Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3708652imu; Fri, 30 Nov 2018 04:56:31 -0800 (PST) X-Google-Smtp-Source: AFSGD/UTM/fXMeUfydLWdY/YuAaFwU/gitJ87tFYxF4xIbuG9wUylO/x0PK2bbJLzSoCVrmoNMbs X-Received: by 2002:a62:7a8b:: with SMTP id v133mr5620762pfc.159.1543582591896; Fri, 30 Nov 2018 04:56:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543582591; cv=none; d=google.com; s=arc-20160816; b=B1A1At12XFmcM+sCulmCXOjK3HAHzLeVg2MYYM2jjYyDKfAvMpDdpvMOr+MorI/4B6 DrHzmlIap/vdXSU97BlJx60+qvBlgJ5/J7QcLGZjeyD02xaOw2d8QFu+/XL6A7GRRApI N1hmeqNJaIeaR2wOc3U0GCuH2JaBDXdgguwGXIJhgKMe36zLEWFpCAyZFAXTgMoQEemP ot7GbqS228qSFW5ryqyPbGIAdeGcqvF2yAKk7jHOM3Zv7RMgFvekI68vjwohzanN6LBO qUhpnT95XMrdgl9YWHhahyfNwKEfj1DnaIgLuJnsH8aD8t2L2Vwr0ygre6MbZcnGgESu CjCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=ClJyIBqIiei7k1sN/5tHBMAhD3TiaxneO8ycd7i/Be8=; b=i2KtJMPoPsOHIAUAlBn711WkbGGFC0j7oQHAqmBHvoM/XNhuWkCamPw1nkry7cuz6B VcwMgTYu/TBhG0u9EEQoW93xY2GxcZvjCS6aD8SGo6hhJJ8MrPrePA7s7bhsSteHOQ8u kGiisFxCCPSR7b7ubK6GDJqFeZM00z/Az/GDJ63XjstHumOiQTYFgsLmieTPdMmrN3hu oYlae8sbeQ3u+rcZ+racBJIqespE8C+bZNOMh2NRPYZx/UjwCGVkXL5wUx8vsWMVbS4t 0KNWhjQBGo2zdPdJHIbm4FAZs8+hdhHowZRoElxSbxbkW1hn6YqL6XdTxiuuO5TXGWNf h3bQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g124si4779400pgc.568.2018.11.30.04.56.17; Fri, 30 Nov 2018 04:56:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726781AbeLAADk (ORCPT + 99 others); Fri, 30 Nov 2018 19:03:40 -0500 Received: from mx1.redhat.com ([209.132.183.28]:41594 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726555AbeLAADk (ORCPT ); Fri, 30 Nov 2018 19:03:40 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D272330024AA; Fri, 30 Nov 2018 12:54:26 +0000 (UTC) Received: from vitty.brq.redhat.com (unknown [10.43.2.155]) by smtp.corp.redhat.com (Postfix) with ESMTP id 489835D9CD; Fri, 30 Nov 2018 12:54:24 +0000 (UTC) From: Vitaly Kuznetsov To: kvm@vger.kernel.org Cc: Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , linux-kernel@vger.kernel.org, Roman Kagan , "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , x86@kernel.org, "Michael Kelley (EOSG)" , Nadav Amit , Thomas Gleixner Subject: [PATCH v2] x86/hyper-v: Mark TLFS structures packed Date: Fri, 30 Nov 2018 13:54:22 +0100 Message-Id: <20181130125422.21494-1-vkuznets@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.40]); Fri, 30 Nov 2018 12:54:27 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The TLFS structures are used for hypervisor-guest communication and must exactly meet the specification. Compilers can add alignment padding to structures or reorder struct members for randomization and optimization, which would break the hypervisor ABI. Mark the structures as packed to prevent this. Suggested-by: Nadav Amit Signed-off-by: Vitaly Kuznetsov Acked-by: Thomas Gleixner --- - Changes since v1: - Re-worded commit message for clarity. [Thomas Gleixner] - This is a follow-up to my "[PATCH v2 0/4] x86/kvm/hyper-v: Implement Direct Mode for synthetic timers" series, as suggested by Thomas I'm routing it to KVM tree to avoid merge conflicts. --- arch/x86/include/asm/hyperv-tlfs.h | 50 +++++++++++++++--------------- 1 file changed, 25 insertions(+), 25 deletions(-) diff --git a/arch/x86/include/asm/hyperv-tlfs.h b/arch/x86/include/asm/hyperv-tlfs.h index ebfed56976d2..6a60fa17f6f2 100644 --- a/arch/x86/include/asm/hyperv-tlfs.h +++ b/arch/x86/include/asm/hyperv-tlfs.h @@ -271,7 +271,7 @@ union hv_x64_msr_hypercall_contents { u64 enable:1; u64 reserved:11; u64 guest_physical_address:52; - }; + } __packed; }; /* @@ -283,7 +283,7 @@ struct ms_hyperv_tsc_page { volatile u64 tsc_scale; volatile s64 tsc_offset; u64 reserved2[509]; -}; +} __packed; /* * The guest OS needs to register the guest ID with the hypervisor. @@ -324,7 +324,7 @@ struct hv_reenlightenment_control { __u64 enabled:1; __u64 reserved2:15; __u64 target_vp:32; -}; +} __packed; #define HV_X64_MSR_TSC_EMULATION_CONTROL 0x40000107 #define HV_X64_MSR_TSC_EMULATION_STATUS 0x40000108 @@ -332,12 +332,12 @@ struct hv_reenlightenment_control { struct hv_tsc_emulation_control { __u64 enabled:1; __u64 reserved:63; -}; +} __packed; struct hv_tsc_emulation_status { __u64 inprogress:1; __u64 reserved:63; -}; +} __packed; #define HV_X64_MSR_HYPERCALL_ENABLE 0x00000001 #define HV_X64_MSR_HYPERCALL_PAGE_ADDRESS_SHIFT 12 @@ -409,7 +409,7 @@ typedef struct _HV_REFERENCE_TSC_PAGE { __u32 res1; __u64 tsc_scale; __s64 tsc_offset; -} HV_REFERENCE_TSC_PAGE, *PHV_REFERENCE_TSC_PAGE; +} __packed HV_REFERENCE_TSC_PAGE, *PHV_REFERENCE_TSC_PAGE; /* Define the number of synthetic interrupt sources. */ #define HV_SYNIC_SINT_COUNT (16) @@ -466,7 +466,7 @@ union hv_message_flags { struct { __u8 msg_pending:1; __u8 reserved:7; - }; + } __packed; }; /* Define port identifier type. */ @@ -488,7 +488,7 @@ struct hv_message_header { __u64 sender; union hv_port_id port; }; -}; +} __packed; /* Define synthetic interrupt controller message format. */ struct hv_message { @@ -496,12 +496,12 @@ struct hv_message { union { __u64 payload[HV_MESSAGE_PAYLOAD_QWORD_COUNT]; } u; -}; +} __packed; /* Define the synthetic interrupt message page layout. */ struct hv_message_page { struct hv_message sint_message[HV_SYNIC_SINT_COUNT]; -}; +} __packed; /* Define timer message payload structure. */ struct hv_timer_message_payload { @@ -509,7 +509,7 @@ struct hv_timer_message_payload { __u32 reserved; __u64 expiration_time; /* When the timer expired */ __u64 delivery_time; /* When the message was delivered */ -}; +} __packed; /* Define virtual processor assist page structure. */ struct hv_vp_assist_page { @@ -519,7 +519,7 @@ struct hv_vp_assist_page { __u64 nested_enlightenments_control[2]; __u32 enlighten_vmentry; __u64 current_nested_vmcs; -}; +} __packed; struct hv_enlightened_vmcs { u32 revision_id; @@ -693,7 +693,7 @@ struct hv_enlightened_vmcs { u32 nested_flush_hypercall:1; u32 msr_bitmap:1; u32 reserved:30; - } hv_enlightenments_control; + } __packed hv_enlightenments_control; u32 hv_vp_id; u64 hv_vm_id; @@ -703,7 +703,7 @@ struct hv_enlightened_vmcs { u64 padding64_5[7]; u64 xss_exit_bitmap; u64 padding64_6[7]; -}; +} __packed; #define HV_VMX_ENLIGHTENED_CLEAN_FIELD_NONE 0 #define HV_VMX_ENLIGHTENED_CLEAN_FIELD_IO_BITMAP BIT(0) @@ -744,7 +744,7 @@ union hv_stimer_config { u64 reserved_z0:3; u64 sintx:4; u64 reserved_z1:44; - }; + } __packed; }; @@ -759,7 +759,7 @@ union hv_synic_scontrol { struct { u64 enable:1; u64 reserved:63; - }; + } __packed; }; /* Define synthetic interrupt source. */ @@ -771,7 +771,7 @@ union hv_synic_sint { u64 masked:1; u64 auto_eoi:1; u64 reserved2:46; - }; + } __packed; }; /* Define the format of the SIMP register */ @@ -781,7 +781,7 @@ union hv_synic_simp { u64 simp_enabled:1; u64 preserved:11; u64 base_simp_gpa:52; - }; + } __packed; }; /* Define the format of the SIEFP register */ @@ -791,34 +791,34 @@ union hv_synic_siefp { u64 siefp_enabled:1; u64 preserved:11; u64 base_siefp_gpa:52; - }; + } __packed; }; struct hv_vpset { u64 format; u64 valid_bank_mask; u64 bank_contents[]; -}; +} __packed; /* HvCallSendSyntheticClusterIpi hypercall */ struct hv_send_ipi { u32 vector; u32 reserved; u64 cpu_mask; -}; +} __packed; /* HvCallSendSyntheticClusterIpiEx hypercall */ struct hv_send_ipi_ex { u32 vector; u32 reserved; struct hv_vpset vp_set; -}; +} __packed; /* HvFlushGuestPhysicalAddressSpace hypercalls */ struct hv_guest_mapping_flush { u64 address_space; u64 flags; -}; +} __packed; /* HvFlushVirtualAddressSpace, HvFlushVirtualAddressList hypercalls */ struct hv_tlb_flush { @@ -826,7 +826,7 @@ struct hv_tlb_flush { u64 flags; u64 processor_mask; u64 gva_list[]; -}; +} __packed; /* HvFlushVirtualAddressSpaceEx, HvFlushVirtualAddressListEx hypercalls */ struct hv_tlb_flush_ex { @@ -834,6 +834,6 @@ struct hv_tlb_flush_ex { u64 flags; struct hv_vpset hv_vp_set; u64 gva_list[]; -}; +} __packed; #endif -- 2.19.2