[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7a1fa398-3304-cb30-10c0-83e12ac9e8ac@linux.ibm.com>
Date: Mon, 24 Jan 2022 10:28:15 -0500
From: Matthew Rosato <mjrosato@...ux.ibm.com>
To: Pierre Morel <pmorel@...ux.ibm.com>, linux-s390@...r.kernel.org
Cc: alex.williamson@...hat.com, cohuck@...hat.com,
schnelle@...ux.ibm.com, farman@...ux.ibm.com,
borntraeger@...ux.ibm.com, hca@...ux.ibm.com, gor@...ux.ibm.com,
gerald.schaefer@...ux.ibm.com, agordeev@...ux.ibm.com,
frankja@...ux.ibm.com, david@...hat.com, imbrenda@...ux.ibm.com,
vneethv@...ux.ibm.com, oberpar@...ux.ibm.com, freude@...ux.ibm.com,
thuth@...hat.com, pasic@...ux.ibm.com, kvm@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2 17/30] KVM: s390: mechanism to enable guest zPCI
Interpretation
On 1/24/22 9:24 AM, Pierre Morel wrote:
>
>
> On 1/14/22 21:31, Matthew Rosato wrote:
>> The guest must have access to certain facilities in order to allow
>> interpretive execution of zPCI instructions and adapter event
>> notifications. However, there are some cases where a guest might
>> disable interpretation -- provide a mechanism via which we can defer
>> enabling the associated zPCI interpretation facilities until the guest
>> indicates it wishes to use them.
>>
>> Signed-off-by: Matthew Rosato <mjrosato@...ux.ibm.com>
>> ---
>> arch/s390/include/asm/kvm_host.h | 4 ++++
>> arch/s390/kvm/kvm-s390.c | 40 ++++++++++++++++++++++++++++++++
>> arch/s390/kvm/kvm-s390.h | 10 ++++++++
>> 3 files changed, 54 insertions(+)
>>
>> diff --git a/arch/s390/include/asm/kvm_host.h
>> b/arch/s390/include/asm/kvm_host.h
>> index 3f147b8d050b..38982c1de413 100644
>> --- a/arch/s390/include/asm/kvm_host.h
>> +++ b/arch/s390/include/asm/kvm_host.h
>> @@ -252,7 +252,10 @@ struct kvm_s390_sie_block {
>> #define ECB2_IEP 0x20
>> #define ECB2_PFMFI 0x08
>> #define ECB2_ESCA 0x04
>> +#define ECB2_ZPCI_LSI 0x02
>> __u8 ecb2; /* 0x0062 */
>> +#define ECB3_AISI 0x20
>> +#define ECB3_AISII 0x10
>> #define ECB3_DEA 0x08
>> #define ECB3_AES 0x04
>> #define ECB3_RI 0x01
>> @@ -938,6 +941,7 @@ struct kvm_arch{
>> int use_cmma;
>> int use_pfmfi;
>> int use_skf;
>> + int use_zpci_interp;
>> int user_cpu_state_ctrl;
>> int user_sigp;
>> int user_stsi;
>> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c
>> index ab8b56deed11..b6c32fc3b272 100644
>> --- a/arch/s390/kvm/kvm-s390.c
>> +++ b/arch/s390/kvm/kvm-s390.c
>> @@ -1029,6 +1029,44 @@ static int kvm_s390_vm_set_crypto(struct kvm
>> *kvm, struct kvm_device_attr *attr)
>> return 0;
>> }
>> +static void kvm_s390_vcpu_pci_setup(struct kvm_vcpu *vcpu)
>> +{
>> + /* Only set the ECB bits after guest requests zPCI interpretation */
>> + if (!vcpu->kvm->arch.use_zpci_interp)
>> + return;
>> +
>> + vcpu->arch.sie_block->ecb2 |= ECB2_ZPCI_LSI;
>> + vcpu->arch.sie_block->ecb3 |= ECB3_AISII + ECB3_AISI;
>
> As far as I understood, the interpretation is only possible if a gisa
> designation is associated with the PCI function via CLP enable.
>
This is true. Once ECB is enabled, you must have either a SHM bit on
for emulated device support or SHM bits off + a GISA designation
registered for interpretation. Otherwise, PCI instructions will fail.
> Why do we setup the SIE ECB only when the guest requests for
> interpretation and not systematically in vcpu_setup?
Once the ECB is enabled for a guest, emulated device FHs must have a SHM
bit in order to continue working properly (so do passthrough devices
that don't setup interpretation). This was not a requirement before
this series -- simply having the ECB bit off would ensure intercepts for
all devices regardless of SHM bit settings, so by doing an opt-in once
the guest indicates it will be doing interpretation we can preserve
backwards-compatibility with an initial mode where SHM bits are not
necessarily required. However once userspace indicates it understands
interpretation, we can assume it is will also use SHM bits properly.
>
> If ECB2_ZPCI_LSI, ECB3_AISII or ECB3_AISI have an effect when the gisa
> designation is not specified shouldn't we have a way to clear these bits?
>
I'm not sure that's necessary -- The idea here was for the userspace to
indicate 1) that it knows how to setup for interpreted devices and 2)
that it has a guest that wants to use at least 1 interpreted device.
Once we know that userspace understands how to manage interpreted
devices (implied by its use of these new vfio feature ioctls) I think it
should be OK to leave these bits on and expect userspace to always do
the appropriate steps (SHM bits for emulated devices / forced intercept
passthrough devices, GISA designation for interpreted devices).
Powered by blists - more mailing lists