Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1815088pxb; Wed, 9 Feb 2022 05:12:35 -0800 (PST) X-Google-Smtp-Source: ABdhPJxoM5/YHoTklRjUhpJ3LC0GzmAevS+6t+qMHGVm6dBmlfR/8SQQ6R02t8fJlo6mJ/lvLryH X-Received: by 2002:a05:6a00:1a09:: with SMTP id g9mr2183216pfv.41.1644412355224; Wed, 09 Feb 2022 05:12:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644412355; cv=none; d=google.com; s=arc-20160816; b=HhBJ2JIMm3vZR8zEu3cxvVfeNBvmMbfs1yiFgnGtfX0DCH5Y9aH4xwnldMkta5rHar tmCb/D+UfUoam428/sba8JFSPfq74KyON7BbbMIKldeccrvyBkHOpQltvF0BgLsyVbUk JniiyhoV0dMkCBRZ6ZgAs5vM6G1hcpE5medxxhhqItyCcuMhKNwTQNNqypqT21LbiJ/5 bhb5d9BDtp74JVcXvAB8AVYN2cMs3fvL5NJeO6QLS6usrAItwKOsTT7k7lWzssstOfoa TpTvDdledPrdlDmRBnUzvyojGDitYv9r2Lk4yGUEuTUnEWzZZscq/CooYPvJfvXkfx5J hesA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=cJD+Hr0UhnxLjBiyoVnf2N+zOF8DSd40RDY7Fo305Zs=; b=UMxXtiHagNCG5qgxtzDU/9qjdylXYU6hJfYkcWdz1ZPz7Qe3WKKEYDjWdhBZs5LjqQ R0nKDNnSVn1b7XpSetNXV3GVx4+xmAB/s8f3rmtwOtdKlkBJg1iaNAi3nnbFFsZ1l1Z9 Ce22j6AnRJ7K/yYT5dgszL14jtQYYD9C/YfMpL4RHV8RK/lndkw/jnLAHDGMsAMzFrzl yqAt/7dMf11vo7BSSO4SPFecYIOHidSEcThA8SlNHUa59MH6KpBN5V7JGbj0yZgjgVUi zwvZTM0uJOKfQo32InH/p7iF6mJlirCMi3oTd4CIq0OuXOvMhI4zc37rAZfUr//4ICVv 0qaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=chZEeXBx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id o18si1415642pgu.624.2022.02.09.05.12.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 09 Feb 2022 05:12:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@ibm.com header.s=pp1 header.b=chZEeXBx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 795E7E18004D; Wed, 9 Feb 2022 02:37:21 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233803AbiBIKIM (ORCPT + 99 others); Wed, 9 Feb 2022 05:08:12 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58552 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233140AbiBIKID (ORCPT ); Wed, 9 Feb 2022 05:08:03 -0500 Received: from mx0a-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com [148.163.158.5]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B2A5CC014A95; Wed, 9 Feb 2022 02:07:11 -0800 (PST) Received: from pps.filterd (m0098414.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 2198d1Kx014683; Wed, 9 Feb 2022 08:49:28 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=message-id : date : mime-version : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding; s=pp1; bh=cJD+Hr0UhnxLjBiyoVnf2N+zOF8DSd40RDY7Fo305Zs=; b=chZEeXBxyKk/HWnuSGCv6Q0MhHWXn755yxasV7J4XemPWlfKF3FmK1CC1G0Z5bmNXwoe vEgk9vApDSAnZUFIUVqHi6N3ppdGnHguVv5z75JLqDXc52W0Oyt1k3l5hqHcvgGtPL8x 4jmF9GpnF8oJtSqO5c1y6o5UsUcA0SSXpvJ+VAfxoiy3KjOw9Th0eQtEdsQ1QFAjl4SK Ne4HMF46ovlZz9N7EgYZp70GJupHRBLqGPu1ApqVfAdloqv19vMV3t5o/QROV+6GEZBE CW4VV29XPMUSPYvX+7x1nSl6SopDwLqYL59TcKINRQEXk5i7M4g5aS9LOHAIDNUdLD88 iw== Received: from pps.reinject (localhost [127.0.0.1]) by mx0b-001b2d01.pphosted.com with ESMTP id 3e3fm5jywt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Feb 2022 08:49:28 +0000 Received: from m0098414.ppops.net (m0098414.ppops.net [127.0.0.1]) by pps.reinject (8.16.0.43/8.16.0.43) with SMTP id 2198nS7B020171; Wed, 9 Feb 2022 08:49:28 GMT Received: from ppma04ams.nl.ibm.com (63.31.33a9.ip4.static.sl-reverse.com [169.51.49.99]) by mx0b-001b2d01.pphosted.com with ESMTP id 3e3fm5jyw1-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Feb 2022 08:49:28 +0000 Received: from pps.filterd (ppma04ams.nl.ibm.com [127.0.0.1]) by ppma04ams.nl.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 2198n9ZW017773; Wed, 9 Feb 2022 08:49:26 GMT Received: from b06cxnps4075.portsmouth.uk.ibm.com (d06relay12.portsmouth.uk.ibm.com [9.149.109.197]) by ppma04ams.nl.ibm.com with ESMTP id 3e1gv9cv45-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 09 Feb 2022 08:49:26 +0000 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 2198nNtA38142310 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 9 Feb 2022 08:49:23 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id DBA534C04A; Wed, 9 Feb 2022 08:49:22 +0000 (GMT) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 486854C050; Wed, 9 Feb 2022 08:49:22 +0000 (GMT) Received: from [9.171.75.42] (unknown [9.171.75.42]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 9 Feb 2022 08:49:22 +0000 (GMT) Message-ID: <71f07914-d0b2-e98b-22b2-bc05f04df2da@linux.ibm.com> Date: Wed, 9 Feb 2022 09:49:21 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0 Subject: Re: [PATCH v2 05/11] KVM: s390: Add optional storage key checking to MEMOP IOCTL Content-Language: en-US To: Christian Borntraeger , Heiko Carstens , Janosch Frank Cc: Alexander Gordeev , Claudio Imbrenda , David Hildenbrand , Jonathan Corbet , kvm@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, Paolo Bonzini , Sven Schnelle , Vasily Gorbik References: <20220207165930.1608621-1-scgl@linux.ibm.com> <20220207165930.1608621-6-scgl@linux.ibm.com> <48d1678f-746c-dab6-5ec3-56397277f752@linux.ibm.com> From: Janis Schoetterl-Glausch In-Reply-To: <48d1678f-746c-dab6-5ec3-56397277f752@linux.ibm.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: 6H5ZBHzlShoJEgbn7yy_9fjsH2ZbRuer X-Proofpoint-GUID: lzPYz20MP0oCm-I0g6c1DlwDDIZ4H5Nu X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.816,Hydra:6.0.425,FMLib:17.11.62.513 definitions=2022-02-09_04,2022-02-09_01,2021-12-02_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 mlxscore=0 malwarescore=0 spamscore=0 bulkscore=0 impostorscore=0 priorityscore=1501 phishscore=0 mlxlogscore=999 clxscore=1015 adultscore=0 lowpriorityscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202090056 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/9/22 08:34, Christian Borntraeger wrote: > Am 07.02.22 um 17:59 schrieb Janis Schoetterl-Glausch: >> User space needs a mechanism to perform key checked accesses when >> emulating instructions. >> >> The key can be passed as an additional argument. >> Having an additional argument is flexible, as user space can >> pass the guest PSW's key, in order to make an access the same way the >> CPU would, or pass another key if necessary. >> >> Signed-off-by: Janis Schoetterl-Glausch >> Acked-by: Janosch Frank >> Reviewed-by: Claudio Imbrenda >> --- >>   arch/s390/kvm/kvm-s390.c | 49 +++++++++++++++++++++++++++++++--------- >>   include/uapi/linux/kvm.h |  8 +++++-- >>   2 files changed, 44 insertions(+), 13 deletions(-) >> >> diff --git a/arch/s390/kvm/kvm-s390.c b/arch/s390/kvm/kvm-s390.c >> index cf347e1a4f17..71e61fb3f0d9 100644 >> --- a/arch/s390/kvm/kvm-s390.c >> +++ b/arch/s390/kvm/kvm-s390.c >> @@ -32,6 +32,7 @@ >>   #include >>   #include >>   #include >> +#include >>     #include >>   #include >> @@ -2359,6 +2360,11 @@ static int kvm_s390_handle_pv(struct kvm *kvm, struct kvm_pv_cmd *cmd) >>       return r; >>   } >>   +static bool access_key_invalid(u8 access_key) >> +{ >> +    return access_key > 0xf; >> +} >> + >>   long kvm_arch_vm_ioctl(struct file *filp, >>                  unsigned int ioctl, unsigned long arg) >>   { >> @@ -4687,34 +4693,54 @@ static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu, >>                     struct kvm_s390_mem_op *mop) >>   { >>       void __user *uaddr = (void __user *)mop->buf; >> +    u8 access_key = 0, ar = 0; >>       void *tmpbuf = NULL; >> +    bool check_reserved; >>       int r = 0; >>       const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION >> -                    | KVM_S390_MEMOP_F_CHECK_ONLY; >> +                    | KVM_S390_MEMOP_F_CHECK_ONLY >> +                    | KVM_S390_MEMOP_F_SKEY_PROTECTION; >>   -    if (mop->flags & ~supported_flags || mop->ar >= NUM_ACRS || !mop->size) >> +    if (mop->flags & ~supported_flags || !mop->size) >>           return -EINVAL; >> - >>       if (mop->size > MEM_OP_MAX_SIZE) >>           return -E2BIG; >> - >>       if (kvm_s390_pv_cpu_is_protected(vcpu)) >>           return -EINVAL; >> - >>       if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) { >>           tmpbuf = vmalloc(mop->size); >>           if (!tmpbuf) >>               return -ENOMEM; >>       } >> +    ar = mop->ar; >> +    mop->ar = 0; > > Why this assignment to 0? It's so the check of reserved below works like that, they're all part of the anonymous union. > >> +    if (ar >= NUM_ACRS) >> +        return -EINVAL; >> +    if (mop->flags & KVM_S390_MEMOP_F_SKEY_PROTECTION) { >> +        access_key = mop->key; >> +        mop->key = 0; > > and this? I think we can leave mop unchanged. > > In fact, why do we add the ar and access_key variable? > This breaks the check from above (if (mop->flags & ~supported_flags || mop->ar >= NUM_ACRS || !mop->size))  into two checks > and it will create a memleak for tmpbuf. I can move the allocation down, goto out or get rid of the reserved check and keep everything as before. First is simpler, but second makes handling that case more explicit and might help in the future. Patch 6 has the same issue in the vm ioctl handler. > > Simply use mop->key and mop->ar below and get rid of the local variables. > The structure has no concurrency and gcc will handle that just as the local variable. > > Other than that this looks good. [...]