Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp262487pxv; Thu, 15 Jul 2021 03:48:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw8kTUefQWwZwRg3MSCer65Y5J3wCciknhek6y9My96AA5DPmsafyEO5U54uezrjoNTYu1l X-Received: by 2002:a17:906:1355:: with SMTP id x21mr61784ejb.216.1626346127795; Thu, 15 Jul 2021 03:48:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626346127; cv=none; d=google.com; s=arc-20160816; b=Tkg0mUh19T7cKBF+RJY6gbkCbi42WSiQwDVM5jV3+Unwoxw/6UVCkpwbMCyTPNffnZ G0bHyGjaj0zAR/8f7qdOzJKt7F8GPO/EMAGOmPSAkymTnrONqIpU4FsmO1ZBbfquhnKM J/DTglQ62z4GLC8BzUam5mrEIB4aYoOFOVXLU2zqR+LsOwcf61RfIqq7hrqdALVppKnD ICQ3ZmcPekTlsox2n8LsRsdrjin36BBGyx9z3+ycFrIKQCyDq4CWYJ0eqN9lGbyeT++k wuejU68b13ixEahYVRzGV+OhbPx5iFm1vYjNOFu/J+ikCCycG5QpLHE91B3+cEAVxuL3 /0RQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:subject :organization:from:references:cc:to:dkim-signature; bh=5e2SYtP9pCzJ8Qy+YABmhjYddUS5OjmPwYSSqvCJPec=; b=EPDjzhX7uNlCJvB9HImw9iIg7WeJLaJ1iqC42z5tKiTW4t75vaahXCgQbQrjIOIFyQ dunZ/nrf3/SPaRBOhLQSVh6S8gCdmBcJJq8ufSEMCpnJO8KTqQ7eCQ1BwDw/qd4xszHN UvbYsNIQNjZF2+XTpLCWNbIp0CGE5AHlz1eD5ogwcfo5ksfqwlElmYjfJbzvkr0XEFHu qGeLbEHJ4g/YIHpcPaGFq7TcLgILQ9X4qWNEYTxirDjKFkbGmNbS9A0GM8wBnVnq0mJt /4rq4RigbFmlxsU1+lv7OLVkyOoheFowY7ENj2oWS8VjjCL7f5F2fenbPjh2lIKeuqra 0hqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ERsjy6rQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t19si6526648edw.210.2021.07.15.03.48.25; Thu, 15 Jul 2021 03:48:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ERsjy6rQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240612AbhGOIyC (ORCPT + 99 others); Thu, 15 Jul 2021 04:54:02 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:55611 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240581AbhGOIyB (ORCPT ); Thu, 15 Jul 2021 04:54:01 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1626339068; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=5e2SYtP9pCzJ8Qy+YABmhjYddUS5OjmPwYSSqvCJPec=; b=ERsjy6rQ+JRgKTNncjgMpYpyzVhYY279WILoE1PSqxe8EuQoynxqNByFsoYj8wQlXBdFOL huYFyDFdjUwSKvvPeNhs6npYe8MRE29SDIBMscrvAzhn3XgKZ9xsaKNtcsEX9PGkxmK//a og/OQrlz7nETIHApiwfP5rF0kW7wD0I= Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-226-eNHNFWcEO0iT63G6TWVGfg-1; Thu, 15 Jul 2021 04:51:06 -0400 X-MC-Unique: eNHNFWcEO0iT63G6TWVGfg-1 Received: by mail-wm1-f72.google.com with SMTP id d16-20020a1c73100000b02901f2d21e46efso1518105wmb.6 for ; Thu, 15 Jul 2021 01:51:06 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:cc:references:from:organization:subject :message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=5e2SYtP9pCzJ8Qy+YABmhjYddUS5OjmPwYSSqvCJPec=; b=qV58qN93+8oaZur/VnVqf/qnY+c8UBuzRbMP8I7y+6His7nOrhmR5CC9L703WUSL63 nvMfB5XAIIH1td3dBer1xPZ4KiGtDZcWQoLy4wZhm8w/4DrKq1zFd+9OnGod52V/ixZb eltygIBOqs8lA3RrzjFNu5rcWeyJ5tijuGUAj0TORAKrkpryYUwMwc2PsGSrGi9USyUg +LvmHoWamGtKeU06l/0272T3lx9hoEn6+TKayzQIRnYkqOdFo7ghre9PhKIAVaRI0vw9 u7lgsGXruVYzNQhfamf6gvIRM4io4MSIvUgXXVkOuJmCRg4fpVWJ6RHPIr29YvfEZU9t A+lQ== X-Gm-Message-State: AOAM533oFCwimBJ2CoPBH2I0QPZWh3e530320aMvfFORe8jy8CSQq1Y5 rxWY66zEW8SzN22oE4PVArlGvsIuY+Qk3Ki4h2mSAfqwKsLlqll+jmzYHXJkMYkmlTzq7upDU7g VoT5GytNEzbL/q6Rv4BINtpHo X-Received: by 2002:a1c:3c42:: with SMTP id j63mr3309656wma.35.1626339065614; Thu, 15 Jul 2021 01:51:05 -0700 (PDT) X-Received: by 2002:a1c:3c42:: with SMTP id j63mr3309617wma.35.1626339065284; Thu, 15 Jul 2021 01:51:05 -0700 (PDT) Received: from [192.168.3.132] (p4ff23bb3.dip0.t-ipconnect.de. [79.242.59.179]) by smtp.gmail.com with ESMTPSA id e15sm5515474wrp.29.2021.07.15.01.51.04 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 15 Jul 2021 01:51:04 -0700 (PDT) To: Pierre Morel , kvm@vger.kernel.org Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, borntraeger@de.ibm.com, frankja@linux.ibm.com, cohuck@redhat.com, thuth@redhat.com, imbrenda@linux.ibm.com, hca@linux.ibm.com, gor@linux.ibm.com References: <1626276343-22805-1-git-send-email-pmorel@linux.ibm.com> <1626276343-22805-2-git-send-email-pmorel@linux.ibm.com> From: David Hildenbrand Organization: Red Hat Subject: Re: [PATCH v1 1/2] s390x: KVM: accept STSI for CPU topology information Message-ID: Date: Thu, 15 Jul 2021 10:51:04 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <1626276343-22805-2-git-send-email-pmorel@linux.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 14.07.21 17:25, Pierre Morel wrote: > STSI(15.1.x) gives information on the CPU configuration topology. > Let's accept the interception of STSI with the function code 15 and > let the userland part of the hypervisor handle it. > > Signed-off-by: Pierre Morel > --- > arch/s390/kvm/priv.c | 11 ++++++++++- > 1 file changed, 10 insertions(+), 1 deletion(-) > > diff --git a/arch/s390/kvm/priv.c b/arch/s390/kvm/priv.c > index 9928f785c677..4ab5f8b7780e 100644 > --- a/arch/s390/kvm/priv.c > +++ b/arch/s390/kvm/priv.c > @@ -856,7 +856,7 @@ static int handle_stsi(struct kvm_vcpu *vcpu) > if (vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE) > return kvm_s390_inject_program_int(vcpu, PGM_PRIVILEGED_OP); > > - if (fc > 3) { > + if (fc > 3 && fc != 15) { > kvm_s390_set_psw_cc(vcpu, 3); > return 0; > } > @@ -893,6 +893,15 @@ static int handle_stsi(struct kvm_vcpu *vcpu) > goto out_no_data; > handle_stsi_3_2_2(vcpu, (void *) mem); > break; > + case 15: > + if (sel1 != 1 || sel2 < 2 || sel2 > 6) > + goto out_no_data; > + if (vcpu->kvm->arch.user_stsi) { > + insert_stsi_usr_data(vcpu, operand2, ar, fc, sel1, sel2); > + return -EREMOTE; > + } > + kvm_s390_set_psw_cc(vcpu, 3); > + return 0; > } > if (kvm_s390_pv_cpu_is_protected(vcpu)) { > memcpy((void *)sida_origin(vcpu->arch.sie_block), (void *)mem, > 1. Setting GPRS to 0 I was wondering why we have the "vcpu->run->s.regs.gprs[0] = 0;" for existing fc 1,2,3 in case we set cc=0. Looking at the doc, all I find is: "CC 0: Requested configuration-level number placed in general register 0 or requested SYSIB informa- tion stored" But I don't find where it states that we are supposed to set general register 0 to 0. Wouldn't we also have to do it for fc=15 or for none? If fc 1,2,3 and 15 are to be handled equally, I suggest the following: diff --git a/arch/s390/kvm/priv.c b/arch/s390/kvm/priv.c index 9928f785c677..6eb86fa58b0b 100644 --- a/arch/s390/kvm/priv.c +++ b/arch/s390/kvm/priv.c @@ -893,17 +893,23 @@ static int handle_stsi(struct kvm_vcpu *vcpu) goto out_no_data; handle_stsi_3_2_2(vcpu, (void *) mem); break; + case 15: + if (sel1 != 1 || sel2 < 2 || sel2 > 6) + goto out_no_data; + break; } - if (kvm_s390_pv_cpu_is_protected(vcpu)) { - memcpy((void *)sida_origin(vcpu->arch.sie_block), (void *)mem, - PAGE_SIZE); - rc = 0; - } else { - rc = write_guest(vcpu, operand2, ar, (void *)mem, PAGE_SIZE); - } - if (rc) { - rc = kvm_s390_inject_prog_cond(vcpu, rc); - goto out; + if (mem) { + if (kvm_s390_pv_cpu_is_protected(vcpu)) { + memcpy((void *)sida_origin(vcpu->arch.sie_block), + (void *)mem, PAGE_SIZE); + } else { + rc = write_guest(vcpu, operand2, ar, (void *)mem, + PAGE_SIZE); + if (rc) { + rc = kvm_s390_inject_prog_cond(vcpu, rc); + goto out; + } + } } if (vcpu->kvm->arch.user_stsi) { insert_stsi_usr_data(vcpu, operand2, ar, fc, sel1, sel2); 2. maximum-MNest facility " 1. If the maximum-MNest facility is installed and selector 2 exceeds the nonzero model-depen- dent maximum-selector-2 value." 2. If the maximum-MNest facility is not installed and selector 2 is not specified as two. " We will we be handling the presence/absence of the maximum-MNest facility (for our guest?) in QEMU, corect? I do wonder if we should just let any fc=15 go to user space let the whole sel1 / sel2 checking be handled there. I don't think it's a fast path after all. But no strong opinion. How do we identify availability of maximum-MNest facility? 3. User space awareness How can user space identify that we actually forward these intercepts? How can it enable them? The old KVM_CAP_S390_USER_STSI capability is not sufficient. I do wonder if we want KVM_CAP_S390_USER_STSI_15 or sth like that to change the behavior once enabled by user space. 4. Without vcpu->kvm->arch.user_stsi, we indicate cc=0 to our guest, also for fc 1,2,3. Is that actually what we want? (or do we simply not care because the guest is not supposed to use stsi?) -- Thanks, David / dhildenb