Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1279022imm; Wed, 22 Aug 2018 23:46:14 -0700 (PDT) X-Google-Smtp-Source: AA+uWPyAnmY7EpyVsPEpVIJ+g1pj+PpwMVDjwqCxbUmhEun/vRYv6tmvfvav9Z07YBRWwTH7tnqB X-Received: by 2002:a17:902:9a8a:: with SMTP id w10-v6mr56534891plp.14.1535006774239; Wed, 22 Aug 2018 23:46:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535006774; cv=none; d=google.com; s=arc-20160816; b=cp8F/Nz+CdN+6Mg4gl/waql8niOCHmvlJHsrmurEqTj8r73aVVsvBj4777IgAge8dO ZGLUk8aRpjWZ15B9Dr/r+mczM55gT7lDPOspeBcNiO/YznM5Hm5dLrmK2uMWea/Z3nKS p01TLEHyHWYR7Qke1kygF4Fihpq19wrLVtVKJFk+l1pj3BJnvpgYvNc+vV+uP37JS0VH zSHXAlCY+660FZPJ3NUaC+iFYeaZrR/CPrTcGOWlMUMQq743pSZqJ1K4q0bTgxHZTDFG 4Z+ZAgNBDrlDNqXsmla28fDhcFy7sTtW+ECvwSugZxigpHz0S35a15Hj3B5oIjGnGRKa kBmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:reply-to:arc-authentication-results; bh=xEOnF+nft9wABIkcoA5YHrWdTfzsRcgSg6mB1td7uYU=; b=r4wAXF+ABkjWM0DEIfxSdLHN4wyIV2hqSj8htifA+cIn8d3FkUCwqHtopH5iFLoAq4 91SM4gKhnARYRoO8BfD16ux67EzHQXaJj1VT1nR7l35xzAA6C0aO4dI7tTWkYXwSCyY3 Z4/xfILQ+1sD4HpwEKvJ47x5Kj7Q11K7TGHI9BNRnYNJ7JiiuJyQRUZSO8Ccgyz32n8Z WmuO4Z6uN8mHMf3TzurgEQ3GUL0L95L/p/r17r6Ld8Jyw00Gw4SEnAdNnPhll/x4ctva M7kY/vKpylS1BPeLQrXjD6q+o7wGHQXP/PyOY7Hj/23p5yxKfDUO5fUSqyn5FPh8xK6U vxVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w11-v6si3410513plz.333.2018.08.22.23.45.58; Wed, 22 Aug 2018 23:46:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726362AbeHWKNC (ORCPT + 99 others); Thu, 23 Aug 2018 06:13:02 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:33788 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726118AbeHWKNB (ORCPT ); Thu, 23 Aug 2018 06:13:01 -0400 Received: from pps.filterd (m0098396.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7N6i5Xw042232 for ; Thu, 23 Aug 2018 02:44:53 -0400 Received: from e06smtp01.uk.ibm.com (e06smtp01.uk.ibm.com [195.75.94.97]) by mx0a-001b2d01.pphosted.com with ESMTP id 2m1p1cv1by-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 23 Aug 2018 02:44:52 -0400 Received: from localhost by e06smtp01.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 23 Aug 2018 07:44:50 +0100 Received: from b06cxnps4076.portsmouth.uk.ibm.com (9.149.109.198) by e06smtp01.uk.ibm.com (192.168.101.131) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Thu, 23 Aug 2018 07:44:47 +0100 Received: from d06av24.portsmouth.uk.ibm.com (d06av24.portsmouth.uk.ibm.com [9.149.105.60]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w7N6ikEs36307020 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 23 Aug 2018 06:44:46 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 59A7542042; Thu, 23 Aug 2018 09:44:47 +0100 (BST) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id DF4814203F; Thu, 23 Aug 2018 09:44:46 +0100 (BST) Received: from [9.152.224.92] (unknown [9.152.224.92]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 23 Aug 2018 09:44:46 +0100 (BST) Reply-To: pmorel@linux.ibm.com Subject: Re: [PATCH v2 3/5] KVM: s390: vsie: Allow support for a host without AP To: David Hildenbrand Cc: linux-kernel@vger.kernel.org, cohuck@redhat.com, linux-s390@vger.kernel.org, kvm@vger.kernel.org, frankja@linux.ibm.com, akrowiak@linux.ibm.com, borntraeger@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com References: <1534956717-14087-1-git-send-email-pmorel@linux.ibm.com> <1534956717-14087-4-git-send-email-pmorel@linux.ibm.com> From: Pierre Morel Date: Thu, 23 Aug 2018 08:44:45 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18082306-4275-0000-0000-000002ADFEEA X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18082306-4276-0000-0000-000037B7065B Message-Id: X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-23_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808230071 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 22/08/2018 19:06, David Hildenbrand wrote: > On 22.08.2018 18:51, Pierre Morel wrote: >> Currently the CRYCB format used in the host for the >> shadowed CRYCB is FORMAT2 while no check is done if >> AP instructions are supported in the host. >> >> We better use the format the host calculated for the >> guest 1 as the host already tested it against its >> facility set. >> >> Signed-off-by: Pierre Morel >> --- >> arch/s390/kvm/vsie.c | 5 +++-- >> 1 file changed, 3 insertions(+), 2 deletions(-) >> >> diff --git a/arch/s390/kvm/vsie.c b/arch/s390/kvm/vsie.c >> index 56a9d47..0b12916 100644 >> --- a/arch/s390/kvm/vsie.c >> +++ b/arch/s390/kvm/vsie.c >> @@ -154,6 +154,7 @@ static int shadow_crycb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page) >> const u32 crycb_addr = crycbd_o & 0x7ffffff8U; >> unsigned long *b1, *b2; >> u8 ecb3_flags; >> + unsigned long g1_fmt; >> >> scb_s->crycbd = 0; >> if (!(crycbd_o == CRYCB_FORMAT1)) >> @@ -180,8 +181,8 @@ static int shadow_crycb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page) >> return set_validity_icpt(scb_s, 0x0035U); >> >> scb_s->ecb3 |= ecb3_flags; >> - scb_s->crycbd = ((__u32)(__u64) &vsie_page->crycb) | CRYCB_FORMAT1 | >> - CRYCB_FORMAT2; >> + g1_fmt = vcpu->arch.sie_block->crycbd & 0x03; >> + scb_s->crycbd = ((__u32)(__u64) &vsie_page->crycb) | g1_fmt; >> >> /* xor both blocks in one run */ >> b1 = (unsigned long *) vsie_page->crycb.dea_wrapping_key_mask; >> > > This is wrong. I remember that with APXA, if FORMAT2 is available, we > should always use FORMAT2. That's why we explicitly convert it here. > You are right if FORMAT2 is available we should use FORMAT2 but the intention here is to use what KVM crypto init function did, assuming it did the right thing. Eventually we are running on a host without AP and we should use FORMAT1. Isn't it correct? Regards, Pierre -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany