Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp643780imp; Thu, 21 Feb 2019 08:20:59 -0800 (PST) X-Google-Smtp-Source: AHgI3Ia+DgqKzAnlzsDXthxLxAF4Axf0wlukXQLeDx2jWLMFUL4iRP6BA1BjOiQBbj9OqekDg3Um X-Received: by 2002:a65:6397:: with SMTP id h23mr34081043pgv.347.1550766059808; Thu, 21 Feb 2019 08:20:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550766059; cv=none; d=google.com; s=arc-20160816; b=InmdS3Ce7pMX96H/lI4MJ7Ur1jWIHLNoDn9kr6N+cgSAUF8/C291NqaNU17GHf9ue0 8VaejdzAgEbtCr96uKjf6Qc7o00669jRnX6IKyoc20Zak1vDXXNVOv0OivupxR9CwwMT 3okPOJbkbBVjcg7sUvNM/WgC+zPbiI/ln0rAGeU3pwmDtbxJlOT/ABe6dtXbeH+tWTwA S9CAl5Ip4umt4yUSNAQvhx8vh93Wi/gFSXp/8PmN/dMYRWh80Jv/TZGu0ZgvQbRR7Sx4 iT39nM157HiTV66G0prUdyLhVSqf9LB/0hljtc+7G2CWznjfIKeYZVNAvVckdMHZwBIR gBZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject; bh=JALSKNmH3+ZW/vPb4ScCQ7eH1PFsumHaaOn3xUffjsA=; b=EEz4107VPnGyhhvUB4aQFm8TqdGBWGypCoJ5HzEkdMGPqAfX3VRzOd1422FpRWoyVq gwWijkDkA8Xlv9BCf18pQlL3csaJaSah8ju5FvgCkFpDQJs6L422J7YqAejfFim3I/Z4 kLmnDURl/4VnCyYWikmAMGsOfskC/phNNbb+s8t0diEh/rO6JckN0rlGv5UsqDDZAoXg +Piy9Y0w4uSlsa0GrZ21twuatu0xH+F/B6aECZYgZjvXv1dJqEFviZFhT4VHWytwlpbg EyzC9Tvo4LlG2d/bIz6NRAv2qkN9rdlnLMJVma09foiC78dXCaCw2M0rKI8wB7qw4oPv 74rg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h3si3354440pfj.137.2019.02.21.08.20.43; Thu, 21 Feb 2019 08:20:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728180AbfBUQT6 (ORCPT + 99 others); Thu, 21 Feb 2019 11:19:58 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:58870 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725932AbfBUQT6 (ORCPT ); Thu, 21 Feb 2019 11:19:58 -0500 Received: from pps.filterd (m0098414.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x1LGJVuZ066926 for ; Thu, 21 Feb 2019 11:19:56 -0500 Received: from e32.co.us.ibm.com (e32.co.us.ibm.com [32.97.110.150]) by mx0b-001b2d01.pphosted.com with ESMTP id 2qswrndvjh-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 21 Feb 2019 11:19:55 -0500 Received: from localhost by e32.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 21 Feb 2019 16:19:54 -0000 Received: from b03cxnp08028.gho.boulder.ibm.com (9.17.130.20) by e32.co.us.ibm.com (192.168.1.132) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Thu, 21 Feb 2019 16:19:52 -0000 Received: from b03ledav005.gho.boulder.ibm.com (b03ledav005.gho.boulder.ibm.com [9.17.130.236]) by b03cxnp08028.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x1LGJlPg23330954 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 21 Feb 2019 16:19:48 GMT Received: from b03ledav005.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id E158DBE051; Thu, 21 Feb 2019 16:19:47 +0000 (GMT) Received: from b03ledav005.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 58F53BE04F; Thu, 21 Feb 2019 16:19:46 +0000 (GMT) Received: from [9.85.140.198] (unknown [9.85.140.198]) by b03ledav005.gho.boulder.ibm.com (Postfix) with ESMTP; Thu, 21 Feb 2019 16:19:46 +0000 (GMT) Subject: Re: [PATCH v3] zcrypt: handle AP Info notification from CHSC SEI command To: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org Cc: freude@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, borntraeger@de.ibm.com, cohuck@redhat.com, pmorel@linux.vnet.ibm.com, pasic@linux.vnet.ibm.com, akrowiak@linux.vnet.ibm.com, oberpar@linux.ibm.com, sebott@linux.ibm.com References: <1550509295-1199-1-git-send-email-akrowiak@linux.ibm.com> From: Tony Krowiak Date: Thu, 21 Feb 2019 11:19:45 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1 MIME-Version: 1.0 In-Reply-To: <1550509295-1199-1-git-send-email-akrowiak@linux.