From patchwork Wed Nov 28 10:19:31 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Mueller X-Patchwork-Id: 10702261 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 620DC13A4 for ; Wed, 28 Nov 2018 10:20:15 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 5259E2CF77 for ; Wed, 28 Nov 2018 10:20:15 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 46AFA2CFA0; Wed, 28 Nov 2018 10:20:15 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 3B0DD2CF77 for ; Wed, 28 Nov 2018 10:20:12 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728336AbeK1VVT (ORCPT ); Wed, 28 Nov 2018 16:21:19 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:58786 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727751AbeK1VVT (ORCPT ); Wed, 28 Nov 2018 16:21:19 -0500 Received: from pps.filterd (m0098417.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id wASAJGkG106911 for ; Wed, 28 Nov 2018 05:20:09 -0500 Received: from e06smtp04.uk.ibm.com (e06smtp04.uk.ibm.com [195.75.94.100]) by mx0a-001b2d01.pphosted.com with ESMTP id 2p1qjv457w-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 28 Nov 2018 05:20:09 -0500 Received: from localhost by e06smtp04.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 28 Nov 2018 10:20:07 -0000 Received: from b06cxnps3075.portsmouth.uk.ibm.com (9.149.109.195) by e06smtp04.uk.ibm.com (192.168.101.134) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 28 Nov 2018 10:20:04 -0000 Received: from d06av21.portsmouth.uk.ibm.com (d06av21.portsmouth.uk.ibm.com [9.149.105.232]) by b06cxnps3075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id wASAK2Yb61276240 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 28 Nov 2018 10:20:02 GMT Received: from d06av21.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B46F852050; Wed, 28 Nov 2018 10:20:02 +0000 (GMT) Received: from s38lp84.lnxne.boe (unknown [9.152.108.100]) by d06av21.portsmouth.uk.ibm.com (Postfix) with ESMTP id 6FC2352059; Wed, 28 Nov 2018 10:20:02 +0000 (GMT) From: Michael Mueller To: KVM Mailing List , Linux-S390 Mailing List Cc: Martin Schwidefsky , Heiko Carstens , Christian Borntraeger , Janosch Frank , David Hildenbrand , Cornelia Huck , Halil Pasic , Pierre Morel , Michael Mueller Subject: [PATCH v3 00/12] KVM: s390: make use of the GIB Date: Wed, 28 Nov 2018 11:19:31 +0100 X-Mailer: git-send-email 2.13.4 X-TM-AS-GCONF: 00 x-cbid: 18112810-0016-0000-0000-0000022DE246 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18112810-0017-0000-0000-000032863F08 Message-Id: <20181128101943.155542-1-mimu@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-11-28_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=513 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1811280093 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP The Guest Information Area (GIB) and its mechanics is part of the AIV facility. It provides hardware support to process Adapter Interruptions (AI) for pagable storage mode guests. Whenever a guest cannot process an AI because none of its vcpus is running in SIE context, a GIB alert interruption is sent to and handled by the host program to dispatch a vcpu of the respective guest. Eventually, the AI is handled by the guest. v2->v3: patch 01/12: Fixes a resource dealocation issue upon unsuccessful exit from kvm_arch_init(). It is relevant for patch 11/12 as well. patch 08/12: The function process_gib_alert_list() has been rewritten to reduce the number of GAL interruptions on the host for many guest scenarios. patch 10/12: The IAM is now never cleared before SIE entry. It will be cleared by millicode as soon the first guest interruption is made pending and not directly processed in SIE. The IAM gets restored as soon a vm is idle, i.e. no vcpu of that guest is in SIE context anymore. patch 11/12: now integrates with new patch 01/12 patch 12/12: This patch is just experimental and shall not be part of the final series. The first patch of series v2: "leave AIs in IPM of GISA during vcpu_pre_run()" has been dropped. All other patches are unchanged. v1->v2: patch 01/12: New patch. Tt can go also standalone without the rest of the GIB series presented here but is a requirement patch 03/12: kvm_s390_gib_init() now has a return code patch 06/12: unlink_gib_alert_list() now uses cmpxchg() instead of atomic_xchg() patch 08/12: New patch. Foctors out __find_vcpu_for_floating_irq() patch 09/12: process_gib_alert_list() has been simplified the GISA clear/destroy cases have been removed patch 11/12: kvm_s390_gisa_clear/destroy() now clear the IAM and process the alert list directly The IAM now gets restored in vcpu_post_run() only if the GISA is not in alert list patch 12/12: during kvm_arch_init() now the return code of kvm_s390_gib_init() is honored. All other patches are unchanged. Michael Mueller (12): KVM: s390: unregister debug feature on failing arch init s390/cio: add function chsc_sgib() KVM: s390: add the GIB and its related life-cyle functions KVM: s390: factor out nullify_gisa() KVM: s390: add metric vcpus_in_sie to struct kvm_arch KVM: s390: add kvm reference to struct sie_page2 KVM: s390: factor out __find_vcpu_for_floating_irq() KVM: s390: add function process_gib_alert_list() KVM: s390: add functions to (un)register GISC with GISA KVM: s390: add and wire function gib_alert_irq_handler() KVM: s390: start using the GIB KVM: s390: allow to change the IAM clear strategy dynamically arch/s390/include/asm/cio.h | 1 + arch/s390/include/asm/irq.h | 1 + arch/s390/include/asm/isc.h | 1 + arch/s390/include/asm/kvm_host.h | 20 ++- arch/s390/kernel/irq.c | 1 + arch/s390/kvm/interrupt.c | 272 +++++++++++++++++++++++++++++++++++++-- arch/s390/kvm/kvm-s390.c | 31 ++++- arch/s390/kvm/kvm-s390.h | 8 ++ drivers/s390/cio/chsc.c | 37 ++++++ drivers/s390/cio/chsc.h | 1 + 10 files changed, 358 insertions(+), 15 deletions(-)