Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp615622img; Fri, 22 Mar 2019 05:12:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqwbUgqch8q+FSieQROvYBKe7PWr14uPFF0tiBg1QNJgng3Fi21anUZSABJn2QpQr1K1oZzF X-Received: by 2002:a62:a515:: with SMTP id v21mr1179383pfm.41.1553256774635; Fri, 22 Mar 2019 05:12:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553256774; cv=none; d=google.com; s=arc-20160816; b=vxAXesT/5XgzA8u8VMHjXsjRoYwrslJ9dRwkGDCOFdYQ518+U7Zx03z5b8Ixqx6Mh3 nWUQ4/wih5C3jW8KKPJe+JoMLfIv4fOOTAcN2BUfz23CDzNwAp4ypLAdYXQYK9oJCysQ /3Q19hND7e1P6jGyJ/GrFie30T6AYnM3oTUfH59xS+ch5qRyCvYbKdUYGi7q4Gkj1T9C x6rkJaXT+FM+PjZLsf9Sypegz9dZ15q8o0ZnFWaVTtmW8j7Z2ueF8k7dQsxpDdQtyhly lri1BhE3h+gTYDp7zbSiz6gUdkGseGSriTaPkjmNzzsG1v81NvPvO9Zpi7vAVk81M8Vs dOaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=eP7U6R34NtUHlZ0bsIpWYnLSFTL/Q0jRt2Sg4FPjxX4=; b=LGqdpRv0ZA35wXjaA9hhq4zv8Ralc5sSPi/eLZhbjlOWKJ5mO3N5tJBoVUxV7gzgWR 5EqC65Bcf0RRHUwSdFyKy9Y2L2+gwUGZxCjq7p2jCD3l46trT17jktHyY7IRurVolZr8 pZssHwqXSHHkwALBfM01SKdwaDhHM0pRxs5OuVMlwIO+lLJ4wj0RExqUlhx/z3Pv53jA 5Gi4uHu3tcjCnSM30+3KBFqzS1ZeQbzWa5RJYpz1kpXHrkJ8ItttmBXVKfSsYtkw0pds wfX1iP/UbCa5W48GbOlg3uY3A1Dg1/a5dS8YgHhsR67v2wGYVf5kF+6crR6H2XfXXlpe 0BuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=v5woDywS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p87si6526430pfa.48.2019.03.22.05.12.39; Fri, 22 Mar 2019 05:12:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=v5woDywS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389468AbfCVMKz (ORCPT + 99 others); Fri, 22 Mar 2019 08:10:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:49292 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389111AbfCVMKx (ORCPT ); Fri, 22 Mar 2019 08:10:53 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 410902082C; Fri, 22 Mar 2019 12:10:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553256652; bh=5fYPGOiRMcYQrOHBEBRIyt6RcpGfAnwbJrDhUeNk6kI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=v5woDywS42FgGbYc7jb5f7yDLb+bEx4T3O/b+enyJwmVI3qeBad9wMyBasnqraPl4 BIy47FKB3eCgFAkfLF/Ypeyn8pzYVU0gXtzKGaIjUGI7nWhmlqeIzsOwXSgnEghoF+ wdeHchwzxjpTdsp2BjAHu32ffMh+n/ysbETatPuY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sean Christopherson , Paolo Bonzini Subject: [PATCH 4.19 278/280] KVM: nVMX: Ignore limit checks on VMX instructions using flat segments Date: Fri, 22 Mar 2019 12:17:11 +0100 Message-Id: <20190322111347.752867653@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111306.356185024@linuxfoundation.org> References: <20190322111306.356185024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sean Christopherson commit 34333cc6c2cb021662fd32e24e618d1b86de95bf upstream. Regarding segments with a limit==0xffffffff, the SDM officially states: When the effective limit is FFFFFFFFH (4 GBytes), these accesses may or may not cause the indicated exceptions. Behavior is implementation-specific and may vary from one execution to another. In practice, all CPUs that support VMX ignore limit checks for "flat segments", i.e. an expand-up data or code segment with base=0 and limit=0xffffffff. This is subtly different than wrapping the effective address calculation based on the address size, as the flat segment behavior also applies to accesses that would wrap the 4g boundary, e.g. a 4-byte access starting at 0xffffffff will access linear addresses 0xffffffff, 0x0, 0x1 and 0x2. Fixes: f9eb4af67c9d ("KVM: nVMX: VMX instructions: add checks for #GP/#SS exceptions") Cc: stable@vger.kernel.org Signed-off-by: Sean Christopherson Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/vmx.c | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -8251,10 +8251,16 @@ static int get_vmx_mem_address(struct kv /* Protected mode: #GP(0)/#SS(0) if the segment is unusable. */ exn = (s.unusable != 0); - /* Protected mode: #GP(0)/#SS(0) if the memory - * operand is outside the segment limit. + + /* + * Protected mode: #GP(0)/#SS(0) if the memory operand is + * outside the segment limit. All CPUs that support VMX ignore + * limit checks for flat segments, i.e. segments with base==0, + * limit==0xffffffff and of type expand-up data or code. */ - exn = exn || (off + sizeof(u64) > s.limit); + if (!(s.base == 0 && s.limit == 0xffffffff && + ((s.type & 8) || !(s.type & 4)))) + exn = exn || (off + sizeof(u64) > s.limit); } if (exn) { kvm_queue_exception_e(vcpu,