Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp527413imu; Wed, 2 Jan 2019 11:11:25 -0800 (PST) X-Google-Smtp-Source: ALg8bN4Lnybk1xIPBf6Hyo8+NZQ6UdBAlAhwvtE1ly34BRRb5vs8qvZe+F20m9vpSnb8VIB/+jSE X-Received: by 2002:a63:5207:: with SMTP id g7mr14662597pgb.253.1546456284947; Wed, 02 Jan 2019 11:11:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546456284; cv=none; d=google.com; s=arc-20160816; b=FEax3vmcaB4+5Ac5qHhRf9FA4NzLew19gEPn2Mh9xMkmxkzGSO/5iDfLR3OEaiZ3AU bnOksE7kls4WGvi2j3lww6xiA+A0EZV+raOqJe4jlN0rwtaXwmej/OG70iwUYFBtXPqV 2TEeKvZjlaG5anfbe/KLXqOl6n3XZaIDibXIsFjrcbuyz+Iuc0yTfFzZdgdfGuFGEVGg k3DsZYZlnvEH05rtCdSlhTm5tYxGpwV4X+1UIOTwnACEwOQoJy6C+kjKSwOEzUtcleR3 U2vP8+NYdtaToS++OV99GpQb06JPTSWchKhzLVU7J7ceHxDBFP3jPJTj/u+u8XZJSWlZ zQtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:reply-to; bh=0aTwq5BTadZoWYPLoq2eA1RANxurgCwMZUifAVlgnDg=; b=BGPSw5ng0J3Szug/ZXmUz6X0U+wK1zG24oIJpBUgyCgbLdFG7J5H7zYvBXC6D7G94p CJjdUFBps/E5GD74shQH6LNoCtd6SwuWjdyYnyus93ej5d5wGSGKfeklebaXqbAsWhD7 W+DUOE9GO91aJzUt0ASVzcqIdX8OiA7Q/Wowi7hvlPKE6wEgUWej567sMjDbWQgXPUm6 987SI1tNUD8UQF3e4GmYcrcuEWgbjmlLWa5262GNUfkysQMa+UDxibzkvlbVtpaL1Pij 2CUZJ85IkozZgSuoYK+GizJOk5X92Na8b2QfREXjddj1W3vIQOKFnNLGVntSo/wOISNv QsFQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l129si3190761pfl.284.2019.01.02.11.11.10; Wed, 02 Jan 2019 11:11:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730224AbfABR3K (ORCPT + 99 others); Wed, 2 Jan 2019 12:29:10 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:37080 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730238AbfABR3J (ORCPT ); Wed, 2 Jan 2019 12:29:09 -0500 Received: from pps.filterd (m0098399.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id x02HOswJ057844 for ; Wed, 2 Jan 2019 12:29:08 -0500 Received: from e06smtp04.uk.ibm.com (e06smtp04.uk.ibm.com [195.75.94.100]) by mx0a-001b2d01.pphosted.com with ESMTP id 2prwy2tker-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 02 Jan 2019 12:29:08 -0500 Received: from localhost by e06smtp04.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 2 Jan 2019 17:29:05 -0000 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp04.uk.ibm.com (192.168.101.134) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 2 Jan 2019 17:29:03 -0000 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x02HT1SG4063336 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 2 Jan 2019 17:29:01 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 869804C040; Wed, 2 Jan 2019 17:29:01 +0000 (GMT) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 102504C044; Wed, 2 Jan 2019 17:29:01 +0000 (GMT) Received: from [9.152.224.140] (unknown [9.152.224.140]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 2 Jan 2019 17:29:01 +0000 (GMT) Reply-To: pmorel@linux.ibm.com Subject: Re: [PATCH v5 10/15] KVM: s390: add functions to (un)register GISC with GISA To: Michael Mueller , KVM Mailing List Cc: Linux-S390 Mailing List , linux-kernel@vger.kernel.org, kvm390-list@tuxmaker.boeblingen.de.ibm.com, Martin Schwidefsky , Heiko Carstens , Christian Borntraeger , Janosch Frank , David Hildenbrand , Cornelia Huck , Halil Pasic References: <20181219191756.57973-1-mimu@linux.ibm.com> <20181219191756.57973-11-mimu@linux.ibm.com> From: Pierre Morel Date: Wed, 2 Jan 2019 18:29:00 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1 MIME-Version: 1.0 In-Reply-To: <20181219191756.57973-11-mimu@linux.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 19010217-0016-0000-0000-0000023EA240 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19010217-0017-0000-0000-00003297A831 Message-Id: X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-01-02_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1901020156 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 19/12/2018 20:17, Michael Mueller wrote: > Add the IAM (Interruption Alert Mask) to the architecture specific > kvm struct. This mask in the GISA is used to define for which ISC > a GIB alert can be issued. > > The functions kvm_s390_gisc_register() and kvm_s390_gisc_unregister() > are used to (un)register a GISC (guest ISC) with a virtual machine and > its GISA. > > Upon successful completion, kvm_s390_gisc_register() returns the > ISC to be used for GIB alert interruptions. A negative return code > indicates an error during registration. > > Theses functions will be used by other adapter types like AP and PCI to > request pass-through interruption support. > > Signed-off-by: Michael Mueller > --- > arch/s390/include/asm/kvm_host.h | 9 ++++++ > arch/s390/kvm/interrupt.c | 66 ++++++++++++++++++++++++++++++++++++++++ > 2 files changed, 75 insertions(+) > > diff --git a/arch/s390/include/asm/kvm_host.h b/arch/s390/include/asm/kvm_host.h > index 0deba3ae8bc7..2c1259da3636 100644 > --- a/arch/s390/include/asm/kvm_host.h > +++ b/arch/s390/include/asm/kvm_host.h > @@ -782,6 +782,9 @@ struct kvm_s390_gisa { > u8 reserved03[11]; > u32 airq_count; > } g1; > + struct { > + u64 word[4]; > + } u64; > }; > }; > > @@ -849,6 +852,9 @@ struct kvm_arch{ > DECLARE_BITMAP(cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS); > struct kvm_s390_gisa *gisa; > int gib_in_use; > + u8 iam; > + u32 iam_ref_count[MAX_ISC + 1]; > + spinlock_t iam_ref_lock; > }; > > #define KVM_HVA_ERR_BAD (-1UL) > @@ -882,6 +888,9 @@ void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm, > extern int sie64a(struct kvm_s390_sie_block *, u64 *); > extern char sie_exit; > > +extern int kvm_s390_gisc_register(struct kvm *kvm, u32 gisc); > +extern int kvm_s390_gisc_unregister(struct kvm *kvm, u32 gisc); > + > static inline void kvm_arch_hardware_disable(void) {} > static inline void kvm_arch_check_processor_compat(void *rtn) {} > static inline void kvm_arch_sync_events(struct kvm *kvm) {} > diff --git a/arch/s390/kvm/interrupt.c b/arch/s390/kvm/interrupt.c > index 5a54360cecfe..1cc3ad2e6c7e 100644 > --- a/arch/s390/kvm/interrupt.c > +++ b/arch/s390/kvm/interrupt.c > @@ -229,6 +229,25 @@ static inline u8 int_word_to_isc(u32 int_word) > */ > #define IPM_BIT_OFFSET (offsetof(struct kvm_s390_gisa, ipm) * BITS_PER_BYTE) > > +static inline int set_iam(struct kvm_s390_gisa *gisa, u8 iam) > +{ > + u64 word0, _word0; > + > + do { > + word0 = READ_ONCE(gisa->u64.word[0]); > + /* If the GISA is in the alert list, do nothing. */ > + if ((u64)gisa != word0 >> 32) > + return -EBUSY; In kvm_s390_gisa_clear() you do: + nullify_gisa(kvm->arch.gisa); + set_iam(kvm->arch.gisa, kvm->arch.iam); IIUC this call to set_iam() will always fail. > + /* > + * Try to set the IAM or loop, if the IPM has changed > + * or the GISA has been inserted into the alert list. > + */ > + _word0 = (word0 & ~0xffUL) | iam; > + } while (cmpxchg(&gisa->u64.word[0], word0, _word0) != _word0); > + > + return 0; > +} > + > static inline void set_ipm_gisc(struct kvm_s390_gisa *gisa, u32 gisc) > { > set_bit_inv(IPM_BIT_OFFSET + gisc, (unsigned long *) gisa); > @@ -2917,6 +2936,8 @@ void kvm_s390_gisa_init(struct kvm *kvm) > if (!css_general_characteristics.aiv) > return; > kvm->arch.gisa = &kvm->arch.sie_page2->gisa; > + kvm->arch.iam = 0; > + spin_lock_init(&kvm->arch.iam_ref_lock); > nullify_gisa(kvm->arch.gisa); > kvm->arch.gib_in_use = !!gib; > VM_EVENT(kvm, 3, "gisa 0x%pK initialized", kvm->arch.gisa); > @@ -2929,6 +2950,51 @@ void kvm_s390_gisa_destroy(struct kvm *kvm) > kvm->arch.gisa = NULL; > } > > +int kvm_s390_gisc_register(struct kvm *kvm, u32 gisc) > +{ > + if (!kvm->arch.gib_in_use) > + return -ENODEV; > + if (gisc > MAX_ISC) > + return -ERANGE; > + > + spin_lock(&kvm->arch.iam_ref_lock); > + if (kvm->arch.iam_ref_count[gisc] == 0) > + kvm->arch.iam |= 0x80 >> gisc; > + kvm->arch.iam_ref_count[gisc]++; > + if (kvm->arch.iam_ref_count[gisc] == 1) > + set_iam(kvm->arch.gisa, kvm->arch.iam); testing the set_iam return value? Even it should be fine if the caller works correctly, this is done before GISA is ever used. > + spin_unlock(&kvm->arch.iam_ref_lock); > + > + return gib->nisc; > +} > +EXPORT_SYMBOL_GPL(kvm_s390_gisc_register); > + > +int kvm_s390_gisc_unregister(struct kvm *kvm, u32 gisc) > +{ > + int rc = 0; > + > + if (!kvm->arch.gib_in_use) > + return -ENODEV; > + if (gisc > MAX_ISC) > + return -ERANGE; > + > + spin_lock(&kvm->arch.iam_ref_lock); > + if (kvm->arch.iam_ref_count[gisc] == 0) { > + rc = -EINVAL; > + goto out; > + } > + kvm->arch.iam_ref_count[gisc]--; > + if (kvm->arch.iam_ref_count[gisc] == 0) { > + kvm->arch.iam &= ~(0x80 >> gisc); > + set_iam(kvm->arch.gisa, kvm->arch.iam); > + } > +out: > + spin_unlock(&kvm->arch.iam_ref_lock); > + > + return rc; > +} > +EXPORT_SYMBOL_GPL(kvm_s390_gisc_unregister); > + > void kvm_s390_gib_destroy(void) > { > if (!gib) > -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany