Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1814927imm; Thu, 23 Aug 2018 09:10:32 -0700 (PDT) X-Google-Smtp-Source: AA+uWPzAMsYqb96zsuEOkTQ7+9OGY7PXnG5zu+eXm2dfdzxyMa6MAdtoHrI/Cw9jXuFkyt94ECvX X-Received: by 2002:a63:77ce:: with SMTP id s197-v6mr29058890pgc.172.1535040632288; Thu, 23 Aug 2018 09:10:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535040632; cv=none; d=google.com; s=arc-20160816; b=h1xuWxxpyi96z9sIJv5RVeVephlP7DR6QoSBESQ5KcqfhRHfaoS96eqVGXQPFu9A5g F0UxggSWr8j3yyf7H32si/5YPro2zoT7Q+KUweWz6OLUoWmmXk4qsyqk4hxCNJLTB+Cw J/J2r7qJOMZ8sBmFf/+lZyBT4i0bSnOW1/kMRyupfKKnHLbH56uE6zl0+2hC6i+F4Xpp BdeIKRVFrbGBZ/VdJbdavlErnfiVjHXsd8VqbmjJxoTG3tJiOQNEshWufH1dCEyJjSW4 /H0lPu6VNR53m/Zd4l9ehHyLZ4VsI4Xvy4IJb2Rqp3ucadk6REp3OuJd7tHs9e9s0upA Ag0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:reply-to:arc-authentication-results; bh=CHp17J8THRWZRdwZe6GvQ9bY9dv0iuu2xuvlURxjKh0=; b=xoXkDEYg5v35jMuX+DSPTxVJ6S9nDo1ltx4YueDRfK6UaoV2MtHL1FuD/YIe1V8iAO aP5xf5o9lY67kdGmczoCd6nwUhn1YBl8swt8p3yaO2S510rQmb6rLy0xlJQrRs+I63W2 Fmxj9xGVVEk1bKbB8T+JBE9MnPs9o1kn/zwhNFrcoyYXI/nyM3dR+rGid0m3LHWHgJD0 RRd9YUFxXfvVxsVGR4LAt/0O5cClmFrYxFhPKxvoVyt6p0utSLeqPbHjakNOrL0fO8lz tc/yq4RzasAUHz8YqC5LXAA0ib7wCUjfRoZ47Hit1eJ3+mM/LVdj4HbydnUu1HrJ/bBE kjQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u11-v6si4193228pgg.683.2018.08.23.09.10.16; Thu, 23 Aug 2018 09:10:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731004AbeHWOj1 (ORCPT + 99 others); Thu, 23 Aug 2018 10:39:27 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:38070 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726194AbeHWOj0 (ORCPT ); Thu, 23 Aug 2018 10:39:26 -0400 Received: from pps.filterd (m0098396.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7NB9c7E107121 for ; Thu, 23 Aug 2018 07:10:14 -0400 Received: from e06smtp02.uk.ibm.com (e06smtp02.uk.ibm.com [195.75.94.98]) by mx0a-001b2d01.pphosted.com with ESMTP id 2m1svfvx8x-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 23 Aug 2018 07:10:13 -0400 Received: from localhost by e06smtp02.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 23 Aug 2018 12:10:11 +0100 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp02.uk.ibm.com (192.168.101.132) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Thu, 23 Aug 2018 12:10:06 +0100 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w7NBA5ih32243908 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 23 Aug 2018 11:10:05 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 54AEC4C04A; Thu, 23 Aug 2018 14:10:06 +0100 (BST) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 73AD44C040; Thu, 23 Aug 2018 14:10:05 +0100 (BST) Received: from [9.152.224.92] (unknown [9.152.224.92]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 23 Aug 2018 14:10:05 +0100 (BST) Reply-To: pmorel@linux.ibm.com Subject: Re: [PATCH v9 21/22] KVM: s390: CPU model support for AP virtualization To: David Hildenbrand , Halil Pasic , Tony Krowiak , Tony Krowiak , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, cohuck@redhat.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, frankja@linux.ibm.com References: <1534196899-16987-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1534196899-16987-22-git-send-email-akrowiak@linux.vnet.ibm.com> <2c2c4859-ed3e-a492-dd59-78529c7768b2@redhat.com> <95e6ee74-69aa-9805-3233-b9ec81fce516@redhat.com> <7e7a35f5-d1eb-7719-c5e8-57d6f19db675@linux.ibm.com> From: Pierre Morel Date: Thu, 23 Aug 2018 13:10:03 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18082311-0008-0000-0000-00000265A77D X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18082311-0009-0000-0000-000021CDEE26 Message-Id: <8d6ae58f-967b-5e4e-0e54-8fb4962cb843@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-23_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808230120 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 23/08/2018 12:28, David Hildenbrand wrote: > On 23.08.2018 12:00, Halil Pasic wrote: >> >> >> On 08/23/2018 09:44 AM, David Hildenbrand wrote: >>> On 22.08.2018 22:16, Tony Krowiak wrote: >>>> On 08/22/2018 07:24 AM, David Hildenbrand wrote: >>>>> On 22.08.2018 13:19, David Hildenbrand wrote: >>>>>> On 13.08.2018 23:48, Tony Krowiak wrote: >>>>>>> From: Tony Krowiak >>>>>>> >>>>>>> Introduces a new CPU model feature and two CPU model >>>>>>> facilities to support AP virtualization for KVM guests. >>>>>>> >>>>>>> CPU model feature: >>>>>>> >>>>>>> The KVM_S390_VM_CPU_FEAT_AP feature indicates that >>>>>>> AP instructions are available on the guest. This >>>>>>> feature will be enabled by the kernel only if the AP >>>>>>> instructions are installed on the linux host. This feature >>>>>>> must be specifically turned on for the KVM guest from >>>>>>> userspace to use the VFIO AP device driver for guest >>>>>>> access to AP devices. >>>>>>> >>>>>>> CPU model facilities: >>>>>>> >>>>>>> 1. AP Query Configuration Information (QCI) facility is installed. >>>>>>> >>>>>>> This is indicated by setting facilities bit 12 for >>>>>>> the guest. The kernel will not enable this facility >>>>>>> for the guest if it is not set on the host. >>>>>>> >>>>>>> If this facility is not set for the KVM guest, then only >>>>>>> APQNs with an APQI less than 16 will be used by a Linux >>>>>>> guest regardless of the matrix configuration for the virtual >>>>>>> machine. This is a limitation of the Linux AP bus. >>>>>>> >>>>>>> 2. AP Facilities Test facility (APFT) is installed. >>>>>>> >>>>>>> This is indicated by setting facilities bit 15 for >>>>>>> the guest. The kernel will not enable this facility for >>>>>>> the guest if it is not set on the host. >>>>>>> >>>>>>> If this facility is not set for the KVM guest, then no >>>>>>> AP devices will be available to the guest regardless of >>>>>>> the guest's matrix configuration for the virtual >>>>>>> machine. This is a limitation of the Linux AP bus. >>>>>>> >>>>>>> Signed-off-by: Tony Krowiak >>>>>>> Reviewed-by: Christian Borntraeger >>>>>>> Reviewed-by: Halil Pasic >>>>>>> Tested-by: Michael Mueller >>>>>>> Tested-by: Farhan Ali >>>>>>> Signed-off-by: Christian Borntraeger >>>>>>> --- >>>>>>> arch/s390/kvm/kvm-s390.c | 5 +++++ >>>>>>> arch/s390/tools/gen_facilities.c | 2 ++ >>>>>>> 2 files changed, 7 insertions(+), 0 deletions(-) >>>>>>> >>>>>>> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c >>>>>>> index 1e8cb67..d5e04d2 100644 >>>>>>> --- a/arch/s390/kvm/kvm-s390.c >>>>>>> +++ b/arch/s390/kvm/kvm-s390.c >>>>>>> @@ -367,6 +367,11 @@ static void kvm_s390_cpu_feat_init(void) >>>>>>> >>>>>>> if (MACHINE_HAS_ESOP) >>>>>>> allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP); >>>>>>> + >>>>>>> + /* Check if AP instructions installed on host */ >>>>>>> + if (ap_instructions_available()) >>>>>>> + allow_cpu_feat(KVM_S390_VM_CPU_FEAT_AP); >>>>>>> + >>>>>>> /* >>>>>>> * We