >>>> index 1e8cb67..d5e04d2 100644 >>>> --- a/arch/s390/kvm/kvm-s390.c >>>> +++ b/arch/s390/kvm/kvm-s390.c >>>> @@ -367,6 +367,11 @@ static void kvm_s390_cpu_feat_init(void) >>>> >>>> if (MACHINE_HAS_ESOP) >>>> allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP); >>>> + >>>> + /* Check if AP instructions installed on host */ >>>> + if (ap_instructions_available()) >>>> + allow_cpu_feat(KVM_S390_VM_CPU_FEAT_AP); >>>> + >>>> /* >>>> * We need SIE support, ESOP (PROT_READ protection for gmap_shadow), >>>> * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing). >>>> diff --git a/arch/s390/tools/gen_facilities.c b/arch/s390/tools/gen_facilities.c >>>> index 90a8c9e..a52290b 100644 >>>> --- a/arch/s390/tools/gen_facilities.c >>>> +++ b/arch/s390/tools/gen_facilities.c >>>> @@ -106,6 +106,8 @@ struct facility_def { >>>> >>>> .name = "FACILITIES_KVM_CPUMODEL", >>>> .bits = (int[]){ >>>> + 12, /* AP Query Configuration Information */ >>>> + 15, /* AP Facilities Test */ >>>> -1 /* END */ >>>> } >>>> }, >>>> >>> >>> I really wonder if we should also export the APXA facility. >>> >>> We can probe and allow that CPU feature. However, we cannot disable it >>> (as of now). >>> >>> We have other CPU features where it is the same case (basically all >>> subfunctions). See kvm_s390_get_processor_subfunc(). We probe them and >>> export them, but support to disable them has never been implemented. >>> >>> On a high level, we could then e.g. deny to start a QEMU guest if APXA >>> is available but has been disabled. (until we know that disabling it >>> actually works - if ever). >>> >>> This helps to catch nasty migration bugs (e.g. APXA suddenly >>> disappearing). Although unlikely, definitely possible. > >>> >>> Are there any other AP related facilities that the guest can from now on >>> probe that should also become part of the CPU model? >>> >> >> >> >> Before going too far in a discussion on features which we do not really >> need, we can make clear that we only support beginning with z13 and only >> in the Z architecture mode as host and as guest. > > Easy answer: > > The CPU model should be prepared for all eventualities. We have handled > it that way since the beginning. > > The minimal thing I expect to have is all relevant features probed and > exported to user space. Just like we do with all the MSA/PTFF/PLO > subfunctions. I expect (and remember) this to be the same for PQAP. OK, we will need a separate patch. > > (there are some very special cases regarding subfunctions that are not > indicated) > > Why? The CPU model is not KVM specific. Is it true for privilege instructions? > >> >> We then need to abort the VFIO driver if APXA is not installed. > > While you should do that, the CPU model is more generic. This would only > imply that as of now, the APXA feature would always be available if the > AP feature is available. yes > > In addition, it makes the vSIE handling code easier - there is always > APXA and for now it cannot be disabled. > yes :) >> >> In this case we will have no problem with older guests not having idea >> about APXA. >> >> Would it be a solution? > > Any feature the guest sees, should be part of the CPU model. The whole > environment for cpu subfunctions is already in place both in KVM and > QEMU. Only disabling subfunctions in KVM is not implemented yet. > > You can exclude any subfunctions/facilities that are only valid on LPAR > level and cannot be used in some guest either way. (that makes life > sometimes easier) > > > I know that this might sound a little bit complicated, but it really > isn't. Boils down to modifying kvm_s390_cpu_feat_init() and specifying > some features+feature groups in QEMU. OK, we definitively need another patch/patch-set, to handle this. Do you think it can be done in another series since if we always support APXA when we have AP instructions, we already have an indication that APXA exist: the AP facility. Regards, Pierre -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany