public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Claudio Imbrenda <imbrenda@linux.ibm.com>
To: Janis Schoetterl-Glausch <scgl@linux.ibm.com>
Cc: Nico Boehr <nrb@linux.ibm.com>,
	kvm@vger.kernel.org, linux-s390@vger.kernel.org,
	frankja@linux.ibm.com, thuth@redhat.com
Subject: Re: [kvm-unit-tests PATCH v1 2/2] s390x: add migration test for storage keys
Date: Fri, 13 May 2022 15:04:04 +0200	[thread overview]
Message-ID: <20220513150404.6d64ae9e@p-imbrenda> (raw)
In-Reply-To: <a2e497b3-7d86-280c-f483-9ba20707294b@linux.ibm.com>

On Fri, 13 May 2022 14:46:04 +0200
Janis Schoetterl-Glausch <scgl@linux.ibm.com> wrote:

> On 5/13/22 14:33, Claudio Imbrenda wrote:
> > On Fri, 13 May 2022 13:04:34 +0200
> > Janis Schoetterl-Glausch <scgl@linux.ibm.com> wrote:
> >   
> >> On 5/12/22 16:01, Nico Boehr wrote:  
> >>> Upon migration, we expect storage keys being set by the guest to be preserved,
> >>> so add a test for it.
> >>>
> >>> We keep 128 pages and set predictable storage keys. Then, we migrate and check
> >>> they can be read back and the respective access restrictions are in place when
> >>> the access key in the PSW doesn't match.
> >>>
> >>> TCG currently doesn't implement key-controlled protection, see
> >>> target/s390x/mmu_helper.c, function mmu_handle_skey(), hence add the relevant
> >>> tests as xfails.
> >>>
> >>> Signed-off-by: Nico Boehr <nrb@linux.ibm.com>
> >>> ---
> >>>  s390x/Makefile         |  1 +
> >>>  s390x/migration-skey.c | 98 ++++++++++++++++++++++++++++++++++++++++++
> >>>  s390x/unittests.cfg    |  4 ++
> >>>  3 files changed, 103 insertions(+)
> >>>  create mode 100644 s390x/migration-skey.c
> >>>  

[...]

> Not at all with regards to skeys. But neither is checking the keys on access.
> And for kvm, both TPROT and checking is handled by SIE.

fair enough

> > 
> > to be fair, this test is only about checking that storage keys are
> > correctly migrated, maybe the check for actual protection is out of
> > scope
> >   
> 
> Having more tests does no harm and might uncover things nobody thought of,
> but I'd also be fine with keeping it short and sweet.
> [...]

I think this migration test should be kept more on focus about migration

we can always have a storage keys "torture test" separately

  reply	other threads:[~2022-05-13 13:04 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-05-12 14:01 [kvm-unit-tests PATCH v1 0/2] s390x: add migration test for storage keys Nico Boehr
2022-05-12 14:01 ` [kvm-unit-tests PATCH v1 1/2] lib: s390x: introduce check_pgm_int_code_xfail() Nico Boehr
2022-05-12 15:23   ` Claudio Imbrenda
2022-05-12 14:01 ` [kvm-unit-tests PATCH v1 2/2] s390x: add migration test for storage keys Nico Boehr
2022-05-12 14:43   ` Janosch Frank
2022-05-12 15:41   ` Claudio Imbrenda
2022-05-13 12:15     ` Nico Boehr
2022-05-13 11:04   ` Janis Schoetterl-Glausch
2022-05-13 12:33     ` Claudio Imbrenda
2022-05-13 12:46       ` Janis Schoetterl-Glausch
2022-05-13 13:04         ` Claudio Imbrenda [this message]
2022-05-16  8:45           ` Nico Boehr
2022-05-13 13:02     ` Nico Boehr

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220513150404.6d64ae9e@p-imbrenda \
    --to=imbrenda@linux.ibm.com \
    --cc=frankja@linux.ibm.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-s390@vger.kernel.org \
    --cc=nrb@linux.ibm.com \
    --cc=scgl@linux.ibm.com \
    --cc=thuth@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox