Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1775447pxb; Wed, 9 Feb 2022 04:20:58 -0800 (PST) X-Google-Smtp-Source: ABdhPJwy1xOkpMwCKl4fzq5iRFsvhQg112v0vN+tSdYGIGrKYQDZLZrF5rz8y1lXJFZatlQ31ckp X-Received: by 2002:a17:902:d882:: with SMTP id b2mr2125256plz.162.1644409257953; Wed, 09 Feb 2022 04:20:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644409257; cv=none; d=google.com; s=arc-20160816; b=dguzJL5UnraDUmbprX6NsDANqI5cFfdrCeFxdx13jZS0jrDrirxDJSAh8nBWaTka2B Bvy+FEJYtHUyYzznFiCM9dpMMYGHaWa+t7P8GLeCBLBZchj+2GkL7JtHuN5td9RDcG9i 4dPgfIcMvTnPvEPhoTJIrNQBBwDICC4YJNRbz/UM6CkSJFLmzCq8LgnPBvZvmmzblL9b Nsbd9PbHxE/4VvzG/8fZpfeeDyxs5z2pg3p3IzfWtGr5NDthFoYNurPm5PSErTmMSekV gbdT6LMRV6vdoOy4I4WFbfjtdm8CBElBQswUrwOV8bNXQ9lRwuvjod82ws0Bd9MuVu4/ U8xA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=jpbq3bXhV/I9byyOp8DsI3BExLIm5tgHtUGCuiUnn4Y=; b=CWuPtQMQ8fiA8A1c3gf/BdnFcVIYd6lpKhqBAVM1dRAt/RWJwGbd9YVPpX5uB4WuQk 9xMAfkbsiDnt4kkCFfOFm77m9FzVZG+p+Tq2M9gvxW+OWJTrY3iKxQ/1NbqpisGQiPCB H6JfiHTywecrE7b/54knLUXJNLf9gUOC/ahWQkrX0FVNWavIuhwWIhnKdUCUdH4B++/I 9G25CmYWrg6kBzqeOqLIZGEILnJ2oW3DHFGg8rUP1uUw4SaLUnlAEVVV14ISKvjUtVgZ E/23lsiyjnATtpXWXpTXjy2cuVbbycHSlzOVaOuTr28ni2o4BZnKFdqem6hL7hKNSDpW oRdQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=HCKd+v60; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bj28si4493920pgb.851.2022.02.09.04.20.42; Wed, 09 Feb 2022 04:20:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=HCKd+v60; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230481AbiBILtM (ORCPT + 99 others); Wed, 9 Feb 2022 06:49:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49910 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230356AbiBILtK (ORCPT ); Wed, 9 Feb 2022 06:49:10 -0500 Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 65D87E14B3D5; Wed, 9 Feb 2022 02:39:38 -0800 (PST) Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 219A2Keu009793; Wed, 9 Feb 2022 10:39:22 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : date : mime-version : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=jpbq3bXhV/I9byyOp8DsI3BExLIm5tgHtUGCuiUnn4Y=; b=HCKd+v60dNswxshlcwQ20FhhiY+zIdnBidO2n4fY6KcXcoj6kZRcrvOQKFj0+OwtW6OG eVLnMS22e5n1tZky5NsiX7kqs7/yYvtho83bdomuyAJirajoKbdBV1OaAIRczhaLWv4p 1DERAl8JthN06KLiL4b1CN4pR5W4Tb3enskrkBFkrnVxBLyrHwSQsGB9E4IW4ef/emvC ofeZegqBQDytgnVDl+qM+l0OxMZ96UWOnc5UD+bqaSxttckLjR1+W+QbF/ogMiC+d30a 1vXv+DhyCfWN6wcXsbQr4QOmHNshWwk8ArCH2k9FL7uAgI6VN2t5wbN8Kco8EbuHq4XY OA== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com with ESMTP id 3e44v6sjq5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Feb 2022 10:39:22 +0000 Received: from m0098394.ppops.net (m0098394.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 219AasTZ025401; Wed, 9 Feb 2022 10:39:22 GMT Received: from ppma01fra.de.ibm.com (46.49.7a9f.ip4.static.sl-reverse.com [159.122.73.70]) by mx0a-001b2d01.pphosted.com with ESMTP id 3e44v6sjp9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Feb 2022 10:39:22 +0000 Received: from pps.filterd (ppma01fra.de.ibm.com [127.0.0.1]) by ppma01fra.de.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 219AN3MH026838; Wed, 9 Feb 2022 10:39:18 GMT Received: from b06cxnps4075.portsmouth.uk.ibm.com (d06relay12.portsmouth.uk.ibm.com [9.149.109.197]) by ppma01fra.de.ibm.com with ESMTP id 3e1gv9mcme-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Feb 2022 10:39:18 +0000 Received: from b06wcsmtp001.portsmouth.uk.ibm.com (b06wcsmtp001.portsmouth.uk.ibm.com [9.149.105.160]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 219AdCFh45613338 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 9 Feb 2022 10:39:12 GMT Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D172BA4066; Wed, 9 Feb 2022 10:39:12 +0000 (GMT) Received: from b06wcsmtp001.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 43F66A405C; Wed, 9 Feb 2022 10:39:12 +0000 (GMT) Received: from [9.171.75.42] (unknown [9.171.75.42]) by b06wcsmtp001.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 9 Feb 2022 10:39:12 +0000 (GMT) Message-ID: <83408abf-86fe-20b0-564c-8cf840757e76@linux.ibm.com> Date: Wed, 9 Feb 2022 11:39:11 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Subject: Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL Content-Language: en-US To: Christian Borntraeger , Heiko Carstens , Janosch Frank Cc: Alexander Gordeev , Claudio Imbrenda , David Hildenbrand , Jonathan Corbet , kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, Paolo Bonzini , Sven Schnelle , Vasily Gorbik References: <20220207165930.1608621-1-scgl@linux.ibm.com> <20220207165930.1608621-6-scgl@linux.ibm.com> <48d1678f-746c-dab6-5ec3-56397277f752@linux.ibm.com> <71f07914-d0b2-e98b-22b2-bc05f04df2da@linux.ibm.com> <6ea27647-fbbe-3962-03a0-8ca5340fc7fd@linux.ibm.com> <8d502356c3a624847c0dd2fe5d5f60e72923a141.camel@linux.ibm.com> <3ec91f7a-10ca-b984-d852-1327f965b1e8@linux.ibm.com> From: Janis Schoetterl-Glausch In-Reply-To: <3ec91f7a-10ca-b984-d852-1327f965b1e8@linux.ibm.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-GUID: pYMWcvOKFhHuHLTrElNuh8HQjctThqO- X-Proofpoint-ORIG-GUID: 5qN7JpUZBHnh3p9O1jX3Krd6ROriWRKJ X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-02-09_05,2022-02-09_01,2021-12-02_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 lowpriorityscore=0 bulkscore=0 suspectscore=0 malwarescore=0 phishscore=0 mlxlogscore=999 clxscore=1015 priorityscore=1501 mlxscore=0 adultscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202090066 X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_MSPIKE_H5, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/9/22 11:08, Christian Borntraeger wrote: > > > Am 09.02.22 um 11:01 schrieb Janis Schoetterl-Glausch: >> On Wed, 2022-02-09 at 10:08 +0100, Christian Borntraeger wrote: >>> >>> Am 09.02.22 um 09:49 schrieb Janis Schoetterl-Glausch: >>>> On 2/9/22 08:34, Christian Borntraeger wrote: >>>>> Am 07.02.22 um 17:59 schrieb Janis Schoetterl-Glausch: >>>>>> User space needs a mechanism to perform key checked accesses when >>>>>> emulating instructions. >>>>>> >>>>>> The key can be passed as an additional argument. >>>>>> Having an additional argument is flexible, as user space can >>>>>> pass the guest PSW's key, in order to make an access the same way the >>>>>> CPU would, or pass another key if necessary. >>>>>> >>>>>> Signed-off-by: Janis Schoetterl-Glausch >>>>>> Acked-by: Janosch Frank >>>>>> Reviewed-by: Claudio Imbrenda >>>>>> --- >>>>>>     arch/s390/kvm/kvm-s390.c | 49 +++++++++++++++++++++++++++++++--------- >>>>>>     include/uapi/linux/kvm.h |  8 +++++-- >>>>>>     2 files changed, 44 insertions(+), 13 deletions(-) >>>>>> >>>>>> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c >>>>>> index cf347e1a4f17..71e61fb3f0d9 100644 >>>>>> --- a/arch/s390/kvm/kvm-s390.c >>>>>> +++ b/arch/s390/kvm/kvm-s390.c >>>>>> @@ -32,6 +32,7 @@ >>>>>>     #include >>>>>>     #include >>>>>>     #include >>>>>> +#include >>>>>>       #include >>>>>>     #include >>>>>> @@ -2359,6 +2360,11 @@ static int kvm_s390_handle_pv(struct kvm *kvm, struct kvm_pv_cmd *cmd) >>>>>>         return r; >>>>>>     } >>>>>>     +static bool access_key_invalid(u8 access_key) >>>>>> +{ >>>>>> +    return access_key > 0xf; >>>>>> +} >>>>>> + >>>>>>     long kvm_arch_vm_ioctl(struct file *filp, >>>>>>                    unsigned int ioctl, unsigned long arg) >>>>>>     { >>>>>> @@ -4687,34 +4693,54 @@ static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu, >>>>>>                       struct kvm_s390_mem_op *mop) >>>>>>     { >>>>>>         void __user *uaddr = (void __user *)mop->buf; >>>>>> +    u8 access_key = 0, ar = 0; >>>>>>         void *tmpbuf = NULL; >>>>>> +    bool check_reserved; >>>>>>         int r = 0; >>>>>>         const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION >>>>>> -                    | KVM_S390_MEMOP_F_CHECK_ONLY; >>>>>> +                    | KVM_S390_MEMOP_F_CHECK_ONLY >>>>>> +                    | KVM_S390_MEMOP_F_SKEY_PROTECTION; >>>>>>     -    if (mop->flags & ~supported_flags || mop->ar >= NUM_ACRS || !mop->size) >>>>>> +    if (mop->flags & ~supported_flags || !mop->size) >>>>>>             return -EINVAL; >>>>>> - >>>>>>         if (mop->size > MEM_OP_MAX_SIZE) >>>>>>             return -E2BIG; >>>>>> - >>>>>>         if (kvm_s390_pv_cpu_is_protected(vcpu)) >>>>>>             return -EINVAL; >>>>>> - >>>>>>         if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) { >>>>>>             tmpbuf = vmalloc(mop->size); >>>>>>             if (!tmpbuf) >>>>>>                 return -ENOMEM; >>>>>>         } >>>>>> +    ar = mop->ar; >>>>>> +    mop->ar = 0; >>>>> >>>>> Why this assignment to 0? >>>> >>>> It's so the check of reserved below works like that, they're all part of the anonymous union. >>> >>> Ah, I see. This is ugly :-) >> >> Yes :) >>> >>>>>> +    if (ar >= NUM_ACRS) >>>>>> +        return -EINVAL; >>>>>> +    if (mop->flags & KVM_S390_MEMOP_F_SKEY_PROTECTION) { >>>>>> +        access_key = mop->key; >>>>>> +        mop->key = 0; >>>>> >>>>> and this? I think we can leave mop unchanged. >>>>> >>>>> In fact, why do we add the ar and access_key variable? >>>>> This breaks the check from above (if (mop->flags & ~supported_flags || mop->ar >= NUM_ACRS || !mop->size))  into two checks >>>>> and it will create a memleak for tmpbuf. >>>> >>>> I can move the allocation down, goto out or get rid of the reserved check and keep everything as before. >>>> First is simpler, but second makes handling that case more explicit and might help in the future. >>> >>> Maybe add a reserved_02 field in the anon struct and check this for being zero and get rid of the local variables? >> >> I think that would require us adding new fields in the struct by putting them in a union with reserved_02 and so on, >> which could get rather messy. > > I think it is fine to rename reserved_02. Maybe rename that to dont_use_02 ? I don't know what kind of stability guarantees we give here, since it can only happen when recompiling with a new header. dont_use is a lot better than reserved here, after all we tell user space to set reserved bytes to 0, using reserved_02 to do that would be quite handy and therefore likely. The question is also what semantic we want for the check. The way it works right now, user space also needs to set unused fields to 0, e.g. key if the flag is not set. At least this is the case for the vm memop, the vcpu memop cannot do that because of backward compatibility. >> >> Maybe a comment is good enought? >>> >>>> Patch 6 has the same issue in the vm ioctl handler. >>>>> Simply use mop->key and mop->ar below and get rid of the local variables. >>>>> The structure has no concurrency and gcc will handle that just as the local variable. >>>>> >>>>> Other than that this looks good. >>>> >>>> [...] >>>> >>