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 19022116-0004-0000-0000-000014E546DC X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00010638; HX=3.00000242; KW=3.00000007; PH=3.00000004; SC=3.00000281; SDB=6.01164323; UDB=6.00608011; IPR=6.00944909; MB=3.00025682; MTD=3.00000008; XFM=3.00000015; UTC=2019-02-21 16:19:54 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19022116-0005-0000-0000-00008AAD0800 Message-Id: <02b26d9b-f4f3-d577-3248-3895d80c882e@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-02-21_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1902210118 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/18/19 12:01 PM, Tony Krowiak wrote: > The current AP bus implementation periodically polls the AP configuration > to detect changes. When the AP configuration is dynamically changed via the > SE or an SCLP instruction, the changes will not be reflected to sysfs until > the next time the AP configuration is polled. The CHSC architecture > provides a Store Event Information (SEI) command to make notification of an > AP configuration change. This patch introduces a handler to process > notification from the CHSC SEI command by immediately kicking off an AP bus > scan-after-event. Ping! > > Signed-off-by: Tony Krowiak > Reviewed-by: Halil Pasic > Reviewed-by: Sebastian Ott > Reviewed-by: Harald Freudenberger > Reviewed-by: Cornelia Huck > --- > arch/s390/include/asm/ap.h | 11 +++++++++++ > drivers/s390/cio/chsc.c | 13 +++++++++++++ > drivers/s390/crypto/ap_bus.c | 10 ++++++++++ > 3 files changed, 34 insertions(+) > > diff --git a/arch/s390/include/asm/ap.h b/arch/s390/include/asm/ap.h > index 1a6a7092d942..e94a0a28b5eb 100644 > --- a/arch/s390/include/asm/ap.h > +++ b/arch/s390/include/asm/ap.h > @@ -360,4 +360,15 @@ static inline struct ap_queue_status ap_dqap(ap_qid_t qid, > return reg1; > } > > +/* > + * Interface to tell the AP bus code that a configuration > + * change has happened. The bus code should at least do > + * an ap bus resource rescan. > + */ > +#if IS_ENABLED(CONFIG_ZCRYPT) > +void ap_bus_cfg_chg(void); > +#else > +static inline void ap_bus_cfg_chg(void){}; > +#endif > + > #endif /* _ASM_S390_AP_H_ */ > diff --git a/drivers/s390/cio/chsc.c b/drivers/s390/cio/chsc.c > index a0baee25134c..eaf4699be2c5 100644 > --- a/drivers/s390/cio/chsc.c > +++ b/drivers/s390/cio/chsc.c > @@ -24,6 +24,7 @@ > #include > #include > #include > +#include > > #include "css.h" > #include "cio.h" > @@ -586,6 +587,15 @@ static void chsc_process_sei_scm_avail(struct chsc_sei_nt0_area *sei_area) > " failed (rc=%d).\n", ret); > } > > +static void chsc_process_sei_ap_cfg_chg(struct chsc_sei_nt0_area *sei_area) > +{ > + CIO_CRW_EVENT(3, "chsc: ap config changed\n"); > + if (sei_area->rs != 5) > + return; > + > + ap_bus_cfg_chg(); > +} > + > static void chsc_process_sei_nt2(struct chsc_sei_nt2_area *sei_area) > { > switch (sei_area->cc) { > @@ -612,6 +622,9 @@ static void chsc_process_sei_nt0(struct chsc_sei_nt0_area *sei_area) > case 2: /* i/o resource accessibility */ > chsc_process_sei_res_acc(sei_area); > break; > + case 3: /* ap config changed */ > + chsc_process_sei_ap_cfg_chg(sei_area); > + break; > case 7: /* channel-path-availability information */ > chsc_process_sei_chp_avail(sei_area); > break; > diff --git a/drivers/s390/crypto/ap_bus.c b/drivers/s390/crypto/ap_bus.c > index 5a699746c357..d0d415954142 100644 > --- a/drivers/s390/crypto/ap_bus.c > +++ b/drivers/s390/crypto/ap_bus.c > @@ -861,6 +861,16 @@ void ap_bus_force_rescan(void) > EXPORT_SYMBOL(ap_bus_force_rescan); > > /* > +* A config change has happened, force an ap bus rescan. > +*/ > +void ap_bus_cfg_chg(void) > +{ > + AP_DBF(DBF_INFO, "%s config change, forcing bus rescan\n", __func__); > + > + ap_bus_force_rescan(); > +} > + > +/* > * hex2bitmap() - parse hex mask string and set bitmap. > * Valid strings are "0x012345678" with at least one valid hex number. > * Rest of the bitmap to the right is padded with 0. No spaces allowed >