Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1819728imm; Thu, 23 Aug 2018 09:15:04 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwV2KUsDvt54BG8A0jJgjGH+1UmNO7K8wYfbGNzbYvYG/x8jd2+NVd3ip5UX1VzMvB0zclw X-Received: by 2002:a17:902:7009:: with SMTP id y9-v6mr59269762plk.249.1535040904442; Thu, 23 Aug 2018 09:15:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535040904; cv=none; d=google.com; s=arc-20160816; b=QqP4i5tNsmraDVDgrle/r5IfMEo2R3oKppJ2hKPhzdAVYnU/IsRfB5I1y8DLYHsnVU 5C+XFKIECYW4FQIQtT7SU8VKTJyeYMrtz7bP+nxd0+AkR/z+BLXIA4vIUh+J+vaJY3Ui TQiNm9wVuspmWn91En5rhFmFeY7zJ3KhTMjuV04z48tARu0F5o5KLPsUw7/ojnXU2K2Z z//5iCDaHpwMAlh1Fy/91ExfWTBQ5G4mhyKk/eDeiV6kkDdmtu55ZGBLYA2ZYUkgI45W H4Q2Si0RkUMEspBKk1wLN97eo26AnRPpOLGR2SfyXozEIYjc70fMFuKbayPHNuT7UMHI TEmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:reply-to:arc-authentication-results; bh=Uq6IRw4jstnk0BMEA1zmZzXxUX4TOXqD4ZrUP5pIR8s=; b=HscqEYaIsumtf7819SqGpnOkOdYzQ8dRlEBrevLbF0WoiLXVpmAmeoc/viTRw/jbZu xLFINuPD/TQXeO4mzp8QtzGjjZMtmsfiWwjq7nsAlmyrXViRGqZJ60tLQMHNd4CSPQDS 4NV4Nv9o9R7fdNhLJ2rxgLuyBKmmpIshe90EidwCYd1WpKXGFRyP0XWNGxGSV5kTNL3j u0lECEQocuXm9QNBuIW76IjsSx51zIsVeSDuPo6VnQK76b7ZRby4+ubiCjQ7+Y4anN6F z1Mh3vx0u+eq5AoeOjmmqajhH88DLJfLw5RHf2qosasM7B60AS/ZReb5KC5z1uqfqLLR 731Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d32-v6si4337573pla.93.2018.08.23.09.14.49; Thu, 23 Aug 2018 09:15:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731861AbeHWPKG (ORCPT + 99 others); Thu, 23 Aug 2018 11:10:06 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:54138 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729984AbeHWPKG (ORCPT ); Thu, 23 Aug 2018 11:10:06 -0400 Received: from pps.filterd (m0098413.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7NBaP4E124889 for ; Thu, 23 Aug 2018 07:40:45 -0400 Received: from e06smtp04.uk.ibm.com (e06smtp04.uk.ibm.com [195.75.94.100]) by mx0b-001b2d01.pphosted.com with ESMTP id 2m1teuvkbs-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 23 Aug 2018 07:40:45 -0400 Received: from localhost by e06smtp04.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 23 Aug 2018 12:40:39 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp04.uk.ibm.com (192.168.101.134) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Thu, 23 Aug 2018 12:40:36 +0100 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w7NBeYn935389688 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 23 Aug 2018 11:40:34 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 0F6304C058; Thu, 23 Aug 2018 14:40:36 +0100 (BST) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B689B4C044; Thu, 23 Aug 2018 14:40:35 +0100 (BST) Received: from [9.152.224.92] (unknown [9.152.224.92]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 23 Aug 2018 14:40:35 +0100 (BST) Reply-To: pmorel@linux.ibm.com Subject: Re: [PATCH v3 3/3] KVM: s390: vsie: Make use of CRYCB FORMAT2 clear To: David Hildenbrand , Janosch Frank Cc: linux-kernel@vger.kernel.org, cohuck@redhat.com, linux-s390@vger.kernel.org, kvm@vger.kernel.org, akrowiak@linux.ibm.com, borntraeger@de.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com References: <1535019956-23539-1-git-send-email-pmorel@linux.ibm.com> <1535019956-23539-4-git-send-email-pmorel@linux.ibm.com> <912d013c-c925-fb3e-ed1d-2d778a60c189@linux.ibm.com> From: Pierre Morel Date: Thu, 23 Aug 2018 13:40:34 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18082311-0016-0000-0000-000001FAAD87 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18082311-0017-0000-0000-000032510862 Message-Id: <3d50d093-f92f-660e-cf7c-9b2cf0fddd83@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-23_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808230125 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 23/08/2018 13:21, David Hildenbrand wrote: > On 23.08.2018 13:05, Janosch Frank wrote: >> On 8/23/18 12:25 PM, Pierre Morel wrote: >>> The comment preceding the shadow_crycb function is >>> misleading, we effectively accept FORMAT2 CRYCB in the >>> guest. >> >> I beg to differ: >> >> if (!(crycbd_o & vcpu->arch.sie_block->crycbd & CRYCB_FORMAT1)) >> return 0; > > FORMAT2 includes bit FORMAT1 (backwards compatible) > >> >>> >>> When using FORMAT2 in the host we do not need to or with >>> FORMAT1. >>> >>> Signed-off-by: Pierre Morel >>> --- >>> arch/s390/kvm/vsie.c | 6 +++--- >>> 1 file changed, 3 insertions(+), 3 deletions(-) >>> >>> diff --git a/arch/s390/kvm/vsie.c b/arch/s390/kvm/vsie.c >>> index 38ea5da..e0e6fbf 100644 >>> --- a/arch/s390/kvm/vsie.c >>> +++ b/arch/s390/kvm/vsie.c >>> @@ -140,7 +140,8 @@ static int prepare_cpuflags(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page) >>> * Create a shadow copy of the crycb block and setup key wrapping, if >>> * requested for guest 3 and enabled for guest 2. >>> * >>> - * We only accept format-1 (no AP in g2), but convert it into format-2 >>> + * We accept format-1 or format-2, but we treat it as a format-1 (no AP in g2), >>> + * and we convert it into format-2 in the shadow CRYCB. >>> * There is nothing to do for format-0. >>> * >>> * Returns: - 0 if shadowed or nothing to do >>> @@ -179,8 +180,7 @@ static int shadow_crycb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page) >>> return set_validity_icpt(scb_s, 0x0035U); >>> >>> scb_s->ecb3 |= ecb3_flags; >>> - scb_s->crycbd = ((__u32)(__u64) &vsie_page->crycb) | CRYCB_FORMAT1 | >>> - CRYCB_FORMAT2; >>> + scb_s->crycbd = ((__u32)(__u64) &vsie_page->crycb) | CRYCB_FORMAT2; >> >> That's purely cosmetic but valid. >> >>> >>> /* xor both blocks in one run */ >>> b1 = (unsigned long *) vsie_page->crycb.dea_wrapping_key_mask; > > Reviewed-by: David Hildenbrand > Thanks, regards, Pierre -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany