From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A17D9ECDE44 for ; Wed, 31 Oct 2018 18:13:07 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 766AC20664 for ; Wed, 31 Oct 2018 18:13:07 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 766AC20664 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.ibm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730096AbeKADMM (ORCPT ); Wed, 31 Oct 2018 23:12:12 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:57708 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730056AbeKADMM (ORCPT ); Wed, 31 Oct 2018 23:12:12 -0400 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w9VIA36L055396 for ; Wed, 31 Oct 2018 14:13:04 -0400 Received: from e06smtp05.uk.ibm.com (e06smtp05.uk.ibm.com [195.75.94.101]) by mx0a-001b2d01.pphosted.com with ESMTP id 2nfg7qbe1u-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 31 Oct 2018 14:13:04 -0400 Received: from localhost by e06smtp05.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 31 Oct 2018 18:13:01 -0000 Received: from b06cxnps3074.portsmouth.uk.ibm.com (9.149.109.194) by e06smtp05.uk.ibm.com (192.168.101.135) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 31 Oct 2018 18:12:59 -0000 Received: from d06av25.portsmouth.uk.ibm.com (d06av25.portsmouth.uk.ibm.com [9.149.105.61]) by b06cxnps3074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w9VICv0c59310314 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 31 Oct 2018 18:12:57 GMT Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B59F611C058; Wed, 31 Oct 2018 18:12:57 +0000 (GMT) Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 5490111C052; Wed, 31 Oct 2018 18:12:57 +0000 (GMT) Received: from morel-ThinkPad-W530.boeblingen.de.ibm.com (unknown [9.152.224.73]) by d06av25.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 31 Oct 2018 18:12:57 +0000 (GMT) From: Pierre Morel To: borntraeger@de.ibm.com Cc: alex.williamson@redhat.com, cohuck@redhat.com, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, kvm@vger.kernel.org, frankja@linux.ibm.com, akrowiak@linux.ibm.com, pasic@linux.ibm.com, david@redhat.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, freude@linux.ibm.com, mimu@linux.ibm.com Subject: [PATCH v1 0/7] s390: vfio: ap: Using GISA for AP Interrupt Date: Wed, 31 Oct 2018 19:12:50 +0100 X-Mailer: git-send-email 2.7.4 X-TM-AS-GCONF: 00 x-cbid: 18103118-0020-0000-0000-000002DDB505 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18103118-0021-0000-0000-0000212D0C7F Message-Id: <1541009577-29656-1-git-send-email-pmorel@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-10-31_06:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=1 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=617 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1810310150 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is the first version to handle AP Interrupt using the GISA facility. The patch series is based on the GISA+GIB patch series sent by Michael Mueller. - We define a new VFIO ioctl to ask the vfio_ap driver to register a interruption for the guest. - We define the assembler code to register a GISA based interruption for the guest. - We register to the GIB Alert mechanism and suppress the GISA (firmware) based interrupts from the list of software handled interrupts. This patch series has been tested with success on z13 and z14 with adjunct processors CEX5[ACP] and CEX6C. To use, you, of course, need the QEMU patches, which will be sent separately. Pierre Morel (7): vfio: ap: Add AP Queue Interruption Control facility vfio: ap: VFIO AP Queue Interrupt Control vfio: ap: AP Queue Interrupt structures definitions vfio: ap: AP Queue Interrupt Control VFIO ioctl calls s390: kvm: export GIB registration vfio: ap: register guest ISC with GISA and GIB s390: kvm: Handle all GISA IPM bits through GISA arch/s390/include/asm/kvm_host.h | 3 + arch/s390/kvm/interrupt.c | 3 +- arch/s390/tools/gen_facilities.c | 1 + drivers/s390/crypto/vfio_ap_ops.c | 105 ++++++++++++++++++++++++++ drivers/s390/crypto/vfio_ap_private.h | 77 +++++++++++++++++++ include/uapi/linux/vfio.h | 22 ++++++ 6 files changed, 209 insertions(+), 2 deletions(-) -- 2.17.0