need SIE support, ESOP (PROT_READ protection for gmap_shadow), >>>>>>> * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing). >>>>>>> diff --git a/arch/s390/tools/gen_facilities.c b/arch/s390/tools/gen_facilities.c >>>>>>> index 90a8c9e..a52290b 100644 >>>>>>> --- a/arch/s390/tools/gen_facilities.c >>>>>>> +++ b/arch/s390/tools/gen_facilities.c >>>>>>> @@ -106,6 +106,8 @@ struct facility_def { >>>>>>> >>>>>>> .name = "FACILITIES_KVM_CPUMODEL", >>>>>>> .bits = (int[]){ >>>>>>> + 12, /* AP Query Configuration Information */ >>>>>>> + 15, /* AP Facilities Test */ >>>>>>> -1 /* END */ >>>>>>> } >>>>>>> }, >>>>>>> >>>>>> I really wonder if we should also export the APXA facility. >>>>>> >>>>>> We can probe and allow that CPU feature. However, we cannot disable it >>>>>> (as of now). >>>>>> >>>>>> We have other CPU features where it is the same case (basically all >>>>>> subfunctions). See kvm_s390_get_processor_subfunc(). We probe them and >>>>>> export them, but support to disable them has never been implemented. >>>>>> >>>>>> On a high level, we could then e.g. deny to start a QEMU guest if APXA >>>>>> is available but has been disabled. (until we know that disabling it >>>>>> actually works - if ever). >>>>>> >>>>>> This helps to catch nasty migration bugs (e.g. APXA suddenly >>>>>> disappearing). Although unlikely, definitely possible. >>>>>> >>>>>> >>>>>> Are there any other AP related facilities that the guest can from now on >>>>>> probe that should also become part of the CPU model? >>>>>> >>>>> To be more precise, shouldn't PQAP(QCI) be handled just like other >>>>> subfunctions? (I remember it should) >>>> >>>> When you suggest PQAP(QCI) be handled like other subfunctions, are you >>>> suggesting that there should be a field in struct kvm_s390_vm_cpu_subfunc >>>> with a bit indicating the QCI subfunction is available? The availability >>>> of the QCI subfunction of the PQAP instruction is determined by facilities >>>> bit 12. Is it not enough to export facilities bit 12? >>> >>> The feature block (128 bit) from PQAP(QCI) should be passed through a >>> subfunction block to QEMU. >>> >> >> I'm confused, which 128 bit? > > > Me too :) , I was assuming this block to be 128bit, but the qci block > has 128 bytes.... > > And looking at arch/s390/include/asm/ap.h, there is a lot of information > contained that is definitely not of interest for CPU models... > > I wonder if there is somewhere defined which bits are reserved for > future features/facilities, compared to ap masks and such. > > This is really hard to understand/plan without access to documentation. > > You (Halil, Tony, Pier, ...) should have a look if what I described > related to PQAP(QCI) containing features that should get part of the CPU > model makes sense or not. For now I was thinking that there is some part > inside of QCI that is strictly reserved for facilities/features that we > can use. > David, I already answered to you on this subject. First, Are you sure you do not mistake QCI for TAPQ which has the t bit instruction interception bit as all the instructions you use as subfunctions? Second, The TAPQ interception bit is exposed through the facility bit 15 and is documented as being installed when the APXA facility is installed. If we have the APFT, we have the APXA, problem seems solved to me. Regards, Pierre -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany