Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp5892552imm; Wed, 12 Sep 2018 12:46:57 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYruF7rPMs+mfSgUkukz0Co5DgfCaY0t2j7T48anQZNjnm85ts6/pJkJysSMPWDEXrSH0PK X-Received: by 2002:a63:f043:: with SMTP id s3-v6mr1346225pgj.94.1536781617740; Wed, 12 Sep 2018 12:46:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536781617; cv=none; d=google.com; s=arc-20160816; b=W34493CKm5mmto6df8QXfFSlksgWipCQ9IYTwelsYYtXq7b+TqEEI/zEsBvsAkAmMx g41PY87SSst/foEs2QmTU72VmCsIkgQTTLZHiEvUlMp/u8Dvf/vjSPpcu5PjCv4SmWoN onCtt0PToXfnQ3OcJbYxnXq4qA9QSxCdzmH4sicr7Kgn/ci1p6gjc8hdqKW4S0t26QlU 5rAcnpZ3jjFK6GrSUUJ/WheHfoZQS0HxLW3FjON4w0n6qcTAJrxeB1tT53FvV7LCiqA0 j5eXBptduXYjGy2DqofjghsUCasGWe8W1dxhJE6Kj59KFuvzyUfPxdvdndfQU4zZnq50 grtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:references:in-reply-to:date :subject:cc:to:from; bh=eHIfkA+fW5zTKxcksbzNKX5hm2+yWOQYmCo+IMkHO18=; b=KRyRhzsvdNmS5VF5yfYtjDlccDdV5YwI7fVpOhRVg1CJPZrHzpD04K9V9Qpl/WRxY+ +EDkJcpFYCE3trZXuENi9KwQfp4HKPJCNlXWQoFs65JE5HrOJYdCMnUbnh81/05OjPBv t1ZpiQq+tJyK+dCXuHqa6nc82sPNxUzduugwV7fTTCQJ7PDhnQIOFF/OlrFJZp77nafx 4Kdc8yD7rwALdbxL2FTqXZ0RmNmk8Sg4xr7OFzzezTr56bcm/3CTX7HTORo7r4Lb2Nri D2EShl2OX0SwF/9Bp7vXZCPq6Bv4ZLzIbUYoq/DcAJm+xH4C1oRf//1WZ2xuUiwosxe6 jaeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d19-v6si2046514pgk.92.2018.09.12.12.46.43; Wed, 12 Sep 2018 12:46:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728527AbeIMAuh (ORCPT + 99 others); Wed, 12 Sep 2018 20:50:37 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:46716 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728518AbeIMAug (ORCPT ); Wed, 12 Sep 2018 20:50:36 -0400 Received: from pps.filterd (m0098420.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w8CJYXo7134440 for ; Wed, 12 Sep 2018 15:44:32 -0400 Received: from e35.co.us.ibm.com (e35.co.us.ibm.com [32.97.110.153]) by mx0b-001b2d01.pphosted.com with ESMTP id 2mf5sp8esh-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 12 Sep 2018 15:44:32 -0400 Received: from localhost by e35.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 12 Sep 2018 13:44:31 -0600 Received: from b03cxnp07029.gho.boulder.ibm.com (9.17.130.16) by e35.co.us.ibm.com (192.168.1.135) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 12 Sep 2018 13:44:27 -0600 Received: from b03ledav003.gho.boulder.ibm.com (b03ledav003.gho.boulder.ibm.com [9.17.130.234]) by b03cxnp07029.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w8CJiOO112255338 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 12 Sep 2018 12:44:24 -0700 Received: from b03ledav003.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 9D72A6A051; Wed, 12 Sep 2018 13:44:24 -0600 (MDT) Received: from b03ledav003.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id C72B46A04D; Wed, 12 Sep 2018 13:44:21 -0600 (MDT) Received: from localhost.localdomain (unknown [9.80.213.181]) by b03ledav003.gho.boulder.ibm.com (Postfix) with ESMTPS; Wed, 12 Sep 2018 13:44:21 -0600 (MDT) From: Tony Krowiak To: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, cohuck@redhat.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, akrowiak@linux.vnet.ibm.com, frankja@linux.ibm.com, Pierre Morel , Tony Krowiak Subject: [PATCH v10 15/26] KVM: s390: Clear Crypto Control Block when using vSIE Date: Wed, 12 Sep 2018 15:43:05 -0400 X-Mailer: git-send-email 1.7.1 In-Reply-To: <1536781396-13601-1-git-send-email-akrowiak@linux.vnet.ibm.com> References: <1536781396-13601-1-git-send-email-akrowiak@linux.vnet.ibm.com> X-TM-AS-GCONF: 00 x-cbid: 18091219-0012-0000-0000-000016B252B8 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00009709; HX=3.00000242; KW=3.00000007; PH=3.00000004; SC=3.00000266; SDB=6.01087371; UDB=6.00561489; IPR=6.00867384; MB=3.00023256; MTD=3.00000008; XFM=3.00000015; UTC=2018-09-12 19:44:30 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18091219-0013-0000-0000-000054612CD5 Message-Id: <1536781396-13601-16-git-send-email-akrowiak@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-09-12_10:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=745 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1809120195 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pierre Morel When we clear the Crypto Control Block (CRYCB) used by a guest level 2, the vSIE shadow CRYCB for guest level 3 must be updated before the guest uses it. We achieve this by using the KVM_REQ_VSIE_RESTART synchronous request for each vCPU belonging to the guest to force the reload of the shadow CRYCB before rerunning the guest level 3. Signed-off-by: Pierre Morel Signed-off-by: Tony Krowiak --- arch/s390/kvm/kvm-s390.c | 2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c index ac4c93f..2cdd980 100644 --- a/arch/s390/kvm/kvm-s390.c +++ b/arch/s390/kvm/kvm-s390.c @@ -2043,6 +2043,8 @@ void kvm_arch_crypto_clear_masks(struct kvm *kvm) memset(&kvm->arch.crypto.crycb->apcb1, 0, sizeof(kvm->arch.crypto.crycb->apcb1)); + /* recreate the shadow crycb for each vcpu */ + kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART); kvm_s390_vcpu_unblock_all(kvm); mutex_unlock(&kvm->lock); } -- 1.7.1