Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp449606ybe; Wed, 4 Sep 2019 02:17:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqwwdHmXPHrlTX+LKZREz0yr2RtAa7NbCbFLcw185zh+mdZk+83im/jNUP8gET6ESk1rVVt4 X-Received: by 2002:a17:902:e48d:: with SMTP id cj13mr39167336plb.177.1567588672368; Wed, 04 Sep 2019 02:17:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567588672; cv=none; d=google.com; s=arc-20160816; b=oWZREXIy5Zi3R21QpgK2dLsIWmFWZcqa/9ba6zqqiajHrVv0xF/0ief88DnRarVRuQ 1B/xFBP5tT6daquCMjmEzGa9X6EegnLNJDzSFr58SZjBf/bsdzgcJ1WLSRNpz8Gp8BGs uG51pyx+sEwEA/jjzIoe+w8VarLVpI3L2iPIIDRtEG9wAmVIieYUqxlnU3IWvqebxja1 m1VEQOd9LxyimTn980qqyssYfrxALVRnzno3o4aUhbMsF1Pj0q7JQ2oLUDiDWVJ0lIRR M0av0NoHhJUOcNfPKT5pkWlguUjHCXmpNV1AGpEyzXJt7HnAQCgR8bDvGhV6FaT79LHm YQ2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:autocrypt:openpgp:from:references:cc:to :subject; bh=sFVHWcYkbGTgpKtrO2i9y7M5jc8aT5PRzq0/nz24+Qw=; b=0ykeWVoTas9L/8znA4oC6n1UN6L5/z8RkRcIzVas7wXYommZtvgMm+xleD6cZ9REPf cnPfr3sF/F+qgH6/mGMAA/LXkdkjpLu+zENIrKHtkI/0kztIOtEWqtanpACHE3moTAZj yAK0Kx5fpzTnLUybVDiZzW02vZElCQUPMhcB0kZwkyHmxGKP4txXSWr5BjXrefCc/Wi2 uhj1VgVpvsjhccxXK9fQ/Ro1QtnFr94MnXJ5jhYiYqqwcRZUEl3yrZSj2pceskRLOU6S v/NAHuh/X4sXpcvc7CeZ8morjJVLhzX4etxNexyxfMCZsZOjSQX9SaDcAXcYXSCUoF44 SPSw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x139si16952063pgx.251.2019.09.04.02.17.35; Wed, 04 Sep 2019 02:17:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729457AbfIDJPd (ORCPT + 99 others); Wed, 4 Sep 2019 05:15:33 -0400 Received: from mx1.redhat.com ([209.132.183.28]:48046 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726045AbfIDJPd (ORCPT ); Wed, 4 Sep 2019 05:15:33 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id CC5D330842A8; Wed, 4 Sep 2019 09:15:32 +0000 (UTC) Received: from [10.36.118.26] (unknown [10.36.118.26]) by smtp.corp.redhat.com (Postfix) with ESMTP id D543B600CD; Wed, 4 Sep 2019 09:15:30 +0000 (UTC) Subject: Re: [PATCH v2 1/2] KVM: s390: Disallow invalid bits in kvm_valid_regs and kvm_dirty_regs To: Christian Borntraeger , Thomas Huth , kvm@vger.kernel.org, Janosch Frank Cc: Cornelia Huck , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org References: <20190904085200.29021-1-thuth@redhat.com> <20190904085200.29021-2-thuth@redhat.com> <8f48d9dd-1464-75aa-2011-b15adc5a4eab@de.ibm.com> From: David Hildenbrand Openpgp: preference=signencrypt Autocrypt: addr=david@redhat.com; prefer-encrypt=mutual; keydata= xsFNBFXLn5EBEAC+zYvAFJxCBY9Tr1xZgcESmxVNI/0ffzE/ZQOiHJl6mGkmA1R7/uUpiCjJ dBrn+lhhOYjjNefFQou6478faXE6o2AhmebqT4KiQoUQFV4R7y1KMEKoSyy8hQaK1umALTdL QZLQMzNE74ap+GDK0wnacPQFpcG1AE9RMq3aeErY5tujekBS32jfC/7AnH7I0v1v1TbbK3Gp XNeiN4QroO+5qaSr0ID2sz5jtBLRb15RMre27E1ImpaIv2Jw8NJgW0k/D1RyKCwaTsgRdwuK Kx/Y91XuSBdz0uOyU/S8kM1+ag0wvsGlpBVxRR/xw/E8M7TEwuCZQArqqTCmkG6HGcXFT0V9 PXFNNgV5jXMQRwU0O/ztJIQqsE5LsUomE//bLwzj9IVsaQpKDqW6TAPjcdBDPLHvriq7kGjt WhVhdl0qEYB8lkBEU7V2Yb+SYhmhpDrti9Fq1EsmhiHSkxJcGREoMK/63r9WLZYI3+4W2rAc UucZa4OT27U5ZISjNg3Ev0rxU5UH2/pT4wJCfxwocmqaRr6UYmrtZmND89X0KigoFD/XSeVv jwBRNjPAubK9/k5NoRrYqztM9W6sJqrH8+UWZ1Idd/DdmogJh0gNC0+N42Za9yBRURfIdKSb B3JfpUqcWwE7vUaYrHG1nw54pLUoPG6sAA7Mehl3nd4pZUALHwARAQABzSREYXZpZCBIaWxk ZW5icmFuZCA8ZGF2aWRAcmVkaGF0LmNvbT7CwX4EEwECACgFAljj9eoCGwMFCQlmAYAGCwkI BwMCBhUIAgkKCwQWAgMBAh4BAheAAAoJEE3eEPcA/4Na5IIP/3T/FIQMxIfNzZshIq687qgG 8UbspuE/YSUDdv7r5szYTK6KPTlqN8NAcSfheywbuYD9A4ZeSBWD3/NAVUdrCaRP2IvFyELj xoMvfJccbq45BxzgEspg/bVahNbyuBpLBVjVWwRtFCUEXkyazksSv8pdTMAs9IucChvFmmq3 jJ2vlaz9lYt/lxN246fIVceckPMiUveimngvXZw21VOAhfQ+/sofXF8JCFv2mFcBDoa7eYob s0FLpmqFaeNRHAlzMWgSsP80qx5nWWEvRLdKWi533N2vC/EyunN3HcBwVrXH4hxRBMco3jvM m8VKLKao9wKj82qSivUnkPIwsAGNPdFoPbgghCQiBjBe6A75Z2xHFrzo7t1jg7nQfIyNC7ez MZBJ59sqA9EDMEJPlLNIeJmqslXPjmMFnE7Mby/+335WJYDulsRybN+W5rLT5aMvhC6x6POK z55fMNKrMASCzBJum2Fwjf/VnuGRYkhKCqqZ8gJ3OvmR50tInDV2jZ1DQgc3i550T5JDpToh dPBxZocIhzg+MBSRDXcJmHOx/7nQm3iQ6iLuwmXsRC6f5FbFefk9EjuTKcLMvBsEx+2DEx0E UnmJ4hVg7u1PQ+2Oy+Lh/opK/BDiqlQ8Pz2jiXv5xkECvr/3Sv59hlOCZMOaiLTTjtOIU7Tq 7ut6OL64oAq+zsFNBFXLn5EBEADn1959INH2cwYJv0tsxf5MUCghCj/CA/lc/LMthqQ773ga uB9mN+F1rE9cyyXb6jyOGn+GUjMbnq1o121Vm0+neKHUCBtHyseBfDXHA6m4B3mUTWo13nid 0e4AM71r0DS8+KYh6zvweLX/LL5kQS9GQeT+QNroXcC1NzWbitts6TZ+IrPOwT1hfB4WNC+X 2n4AzDqp3+ILiVST2DT4VBc11Gz6jijpC/KI5Al8ZDhRwG47LUiuQmt3yqrmN63V9wzaPhC+ xbwIsNZlLUvuRnmBPkTJwwrFRZvwu5GPHNndBjVpAfaSTOfppyKBTccu2AXJXWAE1Xjh6GOC 8mlFjZwLxWFqdPHR1n2aPVgoiTLk34LR/bXO+e0GpzFXT7enwyvFFFyAS0Nk1q/7EChPcbRb hJqEBpRNZemxmg55zC3GLvgLKd5A09MOM2BrMea+l0FUR+PuTenh2YmnmLRTro6eZ/qYwWkC u8FFIw4pT0OUDMyLgi+GI1aMpVogTZJ70FgV0pUAlpmrzk/bLbRkF3TwgucpyPtcpmQtTkWS gDS50QG9DR/1As3LLLcNkwJBZzBG6PWbvcOyrwMQUF1nl4SSPV0LLH63+BrrHasfJzxKXzqg rW28CTAE2x8qi7e/6M/+XXhrsMYG+uaViM7n2je3qKe7ofum3s4vq7oFCPsOgwARAQABwsFl BBgBAgAPBQJVy5+RAhsMBQkJZgGAAAoJEE3eEPcA/4NagOsP/jPoIBb/iXVbM+fmSHOjEshl KMwEl/m5iLj3iHnHPVLBUWrXPdS7iQijJA/VLxjnFknhaS60hkUNWexDMxVVP/6lbOrs4bDZ NEWDMktAeqJaFtxackPszlcpRVkAs6Msn9tu8hlvB517pyUgvuD7ZS9gGOMmYwFQDyytpepo YApVV00P0u3AaE0Cj/o71STqGJKZxcVhPaZ+LR+UCBZOyKfEyq+ZN311VpOJZ1IvTExf+S/5 lqnciDtbO3I4Wq0ArLX1gs1q1XlXLaVaA3yVqeC8E7kOchDNinD3hJS4OX0e1gdsx/e6COvy