From patchwork Fri Nov 30 14:32:05 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michael Mueller X-Patchwork-Id: 10706411 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 39EEE14E2 for ; Fri, 30 Nov 2018 14:32:30 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 2998530172 for ; Fri, 30 Nov 2018 14:32:30 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 2698830188; Fri, 30 Nov 2018 14:32:30 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.9 required=2.0 tests=BAYES_00,MAILING_LIST_MULTI, RCVD_IN_DNSWL_HI autolearn=ham version=3.3.1 Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 9778A30182 for ; Fri, 30 Nov 2018 14:32:29 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726645AbeLABl6 (ORCPT ); Fri, 30 Nov 2018 20:41:58 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:52524 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726127AbeLABl6 (ORCPT ); Fri, 30 Nov 2018 20:41:58 -0500 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id wAUESlSN106898 for ; Fri, 30 Nov 2018 09:32:27 -0500 Received: from e06smtp04.uk.ibm.com (e06smtp04.uk.ibm.com [195.75.94.100]) by mx0a-001b2d01.pphosted.com with ESMTP id 2p35vckpvq-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 30 Nov 2018 09:32:26 -0500 Received: from localhost by e06smtp04.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 30 Nov 2018 14:32:24 -0000 Received: from b06cxnps3074.portsmouth.uk.ibm.com (9.149.109.194) by e06smtp04.uk.ibm.com (192.168.101.134) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Fri, 30 Nov 2018 14:32:22 -0000 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps3074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id wAUEWLBq57737280 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Fri, 30 Nov 2018 14:32:21 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id F221D4C04E; Fri, 30 Nov 2018 14:32:20 +0000 (GMT) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id A0BBB4C059; Fri, 30 Nov 2018 14:32:20 +0000 (GMT) Received: from s38lp84.lnxne.boe (unknown [9.152.108.100]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Fri, 30 Nov 2018 14:32:20 +0000 (GMT) From: Michael Mueller To: KVM Mailing List , Linux-S390 Mailing List Cc: Martin Schwidefsky , Heiko Carstens , Christian Borntraeger , Janosch Frank , David Hildenbrand , Cornelia Huck , Halil Pasic , Pierre Morel , Michael Mueller Subject: [PATCH v4 00/10] KVM: s390: make use of the GIB Date: Fri, 30 Nov 2018 15:32:05 +0100 X-Mailer: git-send-email 2.13.4 X-TM-AS-GCONF: 00 x-cbid: 18113014-0016-0000-0000-0000022F2663 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18113014-0017-0000-0000-0000328790F2 Message-Id: <20181130143215.69496-1-mimu@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-11-30_06:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=705 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1811300124 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP The Guest Information Area (GIB) and its mechanics is part of the AIV facility. It provides hardware support to process Adapter Interruptions (AI) for pagable storage mode guests. Whenever a guest cannot process an AI because none of its vcpus is running in SIE context, a GIB alert interruption is sent to and handled by the host program to dispatch a vcpu of the respective guest. Eventually, the AI is handled by the guest. v3->v4: The central change of v4 is that the metric "vcpus_in_sie" has been dropped. A least agressive IAM restore strategy is being followed now. The consequence is that potentially more GAL interruptions are to be handled by the host program. The assuption as made that as soon the first vcpu is trying to go into wait state, this could be the last vcpu being open for I/O interruptions. Thus, to not loose the initiative to deliver I/O interruptions as soon as possible, the IAM is restored. Adding better heuristics can be done in future. I expect this to be the last version of the series. patch 01/12: Kernel msg now printed when FLIC fails to register during arch inititialization. patch 03/12: Commit message slightly changed with the hint that gib initialization is called by last patch of this serias. patch 09/12: IAM now restored during kvm_s390_handle_wait() patch 10/12: gib destroy case now handled upon unsuccessful arch inititialization. All other patches are unchanged. v2->v3: patch 01/12: Fixes a resource dealocation issue upon unsuccessful exit from kvm_arch_init(). It is relevant for patch 11/12 as well. patch 08/12: The function process_gib_alert_list() has been rewritten to reduce the number of GAL interruptions on the host for many guest scenarios. patch 10/12: The IAM is now never cleared before SIE entry. It will be cleared by millicode as soon the first guest interruption is made pending and not directly processed in SIE. The IAM gets restored as soon a vm is idle, i.e. no vcpu of that guest is in SIE context anymore. patch 11/12: now integrates with new patch 01/12 patch 12/12: This patch is just experimental and shall not be part of the final series. The first patch of series v2: "leave AIs in IPM of GISA during vcpu_pre_run()" has been dropped. All other patches are unchanged. v1->v2: patch 01/12: New patch. Tt can go also standalone without the rest of the GIB series presented here but is a requirement patch 03/12: kvm_s390_gib_init() now has a return code patch 06/12: unlink_gib_alert_list() now uses cmpxchg() instead of atomic_xchg() patch 08/12: New patch. Foctors out __find_vcpu_for_floating_irq() patch 09/12: process_gib_alert_list() has been simplified the GISA clear/destroy cases have been removed patch 11/12: kvm_s390_gisa_clear/destroy() now clear the IAM and process the alert list directly The IAM now gets restored in vcpu_post_run() only if the GISA is not in alert list patch 12/12: during kvm_arch_init() now the return code of kvm_s390_gib_init() is honored. All other patches are unchanged. Michael Mueller (10): KVM: s390: unregister debug feature on failing arch init s390/cio: add function chsc_sgib() KVM: s390: add the GIB and its related life-cyle functions KVM: s390: factor out nullify_gisa() KVM: s390: add kvm reference to struct sie_page2 KVM: s390: factor out __find_vcpu_for_floating_irq() KVM: s390: add function process_gib_alert_list() KVM: s390: add functions to (un)register GISC with GISA KVM: s390: add and wire function gib_alert_irq_handler() KVM: s390: start using the GIB Documentation/kmsg/s390/kvm | 24 +++++ arch/s390/include/asm/cio.h | 1 + arch/s390/include/asm/irq.h | 1 + arch/s390/include/asm/isc.h | 1 + arch/s390/include/asm/kvm_host.h | 19 +++- arch/s390/kernel/irq.c | 1 + arch/s390/kvm/interrupt.c | 214 +++++++++++++++++++++++++++++++++++++-- arch/s390/kvm/kvm-s390.c | 27 ++++- arch/s390/kvm/kvm-s390.h | 7 ++ drivers/s390/cio/chsc.c | 37 +++++++ drivers/s390/cio/chsc.h | 1 + 11 files changed, 318 insertions(+), 15 deletions(-) create mode 100644 Documentation/kmsg/s390/kvm