Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2411804imm; Mon, 24 Sep 2018 04:02:48 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbokPOkPwi4ZcFNyoCQn1r2dgWHXBmBI8U/eTWyd3VGlCwrzAl2zzZDDTAYZqNQDKNXvhvY X-Received: by 2002:aa7:8319:: with SMTP id t25-v6mr9864489pfm.81.1537786968108; Mon, 24 Sep 2018 04:02:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537786968; cv=none; d=google.com; s=arc-20160816; b=qxgrmAdU/4mAMnAGfyN63t0urm6JaPDGDN01aL1VxnqJgSK43pooDRlwSJXmqIwfvO 3cEQd/B90487A6O/ZmP2I7AAFJdI5PRFn4DSd7XiL6IieaCj+9ouB3AndFhYmQBdaa7X jB2sRrV06xLgkzV3oV96An5Fau04jEhtet1E3o0YnkUqIBvqJlHp/TMdEr6anECyhNOw V0dUOcJ9OhaTcH4eKwDzODcT7zxDB+sfjSovSMcRq89LCe202NULjlcZRJCQJy2m88pU TQ2ooCm0FqClx8px5lzyMKdvYo0bynIk60tzQ/Ho9XFaEK8MzKzr58pO/fG154b5G1TY YgfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date; bh=BtCT0Ahdl26LdKQjwKBOeNIOB1/S4VPMlNDfmldAzA0=; b=T5/gJn5sGBlLfYrDFgSwFHsIj2hI5k4cQSEqXfWcgCRZW6zCFcCg1Ygb7ZJ15o9p5L vuMfsuFiuRl1WoJdDoehcuk+GM9BstQUkVtdcWEe8aeHBoNDoeWydhYebnmYE7T9K5Xv Z6mppoal3JYRY8Ue1ul29OgVRdk/5rJcfnfVxiezzGLwmgpcFQFWMPQKMDIZbi5TEIee ReHpEp/8UD0GWL6dchg4o5ysehVYR5S6fIiFg8kF7DU9E/fq37WN7gfbXne68uUeipUt 8tPL0rOunyFzAun+r6M72bDJUDA58qujlbQpHYC5WWtFdkoDs+9SoKO+3e97+dehMuCy pBIw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t32-v6si33504358pgl.484.2018.09.24.04.02.32; Mon, 24 Sep 2018 04:02:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728709AbeIXRDd (ORCPT + 99 others); Mon, 24 Sep 2018 13:03:33 -0400 Received: from mx1.redhat.com ([209.132.183.28]:36304 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727229AbeIXRDd (ORCPT ); Mon, 24 Sep 2018 13:03:33 -0400 Received: from smtp.corp.redhat.com (int-mx11.intmail.prod.int.phx2.redhat.com [10.5.11.26]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 724B94E8BC; Mon, 24 Sep 2018 11:02:02 +0000 (UTC) Received: from gondolin (dhcp-192-222.str.redhat.com [10.33.192.222]) by smtp.corp.redhat.com (Postfix) with ESMTP id 407B430A605D; Mon, 24 Sep 2018 11:01:56 +0000 (UTC) Date: Mon, 24 Sep 2018 13:01:53 +0200 From: Cornelia Huck To: Tony Krowiak Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, kwankhede@nvidia.com, bjsdjshi@linux.vnet.ibm.com, pbonzini@redhat.com, alex.williamson@redhat.com, pmorel@linux.vnet.ibm.com, alifm@linux.vnet.ibm.com, mjrosato@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, thuth@redhat.com, pasic@linux.vnet.ibm.com, berrange@redhat.com, fiuczy@linux.vnet.ibm.com, buendgen@de.ibm.com, frankja@linux.ibm.com, Tony Krowiak Subject: Re: [PATCH v10 10/26] KVM: s390: interfaces to clear CRYCB masks Message-ID: <20180924130153.766eaec7.cohuck@redhat.com> In-Reply-To: <1536781396-13601-11-git-send-email-akrowiak@linux.vnet.ibm.com> References: <1536781396-13601-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1536781396-13601-11-git-send-email-akrowiak@linux.vnet.ibm.com> Organization: Red Hat GmbH MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.26 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Mon, 24 Sep 2018 11:02:02 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 12 Sep 2018 15:43:00 -0400 Tony Krowiak wrote: > From: Tony Krowiak > > Introduces two new KVM interface to clear the APM, AQM and ADM masks in > the guest's CRYCB. The VCPUs are taken out of SIE to ensure the VCPUs do > not get out of sync. Hm, that patch description does not quite match what the patch actually does... > > Signed-off-by: Tony Krowiak > Acked-by: Halil Pasic > Tested-by: Michael Mueller > Tested-by: Farhan Ali > Tested-by: Pierre Morel > Signed-off-by: Christian Borntraeger > --- > arch/s390/include/asm/kvm_host.h | 2 ++ > arch/s390/kvm/kvm-s390.c | 15 +++++++++++++++ > 2 files changed, 17 insertions(+), 0 deletions(-) > > diff --git a/arch/s390/include/asm/kvm_host.h b/arch/s390/include/asm/kvm_host.h > index 423cce7..1e758fe 100644 > --- a/arch/s390/include/asm/kvm_host.h > +++ b/arch/s390/include/asm/kvm_host.h > @@ -858,6 +858,8 @@ void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu, > void kvm_arch_async_page_present(struct kvm_vcpu *vcpu, > struct kvm_async_pf *work); > > +void kvm_arch_crypto_clear_masks(struct kvm *kvm); > + > extern int sie64a(struct kvm_s390_sie_block *, u64 *); > extern char sie_exit; > > diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c > index d717041..ac4c93f 100644 > --- a/arch/s390/kvm/kvm-s390.c > +++ b/arch/s390/kvm/kvm-s390.c > @@ -2033,6 +2033,21 @@ static void kvm_s390_set_crycb_format(struct kvm *kvm) > kvm->arch.crypto.crycbd |= CRYCB_FORMAT1; > } > > +void kvm_arch_crypto_clear_masks(struct kvm *kvm) > +{ > + mutex_lock(&kvm->lock); > + kvm_s390_vcpu_block_all(kvm); > + > + memset(&kvm->arch.crypto.crycb->apcb0, 0, > + sizeof(kvm->arch.crypto.crycb->apcb0)); > + memset(&kvm->arch.crypto.crycb->apcb1, 0, > + sizeof(kvm->arch.crypto.crycb->apcb1)); > + > + kvm_s390_vcpu_unblock_all(kvm); > + mutex_unlock(&kvm->lock); > +} > +EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks); ...although this function looks fine. > + > static u64 kvm_s390_get_initial_cpuid(void) > { > struct cpuid cpuid;