Received: by 2002:a05:6a10:7420:0:0:0:0 with SMTP id hk32csp1890446pxb; Fri, 18 Feb 2022 18:43:28 -0800 (PST) X-Google-Smtp-Source: ABdhPJxEULtVqxgJplDJHih5fXVj3oXaU5mYKmfvXZ3MCyV7+sSWhnZ4l7T85X2t1q2McVl+Ea8z X-Received: by 2002:a05:6a00:140f:b0:4e0:6995:9c48 with SMTP id l15-20020a056a00140f00b004e069959c48mr10320403pfu.59.1645238608676; Fri, 18 Feb 2022 18:43:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1645238608; cv=none; d=google.com; s=arc-20160816; b=PimYOz2vIDnUwD2Bw07vJeFduzHPxrcWA/zLkeUzOWECtfGa9Yn6yAWnYmZ7GyhCWO a/HqKaywgg04wPa+M1JNb0Gf0Cb7QufPT5ft4sJUeiHLUjPIXctkoPDvO5sta3qjfOYt 9nfPzxQftP6nYBX5MiDiEhZTrRcEulNemj4woNkhU3vJiik3MSxgrcuEYnCJlZ3imm6M n+I4XBjsMKjoiWW7sFTbBJpX9nF75Ca7oah24ZVCRIZbHJ1t8ccZ1K22hI6b9wjI1DX1 7Y97oAtIyKCKyg26btbtLcIusHe19mOWv243UDiFhwTWRFnx35jhXYhKJsO/BqAA7RSa 2XsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id:dkim-signature; bh=ZxRY0B/GLKI+WQEXdWRioyRd2m5GmW9+c13u4WU9w7o=; b=e8HkXJDXlbvPs9Ah62WKiyBY+BnS4RNreNxQ/FZyFxdoRyrP/OtgEefBPhcHIp+JQZ g0hsdCSk3/RGP5JKjVnQYRSHF6HoO6GqqJK69j9W6wRpnvmbciCNzqrik5VUQuAOnRfw Iour77RVDjMtymrdHiBhb6AbKQk+/ziHxByiYNFvzSkzUgMGuyyI4L4Srlrulw/jWWIA mnDQ7Tu16hn2iC4AvsRa9I0QPmwm/Bjz2/+wv+E5fRsXaCE95oBSJd5EsBI6ojJQHWrh jFibYabjrYTX/ayfIZKJBjZ4uERNrMhuNIJFcJb9luke0SuFxGeJRxKpgCmrUB/2fjt6 fDdg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=miYyaBHk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n9si28558456plc.434.2022.02.18.18.43.12; Fri, 18 Feb 2022 18:43:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=miYyaBHk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239164AbiBRSWr (ORCPT + 99 others); Fri, 18 Feb 2022 13:22:47 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:46222 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239148AbiBRSWo (ORCPT ); Fri, 18 Feb 2022 13:22:44 -0500 Received: from mx0b-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com [148.163.158.5]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ED1BA40913; Fri, 18 Feb 2022 10:22:26 -0800 (PST) Received: from pps.filterd (m0098421.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 21IHcG7X015339; Fri, 18 Feb 2022 18:22:25 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : date : mime-version : subject : from : to : cc : references : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=ZxRY0B/GLKI+WQEXdWRioyRd2m5GmW9+c13u4WU9w7o=; b=miYyaBHkWSM57bWSJwCHTAKjr3pHfFBUqzPPJbwy4vXddNUHjhP/Wg1tHVtpSpR7udPn KmlCw59knDFAyX9CoMniGp6QL5OHiLB5Keq1jPBiWjO8PxKPC0sw2hMDmClDLUrETo9u a41FuLwxJEWf4UyD+tXWdV+foov1THsi1R7iEpKQbCbvvIK5LrzPmxYoDHwxwyT+2vX8 Q+QsI70VhLcrSqymPJ8rLI3ul29Tr8kAWDt7cIcPq1v7YT4GZ/oCz/vQ5vi1q9iZqg1v bEsrfZAoArpKH/gwsxK6p47+psh/01BxOhCF9+UxlY0t5JY6c/oYKpKhbi9MHBQfXsyD 3Q== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 3eaersu2pq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 18 Feb 2022 18:22:25 +0000 Received: from m0098421.ppops.net (m0098421.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 21IIDlel017760; Fri, 18 Feb 2022 18:22:24 GMT Received: from ppma06ams.nl.ibm.com (66.31.33a9.ip4.static.sl-reverse.com [169.51.49.102]) by mx0a-001b2d01.pphosted.com with ESMTP id 3eaersu2p7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 18 Feb 2022 18:22:24 +0000 Received: from pps.filterd (ppma06ams.nl.ibm.com [127.0.0.1]) by ppma06ams.nl.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 21IIHuTE000939; Fri, 18 Feb 2022 18:22:23 GMT Received: from b06avi18878370.portsmouth.uk.ibm.com (b06avi18878370.portsmouth.uk.ibm.com [9.149.26.194]) by ppma06ams.nl.ibm.com with ESMTP id 3e645kkxvk-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 18 Feb 2022 18:22:22 +0000 Received: from b06wcsmtp001.portsmouth.uk.ibm.com (b06wcsmtp001.portsmouth.uk.ibm.com [9.149.105.160]) by b06avi18878370.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 21IIMJuI44630520 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 18 Feb 2022 18:22:19 GMT Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id CBA3EA405F; Fri, 18 Feb 2022 18:22:19 +0000 (GMT) Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2AD5EA405B; Fri, 18 Feb 2022 18:22:19 +0000 (GMT) Received: from [9.171.4.84] (unknown [9.171.4.84]) by b06wcsmtp001.portsmouth.uk.ibm.com (Postfix) with ESMTP; Fri, 18 Feb 2022 18:22:19 +0000 (GMT) Message-ID: <580e5da7-f731-417f-0cc2-baf2313ac6d6@linux.ibm.com> Date: Fri, 18 Feb 2022 19:24:33 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.3.0 Subject: Re: [PATCH v7 1/1] s390x: KVM: guest support for topology function Content-Language: en-US From: Pierre Morel To: Janosch Frank , Nico Boehr , kvm@vger.kernel.org Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, borntraeger@de.ibm.com, cohuck@redhat.com, david@redhat.com, thuth@redhat.com, imbrenda@linux.ibm.com, hca@linux.ibm.com, gor@linux.ibm.com, wintera@linux.ibm.com, seiden@linux.ibm.com References: <20220217095923.114489-1-pmorel@linux.ibm.com> <20220217095923.114489-2-pmorel@linux.ibm.com> <97af6268-ff7a-cfb6-5ea4-217b5162cfe7@linux.ibm.com> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: wBtQQMj0DrEulaK-91_HsNRfwYcRC_bw X-Proofpoint-GUID: OPxhDUnk60sPFMSrTooknocCRU3OZUW4 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-02-18_07,2022-02-18_01,2021-12-02_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 mlxscore=0 spamscore=0 clxscore=1015 bulkscore=0 lowpriorityscore=0 impostorscore=0 suspectscore=0 priorityscore=1501 malwarescore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202180111 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_MSPIKE_H5, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/18/22 18:27, Pierre Morel wrote: > > > On 2/18/22 15:28, Janosch Frank wrote: >> On 2/18/22 14:13, Pierre Morel wrote: >>> >>> >>> On 2/17/22 18:17, Nico Boehr wrote: >>>> On Thu, 2022-02-17 at 10:59 +0100, Pierre Morel wrote: >>>> [...] >>>>> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c >>>>> index 2296b1ff1e02..af7ea8488fa2 100644 >>>>> --- a/arch/s390/kvm/kvm-s390.c >>>>> +++ b/arch/s390/kvm/kvm-s390.c >>>> [...] >> >> Why is there no interface to clear the SCA_UTILITY_MTCR on a subsystem >> reset? > > Right, I had one in my first version based on interception but I forgot > to implement an equivalent for KVM as I modified the implementation for > interpretation. > I will add this. > >> >> >>>>> -void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu) >>>>> +/** >>>>> + * kvm_s390_vcpu_set_mtcr >>>>> + * @vcp: the virtual CPU >>>>> + * >>>>> + * Is only relevant if the topology facility is present. >>>>> + * >>>>> + * Updates the Multiprocessor Topology-Change-Report to signal >>>>> + * the guest with a topology change. >>>>> + */ >>>>> +static void kvm_s390_vcpu_set_mtcr(struct kvm_vcpu *vcpu) >>>>>    { >>>>> +       struct esca_block *esca = vcpu->kvm->arch.sca; >>>> >>>> utility is at the same offset for the bsca and the esca, still >>>> wondering whether it is a good idea to assume esca here... >>> >>> We can take bsca to be coherent with the include file where we define >>> ESCA_UTILITY_MTCR inside the bsca. >>> And we can rename the define to SCA_UTILITY_MTCR as it is common for >>> both BSCA and ESCA the (E) is too much. >> >> Yes and maybe add a comment that it's at the same offset for esca so >> there won't come up further questions in the future. > > OK > >> >>> >>>> >>>> [...] >>>>> diff --git a/arch/s390/kvm/kvm-s390.h b/arch/s390/kvm/kvm-s390.h >>>>> index 098831e815e6..af04ffbfd587 100644 >>>>> --- a/arch/s390/kvm/kvm-s390.h >>>>> +++ b/arch/s390/kvm/kvm-s390.h >>>>> @@ -503,4 +503,29 @@ void kvm_s390_vcpu_crypto_reset_all(struct kvm >>>>> *kvm); >>>>>     */ >>>>>    extern unsigned int diag9c_forwarding_hz; >>>>> +#define S390_KVM_TOPOLOGY_NEW_CPU -1 >>>>> +/** >>>>> + * kvm_s390_topology_changed >>>>> + * @vcpu: the virtual CPU >>>>> + * >>>>> + * If the topology facility is present, checks if the CPU toplogy >>>>> + * viewed by the guest changed due to load balancing or CPU hotplug. >>>>> + */ >>>>> +static inline bool kvm_s390_topology_changed(struct kvm_vcpu *vcpu) >>>>> +{ >>>>> +       if (!test_kvm_facility(vcpu->kvm, 11)) >>>>> +               return false; >>>>> + >>>>> +       /* A new vCPU has been hotplugged */ >>>>> +       if (vcpu->arch.prev_cpu == S390_KVM_TOPOLOGY_NEW_CPU) >>>>> +               return true; >>>>> + >>>>> +       /* The real CPU backing up the vCPU moved to another socket >>>>> */ >>>>> +       if (topology_physical_package_id(vcpu->cpu) != >>>>> +           topology_physical_package_id(vcpu->arch.prev_cpu)) >>>>> +               return true; >>>> >>>> Why is it OK to look just at the physical package ID here? What if the >>>> vcpu for example moves to a different book, which has a core with the >>>> same physical package ID? >> >> I'll need to look up stsi 15* output to understand this. >> But the architecture states that any change to the stsi 15 output sets >> the change bit so I'd guess Nico is correct. >> > > Yes, Nico is correct, as I already answered, however it is not any > change of stsi(15) but a change of stsi(15.1.2) output which sets the > change bit. hum, that is what the POP says but in fact you are right a change of topology that changes the output of any STSI(15) sets the topology change report bit as the output of STSI(15.1.2) would be changed too obviously. Regards, Pierre -- Pierre Morel IBM Lab Boeblingen