From: Janosch Frank <frankja@linux.ibm.com>
To: Heiko Carstens <hca@linux.ibm.com>
Cc: linux-s390@vger.kernel.org, borntraeger@de.ibm.com,
gor@linux.ibm.com, imbrenda@linux.ibm.com, kvm@vger.kernel.org,
david@redhat.com
Subject: Re: [PATCH 2/2] s390x: Add 3f program exception handler
Date: Fri, 4 Sep 2020 13:33:28 +0200 [thread overview]
Message-ID: <36e1c11c-c4a2-6ae2-b341-7d582203d031@linux.ibm.com> (raw)
In-Reply-To: <20200904103543.GD6075@osiris>
[-- Attachment #1.1: Type: text/plain, Size: 3127 bytes --]
On 9/4/20 12:35 PM, Heiko Carstens wrote:
> On Thu, Sep 03, 2020 at 09:14:35AM -0400, Janosch Frank wrote:
>> Program exception 3f (secure storage violation) can only be detected
>> when the CPU is running in SIE with a format 4 state description,
>> e.g. running a protected guest. Because of this and because user
>> space partly controls the guest memory mapping and can trigger this
>> exception, we want to send a SIGSEGV to the process running the guest
>> and not panic the kernel.
>>
>> Signed-off-by: Janosch Frank <frankja@linux.ibm.com>
>> CC: <stable@vger.kernel.org> # 5.7+
>> Fixes: 084ea4d611a3 ("s390/mm: add (non)secure page access exceptions handlers")
>> Reviewed-by: Claudio Imbrenda <imbrenda@linux.ibm.com>
>> ---
>> arch/s390/kernel/pgm_check.S | 2 +-
>> arch/s390/mm/fault.c | 23 +++++++++++++++++++++++
>> 2 files changed, 24 insertions(+), 1 deletion(-)
>>
>> diff --git a/arch/s390/kernel/pgm_check.S b/arch/s390/kernel/pgm_check.S
>> index 2c27907a5ffc..9a92638360ee 100644
>> --- a/arch/s390/kernel/pgm_check.S
>> +++ b/arch/s390/kernel/pgm_check.S
>> @@ -80,7 +80,7 @@ PGM_CHECK(do_dat_exception) /* 3b */
>> PGM_CHECK_DEFAULT /* 3c */
>> PGM_CHECK(do_secure_storage_access) /* 3d */
>> PGM_CHECK(do_non_secure_storage_access) /* 3e */
>> -PGM_CHECK_DEFAULT /* 3f */
>> +PGM_CHECK(do_secure_storage_violation) /* 3f */
>> PGM_CHECK(monitor_event_exception) /* 40 */
>> PGM_CHECK_DEFAULT /* 41 */
>> PGM_CHECK_DEFAULT /* 42 */
>> diff --git a/arch/s390/mm/fault.c b/arch/s390/mm/fault.c
>> index 4c8c063bce5b..20abb7c5c540 100644
>> --- a/arch/s390/mm/fault.c
>> +++ b/arch/s390/mm/fault.c
>> @@ -859,6 +859,24 @@ void do_non_secure_storage_access(struct pt_regs *regs)
>> }
>> NOKPROBE_SYMBOL(do_non_secure_storage_access);
>>
>> +void do_secure_storage_violation(struct pt_regs *regs)
>> +{
>> + char buf[TASK_COMM_LEN];
>> +
>> + /*
>> + * Either KVM messed up the secure guest mapping or the same
>> + * page is mapped into multiple secure guests.
>> + *
>> + * This exception is only triggered when a guest 2 is running
>> + * and can therefore never occur in kernel context.
>> + */
>> + printk_ratelimited(KERN_WARNING
>> + "Secure storage violation in task: %s, pid %d\n",
>> + get_task_comm(buf, current), task_pid_nr(current));
>
> Why get_task_comm() and task_pid_nr() instead of simply current->comm
> and current->pid?
Normally if there are functions to get data I assume those should be used.
> Also: is the dmesg message of any value?
Yes, it's import for administrators to know that an exception caused
this segfault and not some memory shenanigans.
As the exception only occurs if a guest runs in unsupported modes like
sharing the memory between two secure guests it's a good first
indication what went wrong.
>
>> + send_sig(SIGSEGV, current, 0);
>> +}
>> +NOKPROBE_SYMBOL(do_secure_storage_violation);>
> Why is this NOKPROBE? Can this deadlock?
Right, we don't need to export this at all, this was copied over from
the export function above.
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
next prev parent reply other threads:[~2020-09-04 11:33 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-09-03 13:14 [PATCH 0/2] s390x: pv: Fixes and improvements Janosch Frank
2020-09-03 13:14 ` [PATCH 1/2] s390x: uv: Add destroy page call Janosch Frank
2020-09-04 10:39 ` Heiko Carstens
2020-09-04 11:38 ` Janosch Frank
2020-09-04 12:10 ` Heiko Carstens
2020-09-07 9:50 ` Janosch Frank
2020-09-03 13:14 ` [PATCH 2/2] s390x: Add 3f program exception handler Janosch Frank
2020-09-03 14:20 ` Christian Borntraeger
2020-09-04 10:35 ` Heiko Carstens
2020-09-04 11:33 ` Janosch Frank [this message]
2020-09-04 12:14 ` Heiko Carstens
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=36e1c11c-c4a2-6ae2-b341-7d582203d031@linux.ibm.com \
--to=frankja@linux.ibm.com \
--cc=borntraeger@de.ibm.com \
--cc=david@redhat.com \
--cc=gor@linux.ibm.com \
--cc=hca@linux.ibm.com \
--cc=imbrenda@linux.ibm.com \
--cc=kvm@vger.kernel.org \
--cc=linux-s390@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox