Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp2166096pxb; Wed, 9 Feb 2022 12:17:00 -0800 (PST) X-Google-Smtp-Source: ABdhPJzYQVw1oERlzQllHs/udWllCAenNxBA6BwBPeeEYFe+7QK2HfjoxDX75dYP2D8T945geR1p X-Received: by 2002:a05:6a00:10c6:: with SMTP id d6mr3970360pfu.42.1644437820565; Wed, 09 Feb 2022 12:17:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644437820; cv=none; d=google.com; s=arc-20160816; b=v0qfOtrlVPTpin82ZLvn07+sipEPILQ6fxF4XUKzSq3BIozh+rnzTfj0Lk3TDqHUdQ D9EH73Szd0aQM7Ay9d2MxVbv+RzDPCfgnl98pJ7qkIugoKbtc3Wtwn//vDsKuXzJ8cLC yYfPbPZ0TtOusu3+CQK6g5nCe9pv5KauKfEIlaYa8d+IZ/RslNeeQr1b/910gwmDZ/4z qymdd97ah9TplffmqTJHeCTYE71lON9LA+Of+ZTbjxxRQFUK2zg37Rl6eMLlyrhSvOIK yi1u24b+Cs75mSySXZehCn4jqPjg8em/MxQjEzlRlZdIcmDoSz0tXs57jPKcfgTFi9Sj s1Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=vuUZUbrkyCM9bQ8zLjWIcvO7zIAtLhSLH2+g8xysWVA=; b=W916UXo3gXbzJ15/qjUhGp3hE0PDduFvkdjs16au4HIM9JP/bNB3ccowG4FGgCRhMf fklE6LJuKEb96CUg5iMt5noAIZI6JOZtKwv/5IFfrXMh09FeEqBBJy2SBuaZo4NOXX8B pJrgz1Td6Cg8fWbcKCiWaqkrNOO7vbZ3tej4b6/ELzcyL8Mmo69W5Kw7ouwwFe8uYlmm ZxEfWK2mu9inmnTDtvIHu04LRjyJJTlyjIrXGW5Y088LdiGUlnd39gk4EfXD4W8i/swB uRbOeQe/McmWr+wquo0EH2ybx7Vvyly3nmbsppeqcztM0KlzgB9YDGQ9LQdUGNKGSAff BWwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=zD7HvA67; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id i4si16077698pfr.238.2022.02.09.12.16.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 09 Feb 2022 12:17:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=zD7HvA67; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id AFAD5E063CAC; Wed, 9 Feb 2022 11:56:41 -0800 (PST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233647AbiBITR6 (ORCPT + 99 others); Wed, 9 Feb 2022 14:17:58 -0500 Received: from gmail-smtp-in.l.google.com ([23.128.96.19]:51470 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233481AbiBITRs (ORCPT ); Wed, 9 Feb 2022 14:17:48 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D5429C1DF8FA; Wed, 9 Feb 2022 11:17:41 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A0D476197E; Wed, 9 Feb 2022 19:15:27 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 85FCBC340E7; Wed, 9 Feb 2022 19:15:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1644434127; bh=hZXirXigZI9GoouC6CuizAWFEKIWwDBONOJmuuybl44=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zD7HvA67XcD6Pv/zPupBR46gMPD6dD8oDgOcrPypFNeO2HV0q0VWlumjboeihKeR0 6X70NCgLkWMoq4ZtsgIgVxFRz0s1hzQxBPO4DFkJKoTUqnHFzAwbJxqsU3LSAJFItc bRjUoKxtpvi7/CGplVFYh6r6meB/eLqW2f0BxdHU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Janis Schoetterl-Glausch , Christian Borntraeger Subject: [PATCH 5.10 2/3] KVM: s390: Return error on SIDA memop on normal guest Date: Wed, 9 Feb 2022 20:14:20 +0100 Message-Id: <20220209191248.973709059@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220209191248.892853405@linuxfoundation.org> References: <20220209191248.892853405@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Janis Schoetterl-Glausch commit 2c212e1baedcd782b2535a3f86bc491977677c0e upstream. Refuse SIDA memops on guests which are not protected. For normal guests, the secure instruction data address designation, which determines the location we access, is not under control of KVM. Fixes: 19e122776886 (KVM: S390: protvirt: Introduce instruction data area bounce buffer) Signed-off-by: Janis Schoetterl-Glausch Cc: stable@vger.kernel.org Signed-off-by: Christian Borntraeger Signed-off-by: Greg Kroah-Hartman --- arch/s390/kvm/kvm-s390.c | 2 ++ 1 file changed, 2 insertions(+) --- a/arch/s390/kvm/kvm-s390.c +++ b/arch/s390/kvm/kvm-s390.c @@ -4654,6 +4654,8 @@ static long kvm_s390_guest_sida_op(struc return -EINVAL; if (mop->size + mop->sida_offset > sida_size(vcpu->arch.sie_block)) return -E2BIG; + if (!kvm_s390_pv_cpu_is_protected(vcpu)) + return -EINVAL; switch (mop->op) { case KVM_S390_MEMOP_SIDA_READ: