Received: by 10.192.165.156 with SMTP id m28csp350242imm; Tue, 17 Apr 2018 11:10:41 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/3Znxbzl/3Nx7Gy/dR4N8dnWqjRoVjFBDJ+kkKNv2qEKR6kLGEOnsDyLHzoQIjgo64w+cA X-Received: by 10.167.128.71 with SMTP id y7mr2910235pfm.12.1523988641276; Tue, 17 Apr 2018 11:10:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523988641; cv=none; d=google.com; s=arc-20160816; b=he6cNogrXJNI/3l2+jSsn7b1G/bUxqTkylBeicX2IKPQW3i6UEj5zXrOAVHSJ6wfy4 5EaLO2FOwibUrU6lFRlqyXVO634AgWqUdEj5Rd+7WJ2c4jhXokgwuGj5FD26gJbRpvhC 23Ag/RRHWzUnuxFYm9WIOuFmj611jF0iaM5P5I5Ygyhhd/GSFxU9hKOHZcRNQIOFv06L /bWsIunMYsVtgsyEOa23mWwwJL6CTxasj+yUTC9+QaLbOEk8XKfTpbRVSaOFZ0dmmENT oMZt+2P7TCZfRHU+7J14kiIh25g65Xo7pyfGgdPV4i7OPny3bYU8s2+PlC+WaZ5kNBFH p9Ow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :from:references:cc:to:subject:arc-authentication-results; bh=Wx6lgUZdG7aScCkXTQ2wIh7RChSzQff8VumQgNGuZWA=; b=SRg+vx0hiVExQg70Yy7I6sE723cIjSGTl57wvuc0XSpkGzqLPuWCtxod8IJJxCIhVT dnUdTCf7clgmE+7AuPErapYRPLLQj5EUfTaiLMAAmg2ozDqKcFAUkNB22/Q3NhfIXK0j yL4U5pnbbcTQ0jw34QrkTXPX4fPEXhEYdcTX2MlEJNV0Bii1/h5hjeG29gi3kGfFI/TG KOyDIT00dRGHWTaxIRo2vgEVHW//FGihu2FjkDK5KxOyvO94M7g/XJdOC0Pfl2eusMUc 4kMvPD1Ih+LBCLqshatxgJ864gnfYy8W0Jfta8LNkxnZvOHlTjLKvk7YzcFZ1UFpSC+K rjJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f9-v6si14589959pli.50.2018.04.17.11.10.26; Tue, 17 Apr 2018 11:10:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752690AbeDQSJK (ORCPT + 99 others); Tue, 17 Apr 2018 14:09:10 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:43176 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751927AbeDQSJI (ORCPT ); Tue, 17 Apr 2018 14:09:08 -0400 Received: from pps.filterd (m0098393.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3HI8gT2136197 for ; Tue, 17 Apr 2018 14:09:08 -0400 Received: from e15.ny.us.ibm.com (e15.ny.us.ibm.com [129.33.205.205]) by mx0a-001b2d01.pphosted.com with ESMTP id 2hdjjckbef-1 (version=TLSv1.2 cipher=AES256-SHA256 bits=256 verify=NOT) for ; Tue, 17 Apr 2018 14:09:07 -0400 Received: from localhost by e15.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 17 Apr 2018 14:09:06 -0400 Received: from b01cxnp23033.gho.pok.ibm.com (9.57.198.28) by e15.ny.us.ibm.com (146.89.104.202) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Tue, 17 Apr 2018 14:09:02 -0400 Received: from b01ledav002.gho.pok.ibm.com (b01ledav002.gho.pok.ibm.com [9.57.199.107]) by b01cxnp23033.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w3HI913L62062610; Tue, 17 Apr 2018 18:09:01 GMT Received: from b01ledav002.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id C033912403D; Tue, 17 Apr 2018 15:11:03 -0400 (EDT) Received: from oc8043147753.ibm.com (unknown [9.85.136.174]) by b01ledav002.gho.pok.ibm.com (Postfix) with ESMTP id 7630812403F; Tue, 17 Apr 2018 15:11:02 -0400 (EDT) Subject: Re: [PATCH v4 03/15] KVM: s390: refactor crypto initialization To: Cornelia Huck Cc: Harald Freudenberger , Pierre Morel , alex.williamson@redhat.com, alifm@linux.vnet.ibm.com, berrange@redhat.com, bjsdjshi@linux.vnet.ibm.com, borntrae@linux.ibm.com, fiuczy@linux.vnet.ibm.com, heicars2@linux.vnet.ibm.com, jjherne@linux.vnet.ibm.com, kvm@vger.kernel.org, kwankhede@nvidia.com, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, mjrosato@linux.vnet.ibm.com, mschwid2@linux.vnet.ibm.com, pasic@linux.vnet.ibm.com, pbonzini@redhat.com, Reinhard Buendgen , thuth@redhat.com References: <1523827345-11600-1-git-send-email-akrowiak@linux.vnet.ibm.com> <1523827345-11600-4-git-send-email-akrowiak@linux.vnet.ibm.com> <4fb50a31-1893-5cfb-0f35-fb2501c2afa8@linux.vnet.ibm.com> <20180417121044.5c8f2182.cohuck@redhat.com> <2ac8b862-e2dc-843e-a0b8-906fa32b42f4@linux.vnet.ibm.com> <20180417172139.0a2b148b.cohuck@redhat.com> From: Tony Krowiak Date: Tue, 17 Apr 2018 14:08:59 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.0 MIME-Version: 1.0 In-Reply-To: <20180417172139.0a2b148b.cohuck@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US X-TM-AS-GCONF: 00 x-cbid: 18041718-0036-0000-0000-000002E43989 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00008872; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000257; SDB=6.01019320; UDB=6.00520007; IPR=6.00798561; MB=3.00020619; MTD=3.00000008; XFM=3.00000015; UTC=2018-04-17 18:09:05 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18041718-0037-0000-0000-00004404FD28 Message-Id: <7276785e-2183-3204-ec80-99fba1546364@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-04-17_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1804170155 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04/17/2018 11:21 AM, Cornelia Huck wrote: > On Tue, 17 Apr 2018 10:26:57 -0400 > Tony Krowiak wrote: > >> On 04/17/2018 06:10 AM, Cornelia Huck wrote: >>> On Tue, 17 Apr 2018 09:49:58 +0200 >>> "Harald Freudenberger" wrote: >>> >>>> Didn't we say that when APXA is not available there is no Crypto support >>>> for KVM ? >>> [Going by the code, as I don't have access to the architecture] >>> >>> Current status seems to be: >>> - setup crycb if facility 76 is available (that's MSAX3, I guess?) >> The crycb is set up regardless of whether STFLE.76 (MSAX3) is >> installed or not. > Hm, the current code does a quick exit if bit 76 is not set, doesn't > it? I guess that depends upon what you mean by current code. If you are talking about the code as it is distributed today - i.e., before my patch series - then you are correct. This patch changes that; it initializes the kvm->arch.crypto.crycbd to point to the CRYCB, then clears the format bits (kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK)) which is the same as setting the CRYCB format to format 0. It is only after this that the check is done to determine whether STFLE.76 is set. > >>> - use format 2 if APXA is available, else use format 1 >> Use format 0 if MSAX3 is not available >> Use format 1 if MSAX3 is available but APXA is not >> Use format 2 if MSAX3 and APXA is available >> >>> From Tony's patch description, the goal seems to be: >>> - setup crycb even if MSAX3 is not available >> Yes, that is true >> >>> So my understanding is that we use APXA only to decide on the format of >>> the crycb, but provide it in any case? >> Yes, that is true > With the format selection you outlined above, I guess. Makes sense from > my point of view (just looking at the source code). It also implements what is stated in the architecture doc. > >>> (Not providing a crycb if APXA is not available would be loss of >>> functionality, I guess? Deciding not to provide vfio-ap if APXA is not >>> available is a different game, of course.) >> This would require a change to enabling the CPU model feature for >> AP. > But would it actually make sense to tie vfio-ap to APXA? This needs to > be answered by folks with access to the architecture :) I don't see any reason to do that from an architectural perspective. One can access AP devices whether APXA is installed or not, it just limits the range of devices that can be addressed > > [Personally, I think we should go with the version that uses the least > restrictions without introducing over-complex code. What constitutes > "over-complex code" is of course in the eye of the beholder...] I agree. >