Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1819562imm; Thu, 23 Aug 2018 09:14:53 -0700 (PDT) X-Google-Smtp-Source: AA+uWPwzH3J5g6/WPnhKevRrs0MimatUiba8PrHR9Kr77CqOWtc0vT9siq993fqrDX0LuFdb6BW8 X-Received: by 2002:a62:c0c4:: with SMTP id g65-v6mr63150306pfk.72.1535040893314; Thu, 23 Aug 2018 09:14:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535040893; cv=none; d=google.com; s=arc-20160816; b=dCSPMia4b+TIIWXCfG8XY/xvKiPhJ3uZGj7DSw+g+5bNbDqcp5yzFUAD2VlornT8Vw EzkqC/GH8inj2kp+ThlcNNdJymxN8fXP+yf6dHIlYE5mYc/WbaNLRubOCF7vexoI4CLB YJxUkeHjztRbNbV0XDQYq4m8HWmkqKxWNKfF3cWr0IQvYRX/knL9HIezBciWw/O5HRji S8wKjZryuL4OmJqSaPVBxBD7n5T6gJ1UqnQTyLXBhskwhA+muP1Q5NSeUx8UXGlzHZBW ophW6VK9HwNZ68ctHZIRCH8hmvy3nXRCoB/IrmmkvYngn8DV1nUYa2+ITSKlYku4Ixre 1aZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:reply-to:arc-authentication-results; bh=HszKhYYrAQvLZrMgF+X8zLMEWyOgLC5Jm6LxPlPEZXg=; b=u0HQ46+Q5eCasyzemlaZyDOFgmSnw+ibdsrZowz/ySVVtA2S+F5we4YiccB3Jhiw+e BkugJ/x6UJiHQ+v/K7WPMk2mAVZhZxHi0wNyZ5iVyrjGHkZ0gUtsNX3hXLaKrmMGJvbX w8I0FV3wUkJ0KZHL37sV50QcsKoMyKDeSv7pztrdgTK7JeHIRv1LVIoVMIm2n+TEGsZ3 L063cLmc1xK+tWnskLjabl0OD7DXW8T3NxxRpsp4R59kjoVzya/Ih7FnY8R4VU9fmeFX vCm1OWPZJ41sIQGYVqwRZJBJiK0APiNNk9567u5KOThqZ5r/JLL4gs2Am+mLkrc25Tx5 DQvA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 205-v6si4697103pgd.271.2018.08.23.09.14.38; Thu, 23 Aug 2018 09:14:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731809AbeHWPIe (ORCPT + 99 others); Thu, 23 Aug 2018 11:08:34 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:40216 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729243AbeHWPId (ORCPT ); Thu, 23 Aug 2018 11:08:33 -0400 Received: from pps.filterd (m0098410.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w7NBZQ3E073986 for ; Thu, 23 Aug 2018 07:39:14 -0400 Received: from e06smtp03.uk.ibm.com (e06smtp03.uk.ibm.com [195.75.94.99]) by mx0a-001b2d01.pphosted.com with ESMTP id 2m1u13tw9d-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 23 Aug 2018 07:39:13 -0400 Received: from localhost by e06smtp03.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 23 Aug 2018 12:39:10 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp03.uk.ibm.com (192.168.101.133) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Thu, 23 Aug 2018 12:39:06 +0100 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w7NBd49O23199850 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 23 Aug 2018 11:39:04 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 2FC884C04E; Thu, 23 Aug 2018 14:39:06 +0100 (BST) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D5E7F4C040; Thu, 23 Aug 2018 14:39:05 +0100 (BST) Received: from [9.152.224.92] (unknown [9.152.224.92]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 23 Aug 2018 14:39:05 +0100 (BST) Reply-To: pmorel@linux.ibm.com Subject: Re: [PATCH v3 2/3] KVM: s390: vsie: Do the CRYCB validation first To: Christian Borntraeger , david@redhat.com Cc: linux-kernel@vger.kernel.org, cohuck@redhat.com, linux-s390@vger.kernel.org, kvm@vger.kernel.org, frankja@linux.ibm.com, akrowiak@linux.ibm.com, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com References: <1535019956-23539-1-git-send-email-pmorel@linux.ibm.com> <1535019956-23539-3-git-send-email-pmorel@linux.ibm.com> From: Pierre Morel Date: Thu, 23 Aug 2018 13:39:04 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18082311-0012-0000-0000-0000029DA7DE X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18082311-0013-0000-0000-000020D0EF7E Message-Id: <33decece-3b10-0baf-9122-8ea76a65101a@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-08-23_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1807170000 definitions=main-1808230125 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 23/08/2018 13:17, Christian Borntraeger wrote: > > > On 08/23/2018 12:25 PM, Pierre Morel wrote: >> When entering the SIE the CRYCB validation better >> be done independently of the instruction's >> availability. > > Maybe something like > > We need to handle the validity checks for the crycb, no matter what the > settings for the keywrappings are. So lets move the keywrapping checks > after we have done the validy checks. > > ? OK thanks, I use this. regards, Pierre > >> >> Signed-off-by: Pierre Morel >> --- >> arch/s390/kvm/vsie.c | 11 ++++++----- >> 1 file changed, 6 insertions(+), 5 deletions(-) >> >> diff --git a/arch/s390/kvm/vsie.c b/arch/s390/kvm/vsie.c >> index 12b9707..38ea5da 100644 >> --- a/arch/s390/kvm/vsie.c >> +++ b/arch/s390/kvm/vsie.c >> @@ -161,17 +161,18 @@ static int shadow_crycb(struct kvm_vcpu *vcpu, struct vsie_page *vsie_page) >> /* format-1 is supported with message-security-assist extension 3 */ >> if (!test_kvm_facility(vcpu->kvm, 76)) >> return 0; >> - /* we may only allow it if enabled for guest 2 */ >> - ecb3_flags = scb_o->ecb3 & vcpu->arch.sie_block->ecb3 & >> - (ECB3_AES | ECB3_DEA); >> - if (!ecb3_flags) >> - return 0; >> >> if ((crycb_addr & PAGE_MASK) != ((crycb_addr + 128) & PAGE_MASK)) >> return set_validity_icpt(scb_s, 0x003CU); >> else if (!crycb_addr) >> return set_validity_icpt(scb_s, 0x0039U); >> >> + /* we may only allow it if enabled for guest 2 */ >> + ecb3_flags = scb_o->ecb3 & vcpu->arch.sie_block->ecb3 & >> + (ECB3_AES | ECB3_DEA); >> + if (!ecb3_flags) >> + return 0; >> + >> /* copy only the wrapping keys */ >> if (read_guest_real(vcpu, crycb_addr + 72, >> vsie_page->crycb.dea_wrapping_key_mask, 56)) >> -- Pierre Morel Linux/KVM/QEMU in Böblingen - Germany