Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1284506imm; Wed, 22 Aug 2018 23:54:23 -0700 (PDT) X-Google-Smtp-Source: AA+uWPzhHpNmfAF/K09zkVUT0RHlgvwvKCa7F+n971fVenai2q4N8/+u2xoFnVfihfTA1XkpLPnO X-Received: by 2002:a63:ba1c:: with SMTP id k28-v6mr26845122pgf.76.1535007263686; Wed, 22 Aug 2018 23:54:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535007263; cv=none; d=google.com; s=arc-20160816; b=TXZeYxGPlLBT+OV54h/CRUdHLk3LxRveJY6O/xZ8+zYYG3/6C+pJerlqDj6iAXU2f0 6KlmWLnwDqqi/di+Iu2e6L8FvvEY5j584h8+xFvQkM7CXZfPN4T80e6wuBJAom2dxmQd jiTiBL1/hFXYZwHZ6KdaRoJBrEMyGp8Mu/YBm1Ziv1X0bH1oMD5Pkfqs9m0uFLHEfr5U c7FX//l1KomPXkSFdwrhJ3fN05wonpMj+m7lvaVw//KujeSoH6W8X2VL3XY2eWCAnV9W TbitQWvooSm0KgUJRYrU0MqTEZ3fqNrHO8zcolF2CBRvigH2fgp63kU/kzGskNXvxzky Lonw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :references:cc:to:reply-to:subject:from:arc-authentication-results; bh=xEOnF+nft9wABIkcoA5YHrWdTfzsRcgSg6mB1td7uYU=; b=ZTCsRnFL5QCwPa45jElBJopJVgTSYxOtxjF06a57uU8hKrqsftAZa+razL3wvDp6Ci UvzpV6r9MFtLUIJ5isuPvZ1rfgqAf9fmSSTzBL1NgYp8cqEXV0cU1RxovAlbSZJQuSIN TrLjxHXlhCfXis7UDT4vR+9lUqcAxUnTjDRtLlbznfhwhym6aTi+JCFWT7oAzkQCmRtH 23MXdksbH1tzt0zlx5Kk03mXEfRidJpMZZCHb693v8AIwMNj9U/mVfeQYzgnKvLGRFR6 YNWg314UbQNFOz4MhO3GK/KpD35ZV9WGRFKkU7ZXSlLPAxO5reQNtywpFDdTjk1yrySS Rc0A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p11-v6si3599015pgh.274.2018.08.22.23.54.08; Wed, 22 Aug 2018 23:54:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726485AbeHWKVQ (ORCPT + 99 others); Thu, 23 Aug 2018 06:21:16 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:59874 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726285AbeHWKVP (ORCPT ); Thu, 23 Aug 2018 06:21:15 -0400 Received: from pps.filterd (m0098396.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7N6ms7k057086 for ; Thu, 23 Aug 2018 02:53:05 -0400 Received: from e06smtp03.uk.ibm.com (e06smtp03.uk.ibm.com [195.75.94.99]) by mx0a-001b2d01.pphosted.com with ESMTP id 2m1p1cvbcd-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 23 Aug 2018 02:53:05 -0400 Received: from localhost by e06smtp03.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 23 Aug 2018 07:53:02 +0100 Received: from b06cxnps3075.portsmouth.uk.ibm.com (9.149.109.195) by e06smtp03.uk.ibm.com (192.168.101.133) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Thu, 23 Aug 2018 07:52:59 +0100 Received: from d06av24.portsmouth.uk.ibm.com (mk.ibm.com [9.149.105.60]) by b06cxnps3075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w7N6qwQn21102744 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 23 Aug 2018 06:52:58 GMT Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7162242042; Thu, 23 Aug 2018 09:52:59 +0100 (BST) Received: from d06av24.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 21D4842041; Thu, 23 Aug 2018 09:52:59 +0100 (BST) Received: from [9.152.224.92] (unknown [9.152.224.92]) by d06av24.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 23 Aug 2018 09:52:59 +0100 (BST) From: Pierre Morel Subject: Re: [PATCH v2 3/5] KVM: s390: vsie: Allow support for a host without AP Reply-To: pmorel@linux.ibm.com To: David Hildenbrand Cc: linux-kernel@vger.kernel.org, cohuck@redhat.com, linux-s390@vger.kernel.org, kvm@vger.kernel.org, frankja@linux.ibm.com, akrowiak@linux.ibm.com, borntraeger@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com References: <1534956717-14087-1-git-send-email-pmorel@linux.ibm.com> <1534956717-14087-4-git-send-email-pmorel@linux.ibm.com> Date: Thu, 23 Aug 2018 08:52:57 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18082306-0012-0000-0000-0000029D86C8 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18082306-0013-0000-0000-000020D0CCF2 Message-Id: <8d506740-9228-a5f7-30ad-4bd181d4385a@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-23_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808230072 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 22/08/2018 19:06, David Hildenbrand wrote: > On 22.08.2018 18:51, Pierre Morel wrote: >> Currently the CRYCB format used in the host for the >> shadowed CRYCB is FORMAT2 while no check is done if >> AP instructions are supported in the host. >> >> We better use the format the host calculated for the >> guest 1 as the host already tested it against its >> facility set. >> >> Signed-off-by: Pierre Morel >> --- >> arch/s390/kvm/vsie.c | 5 +++-- >> 1 file changed, 3 insertions(+), 2 deletions(-) >> >> diff --git a/arch/s390/kvm/vsie.c b/arch/s390/kvm/vsie.c >> index 56a9d47..0b12916 100644 >> --- a/arch/s390/kvm/vsie.c >> +++ b/arch/s390/kvm/vsie.c >> @@ -154,6 +154,7 @@ static int shadow_crycb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page) >> const u32 crycb_addr = crycbd_o & 0x7ffffff8U; >> unsigned long *b1, *b2; >> u8 ecb3_flags; >> + unsigned long g1_fmt; >> >> scb_s->crycbd = 0; >> if (!(crycbd_o == CRYCB_FORMAT1)) >> @@ -180,8 +181,8 @@ static int shadow_crycb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page) >> return set_validity_icpt(scb_s, 0x0035U); >> >> scb_s->ecb3 |= ecb3_flags; >> - scb_s->crycbd = ((__u32)(__u64) &vsie_page->crycb) | CRYCB_FORMAT1 | >> - CRYCB_FORMAT2; >> + g1_fmt = vcpu->arch.sie_block->crycbd & 0x03; >> + scb_s->crycbd = ((__u32)(__u64) &vsie_page->crycb) | g1_fmt; >> >> /* xor both blocks in one run */ >> b1 = (unsigned long *) vsie_page->crycb.dea_wrapping_key_mask; >> > > This is wrong. I remember that with APXA, if FORMAT2 is available, we > should always use FORMAT2. That's why we explicitly convert it here. > You are right if FORMAT2 is available we should use FORMAT2 but the intention here is to use what KVM crypto init function did, assuming it did the right thing. Eventually we are running on a host without AP and we should use FORMAT1. Isn't it correct? Regards, Pierre -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany