Received: by 10.223.164.202 with SMTP id h10csp2225055wrb; Thu, 16 Nov 2017 11:24:24 -0800 (PST) X-Google-Smtp-Source: AGs4zMaol4l6IiAujrEVbZBm+jwzChmks1foi2KSUh3McZxtk5tkTUECjoAEHJINVwB3w5sJAAWg X-Received: by 10.99.55.30 with SMTP id e30mr2644603pga.156.1510860264703; Thu, 16 Nov 2017 11:24:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1510860264; cv=none; d=google.com; s=arc-20160816; b=i9/3HK43b2R0/pFJhswwLn6ZFugD/mO5foMFPikQ9sDW+1NsRwaAOqUjGIvuoBH4jV d3hUm7X+/Pt+RjdCChguRgwKP6Iqgc1tA9aKBcEAkkd9jHA1ZSrRtmeyCRPg+HMeCCi9 rIaeRosZ15Ozb5jLYbxlw0v3dZH0sCGItbWNExPQUIHI9V3PkaXilqSgabUD53utgPcf GUBF9gBQiPHLUTE6TnfhK0p1a8N510EixWefY1KznPirPnt/LwSJaxEjYgDHdkuOEOeT 8Nzq9bVtVaPZ0UmDRWTN2kjQgxIkLMPzskTD+CZ0T8IwkRpUojEAalsp1ENkxFl0E036 c1ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:arc-authentication-results; bh=qQbqrtt1h9DCOBJj89/ND9R/Y8+GlpyBmJqEcniRFak=; b=Y2db85c5ZH4mgEZ89BtG5p+PWnDST4SBB0TJGR0L89JyWLMrzmtiX4f1zRMpmVjJYs o9oSwFa2ynZ/9E/rmTUKVYX3D5IEfwGes5KKobArqlHdYnKc2p4Gw0rGbis4MdKLtLN7 UkmoqAFz0BsmiABM4AWGL8ExRtjjIu/sQsjLYH1Mob97X4515Ivl9REO7J2vLqbAitGt vlhzPD2Z1Q166UkzbAx3A2H8mi9cQR/IddYv2r4/Uiaz+n3AIa4e069iSRCZkExJjSO5 wxOuL+ofmVwfXAnMP0eqDDseVH3wU7ispoV4sih4w/9VdWgivLNS7huEbSBo2SALIhJE mjBg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a2si1362796plt.229.2017.11.16.11.24.11; Thu, 16 Nov 2017 11:24:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935894AbdKPQHR (ORCPT + 91 others); Thu, 16 Nov 2017 11:07:17 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:45506 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933317AbdKPQHK (ORCPT ); Thu, 16 Nov 2017 11:07:10 -0500 Received: from pps.filterd (m0098420.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id vAGG66In005302 for ; Thu, 16 Nov 2017 11:07:09 -0500 Received: from e06smtp10.uk.ibm.com (e06smtp10.uk.ibm.com [195.75.94.106]) by mx0b-001b2d01.pphosted.com with ESMTP id 2e9csc42qq-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Thu, 16 Nov 2017 11:07:07 -0500 Received: from localhost by e06smtp10.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 16 Nov 2017 16:07:03 -0000 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp10.uk.ibm.com (192.168.101.140) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Thu, 16 Nov 2017 16:06:59 -0000 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id vAGG6xXS11665450; Thu, 16 Nov 2017 16:06:59 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7F7D8A4065; Thu, 16 Nov 2017 16:01:49 +0000 (GMT) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id ABF94A405E; Thu, 16 Nov 2017 16:01:48 +0000 (GMT) Received: from [9.145.170.243] (unknown [9.145.170.243]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 16 Nov 2017 16:01:48 +0000 (GMT) Subject: Re: [RFC 00/19] KVM: s390/crypto/vfio: guest dedicated crypto adapters To: Tony Krowiak , Cornelia Huck Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, qemu-s390x@nongnu.org, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com References: <1507916344-3896-1-git-send-email-akrowiak@linux.vnet.ibm.com> <5baf5f90-6cac-3c09-7b66-1bc8b30b8093@linux.vnet.ibm.com> <20171114145722.4ab850a5.cohuck@redhat.com> From: Pierre Morel Date: Thu, 16 Nov 2017 17:06:58 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 17111616-0040-0000-0000-000003EF221F X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17111616-0041-0000-0000-000025F1DC37 Message-Id: <8a492b07-3d3b-f4cf-e139-7de345ea8188@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-11-16_06:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1711160217 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 16/11/2017 16:23, Tony Krowiak wrote: > On 11/14/2017 08:57 AM, Cornelia Huck wrote: >> On Tue, 31 Oct 2017 15:39:09 -0400 >> Tony Krowiak wrote: >> >>> On 10/13/2017 01:38 PM, Tony Krowiak wrote: >>> Ping >>>> Tony Krowiak (19): >>>>     KVM: s390: SIE considerations for AP Queue virtualization >>>>     KVM: s390: refactor crypto initialization >>>>     s390/zcrypt: new AP matrix bus >>>>     s390/zcrypt: create an AP matrix device on the AP matrix bus >>>>     s390/zcrypt: base implementation of AP matrix device driver >>>>     s390/zcrypt: register matrix device with VFIO mediated device >>>>       framework >>>>     KVM: s390: introduce AP matrix configuration interface >>>>     s390/zcrypt: support for assigning adapters to matrix mdev >>>>     s390/zcrypt: validate adapter assignment >>>>     s390/zcrypt: sysfs interfaces supporting AP domain assignment >>>>     s390/zcrypt: validate domain assignment >>>>     s390/zcrypt: sysfs support for control domain assignment >>>>     s390/zcrypt: validate control domain assignment >>>>     KVM: s390: Connect the AP mediated matrix device to KVM >>>>     s390/zcrypt: introduce ioctl access to VFIO AP Matrix driver >>>>     KVM: s390: interface to configure KVM guest's AP matrix >>>>     KVM: s390: validate input to AP matrix config interface >>>>     KVM: s390: New ioctl to configure KVM guest's AP matrix >>>>     s390/facilities: enable AP facilities needed by guest >> I think the approach is fine, and the code also looks fine for the most >> part. Some comments: >> >> - various patches can be squashed together to give a better >>    understanding at a glance > Which patches would you squash? >> - this needs documentation (as I already said) > My plan is to take the cover letter patch and incorporate that into > documentation, > then replace the cover letter patch with a more concise summary. >> - some of the driver/device modelling feels a bit awkward (commented in >>    patches) -- I'm not sure that my proposal is better, but I think we >>    should make sure the interdependencies are modeled correctly > I am responding to each patch review individually. I think that instead of responding to each patch individually we should have a discussion on the design because I think a lot could change and discussing about each patch as they may be completely redesigned for the next version may not be very useful. So I totally agree with Conny on that we should stabilize the bus/device/driver modeling. I think it would be here a good place to start the discussion on things like we started to discuss, Harald and I, off-line: - why a matrix bus, in which case we can avoid it - which kind of devices we need - how to handle the repartition of queues on boot, reset and hotplug - interaction with the host drivers - validation of the matrix for guests and host views or even features we need to add like - interruptions - PAPQ/TAPQ-t and APQI interception - virtualization of the AP - CPU model and KVM capabilities In my understanding these points must be cleared before we really start to discuss the details of the implementation. Best regards, Pierre >> - some minor stuff >> > -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany From 1584242961743836738@xxx Thu Nov 16 17:03:43 +0000 2017 X-GM-THRID: 1581165300547546289 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread