Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp779668ybe; Fri, 13 Sep 2019 06:16:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqysC6YIFfpO2Y4ppwpdP5cUKhD2l9ejuYa11FtDQh5NwKOg2VrgSbt9wdNyYaWf9bNLkYlZ X-Received: by 2002:a05:6402:17ba:: with SMTP id j26mr47203990edy.272.1568380604481; Fri, 13 Sep 2019 06:16:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568380604; cv=none; d=google.com; s=arc-20160816; b=NpnyOjH6rbNbGKhr1bDKc2bAWmDYsuFZzYkPwHr6xuac9nI1xA+gCXHFEnu0BgOlKW 4l9ugUB7cGkyWGEBftrP9seEId/TJqn3V8eghXLlMdcg0K+TVjYkzdcHhfjd3jSrG+I9 JmjMaMZ2u79xemqGocTAa/nANoHJ6GUnJJ5eLDE19g7fsPm0sRntr/11b2NH3jMayYKn ysM6YejB4DBwgQoyN170C4uwmf+n8VZT6NCm1aPBr78RdnUlP7/nKoXrGdSeA6FH6asP Vu7py865T2inbcJc2iSASy8xfg/cRKmOyxQzg2n3x5itr2usbLVd2lf7q/yX66hiRWwk 8NtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RiKAVy83ty626sHU5SardG1qy3cShRA+AJPVUTesGdo=; b=UoU1jnb0dS9EZTcnau5TJUZUKGjrLBvWBub6dkO9r7eUjjIMalixmsKaml+esXcglE QWeoaOJNRAjBMalJkhvh1c+mQlOyIHqM6FUEiapLGHaLz6AIMjPib0ZUaskHE+xRFXBD xfnDlBFfGL8swwd/7RyPWfRMWYmgOmKe/bFRuvEeHA4iPD6FT5dyXA1hhPEbFi1ZF3Ql 4vwiEgKLIoiE2ovBlsFvR9siwGNgnzCTpV49GEFjkZTHpztgAtgW8qI4N9vPifZKmh41 V9PA/1eyCxeyHpaimS3hktBtk2OszT3vH5Bp2Xl3vn3cx8mHu1afxiKMuyJP8TuO5lMh Gu9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Xls2qJrZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o3si9427299ejm.109.2019.09.13.06.16.21; Fri, 13 Sep 2019 06:16:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Xls2qJrZ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389214AbfIMNMp (ORCPT + 99 others); Fri, 13 Sep 2019 09:12:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:38250 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389197AbfIMNMn (ORCPT ); Fri, 13 Sep 2019 09:12:43 -0400 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 056D120CC7; Fri, 13 Sep 2019 13:12:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568380362; bh=vCB8d08AOZ8EMbQad+wIbniBn9HC5VKjqJsR3Bl01sw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Xls2qJrZLzQDXXZy/gFxwm36WGAM3wqcwP5NsBAWA210XtXdIhIQgebZD1nRz2WbS 4BfIf78TUT6fUsb8gI6+Nf1IuDESD9mpQ3T/kLC86DOWHevXaGtZkeOfNfehJI4cNy Ic4j//93aRoLZNyegrOVp27GfvCpaD/4XYZtty4w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vitaly Kuznetsov , Roman Kagan , Paolo Bonzini , Sasha Levin Subject: [PATCH 4.19 040/190] KVM: x86: hyperv: enforce vp_index < KVM_MAX_VCPUS Date: Fri, 13 Sep 2019 14:04:55 +0100 Message-Id: <20190913130602.935789529@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190913130559.669563815@linuxfoundation.org> References: <20190913130559.669563815@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 9170200ec0ebad70e5b9902bc93e2b1b11456a3b ] Hyper-V TLFS (5.0b) states: > Virtual processors are identified by using an index (VP index). The > maximum number of virtual processors per partition supported by the > current implementation of the hypervisor can be obtained through CPUID > leaf 0x40000005. A virtual processor index must be less than the > maximum number of virtual processors per partition. Forbid userspace to set VP_INDEX above KVM_MAX_VCPUS. get_vcpu_by_vpidx() can now be optimized to bail early when supplied vpidx is >= KVM_MAX_VCPUS. Signed-off-by: Vitaly Kuznetsov Reviewed-by: Roman Kagan Signed-off-by: Paolo Bonzini Signed-off-by: Sasha Levin --- arch/x86/kvm/hyperv.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/hyperv.c b/arch/x86/kvm/hyperv.c index 229d996051653..73fa074b9089a 100644 --- a/arch/x86/kvm/hyperv.c +++ b/arch/x86/kvm/hyperv.c @@ -132,8 +132,10 @@ static struct kvm_vcpu *get_vcpu_by_vpidx(struct kvm *kvm, u32 vpidx) struct kvm_vcpu *vcpu = NULL; int i; - if (vpidx < KVM_MAX_VCPUS) - vcpu = kvm_get_vcpu(kvm, vpidx); + if (vpidx >= KVM_MAX_VCPUS) + return NULL; + + vcpu = kvm_get_vcpu(kvm, vpidx); if (vcpu && vcpu_to_hv_vcpu(vcpu)->vp_index == vpidx) return vcpu; kvm_for_each_vcpu(i, vcpu, kvm) @@ -1044,7 +1046,7 @@ static int kvm_hv_set_msr(struct kvm_vcpu *vcpu, u32 msr, u64 data, bool host) switch (msr) { case HV_X64_MSR_VP_INDEX: - if (!host) + if (!host || (u32)data >= KVM_MAX_VCPUS) return 1; hv->vp_index = (u32)data; break; -- 2.20.1