qNg5aL5n0Kl4fcVqM0LdIhsubVs4eiNCa5XMSYpXmVi3HAuFyg9dN+x8thSwI836FoMASwOl C7tHsTjnSGufB+D7F7ZBT61BffNBBIm1KdMxcxqLUVXpBQHHlGkbwI+3Ye+nE6HmZH7IwLwV W+Ajl7oYF+jeKaH4DZFtgLYGLtZ1LDwKPjX7VAsa4Yx7S5+EBAaZGxK510MjIx6SGrZWBrrV TEvdV00F2MnQoeXKzD7O4WFbL55hhyGgfWTHwZ457iN9SgYi1JLPqWkZB0JRXIEtjd4JEQcx +8Umfre0Xt4713VxMygW0PnQt5aSQdMD58jHFxTk092mU+yIHj5LeYgvwSgZN4airXk5yRXl SE+xAvmumFBY Organization: Red Hat GmbH Message-ID: Date: Wed, 4 Sep 2019 11:15:30 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <8f48d9dd-1464-75aa-2011-b15adc5a4eab@de.ibm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.40]); Wed, 04 Sep 2019 09:15:32 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 04.09.19 11:11, Christian Borntraeger wrote: > > > On 04.09.19 11:05, David Hildenbrand wrote: >> On 04.09.19 10:51, Thomas Huth wrote: >>> If unknown bits are set in kvm_valid_regs or kvm_dirty_regs, this >>> clearly indicates that something went wrong in the KVM userspace >>> application. The x86 variant of KVM already contains a check for >>> bad bits, so let's do the same on s390x now, too. >>> >>> Reviewed-by: Janosch Frank >>> Reviewed-by: Christian Borntraeger >>> Reviewed-by: Cornelia Huck >>> Signed-off-by: Thomas Huth >>> --- >>> arch/s390/include/uapi/asm/kvm.h | 6 ++++++ >>> arch/s390/kvm/kvm-s390.c | 4 ++++ >>> 2 files changed, 10 insertions(+) >>> >>> diff --git a/arch/s390/include/uapi/asm/kvm.h b/arch/s390/include/uapi/asm/kvm.h >>> index 47104e5b47fd..436ec7636927 100644 >>> --- a/arch/s390/include/uapi/asm/kvm.h >>> +++ b/arch/s390/include/uapi/asm/kvm.h >>> @@ -231,6 +231,12 @@ struct kvm_guest_debug_arch { >>> #define KVM_SYNC_GSCB (1UL << 9) >>> #define KVM_SYNC_BPBC (1UL << 10) >>> #define KVM_SYNC_ETOKEN (1UL << 11) >>> + >>> +#define KVM_SYNC_S390_VALID_FIELDS \ >>> + (KVM_SYNC_PREFIX | KVM_SYNC_GPRS | KVM_SYNC_ACRS | KVM_SYNC_CRS | \ >>> + KVM_SYNC_ARCH0 | KVM_SYNC_PFAULT | KVM_SYNC_VRS | KVM_SYNC_RICCB | \ >>> + KVM_SYNC_FPRS | KVM_SYNC_GSCB | KVM_SYNC_BPBC | KVM_SYNC_ETOKEN) >>> + >> >> We didn't care about the S390 for the actual flags, why care now? > > I think it makes sense to have the interface as defined as possible. If for some > reason userspace sets a wrong bit this would be undetected. If we at a later point > in time use that bit this would resultin strange problems. Not arguing about the concept of checking for valid bits. Was just wondering if the "S390" part in the name makes sense at all. But you guys seem to have a consent here. -- Thanks, David / dhildenb