Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp616172pxf; Thu, 8 Apr 2021 09:30:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwDaOrxEbZJ8FXB8C3jeiLDji5jxqMcDt4WCHYC14Q/NJJwdebPW73vo57Zx/gq1uv6aJR/ X-Received: by 2002:a17:906:7947:: with SMTP id l7mr3829009ejo.380.1617899415335; Thu, 08 Apr 2021 09:30:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617899415; cv=none; d=google.com; s=arc-20160816; b=Ngo3ldVxxZzh4LP5z+NZENHzCdsNsukS+sy+VEwdDp4L/4AVEGSRsUY1z5eWQO0uYt Auh4EefADHud1ap6caWd0B19KRof/wrAoKpxA7U+KH+tbk/j69Dagi3RywDZRYmIG4Ku zhXwiS8XW2h2qgWcLEAGIVYaNzlz1biMJwWOc5CeCfNZOdbytdG6mmWtXyCURBClszuW aN0iL9REqboyf19muQUNasSxt5PxAjRlc0D6cjEx0KQiCX4ylYkcLCVlkGDSn65kUECE yW0qe1jAcnTzSvm1E2q6dahdijUcBAdH1nPhpYeBl+vFLGt67KBW+RQ/e3IJwD6YDkU9 bBzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=5wrbAOZjrEmBl3SUhRJwLLYwLvrtd7NpWnCWVbIkN2Q=; b=QixLZyohxptSqwf590Ft1zPQYM+MDPE3672dhgUFEk85gKNngqfVATW0zR56jFB/ZL Jm9Da9XJ54pahCUUqMO0QbkhSGK4pojXdh41ctN/kiMTeRP6dIyrDD9lOJZnxwMLXfF1 0vuYcm2EY1ucoa2gWqeK8W8Sy26RU5LMoTvvf2Dq0AQD1c+Izn1Jn2LjV0b3KyKpbrAF 1FpmF9sxum31G3v82OFR4tr3eKIxQ6MZTRsUb67WJpQhkeang326EZ7j6VLg5cyeNyj/ aukAAKaYNbhqR6wbhuY+J2nHnLLHOflTrkZXLuARFSLdis4TmPkmKFF5ZkjH1/xrHafU K7yA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=WNV0rfN2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k2si21853372ejx.546.2021.04.08.09.29.51; Thu, 08 Apr 2021 09:30:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=WNV0rfN2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232304AbhDHQ3C (ORCPT + 99 others); Thu, 8 Apr 2021 12:29:02 -0400 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:44467 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231893AbhDHQ3C (ORCPT ); Thu, 8 Apr 2021 12:29:02 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1617899330; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=5wrbAOZjrEmBl3SUhRJwLLYwLvrtd7NpWnCWVbIkN2Q=; b=WNV0rfN2mXXhVinwtYwmfXdYFkRCUta3Nm0DgNqYTRR+Fw58IivYRRrG4p5E3LM2zCVW4p I6ICCol5d+WyLWYmlYYkbOfxFl4IzCunxS56jFQoUgNDz3v4O/3UmZBtIeXDtpImHrDb+d qgAlXb+L/aGOVUnWxT1F443cnpPfcZs= Received: from mail-ej1-f70.google.com (mail-ej1-f70.google.com [209.85.218.70]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-524-jhXsuluFPaauzq6QKzldjA-1; Thu, 08 Apr 2021 12:28:48 -0400 X-MC-Unique: jhXsuluFPaauzq6QKzldjA-1 Received: by mail-ej1-f70.google.com with SMTP id jo6so1099105ejb.13 for ; Thu, 08 Apr 2021 09:28:48 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=5wrbAOZjrEmBl3SUhRJwLLYwLvrtd7NpWnCWVbIkN2Q=; b=ojG2RTb9RBjkuVl/5dqhojUF7Yb5KimePAnqJnORmD3GRx6urHMJ0uhFDq0IIE5OLw A86vU/bQor4awQATlC1c5IUuQmFrX8qk2Bgjwt3sED9GwiCcojw0Ozhj1zXWlVUFq6AR hzo8gEcsokQTEAtBiEI//CYIa+8qbZeqSmYsJe1dVbZXrBXEsoEtaPzeqoFx2gLQ4ccM reH1QcUibgcSF7VJLWtlNsK3soTmoKGgYb0dcOQ2ezdoBVTSdZPpzhCoOyyEdydccxaH VSS5gjlPDFNNWNaBptIYOqL0kyNJFtJoz1sgi5oAayVXUQEfNrWgO6NoDe3zdr2dZjFZ dEKg== X-Gm-Message-State: AOAM532yIwyoodwsErohLyQNyjfzgf3zP/togbcUG+bV5D2bQKdo1kuQ hTljDShsUx8/FARpcBeTiZnmhiIs4esHE1RbTGz3FceZD1SOYAJhEZMufKDeEUyFZ4nVYCyyPRK tK+QtAX80gm5YD7VJqF9jMIA9 X-Received: by 2002:a50:ff13:: with SMTP id a19mr8705265edu.300.1617899327693; Thu, 08 Apr 2021 09:28:47 -0700 (PDT) X-Received: by 2002:a50:ff13:: with SMTP id a19mr8705244edu.300.1617899327555; Thu, 08 Apr 2021 09:28:47 -0700 (PDT) Received: from ?IPv6:2001:b07:6468:f312:5e2c:eb9a:a8b6:fd3e? ([2001:b07:6468:f312:5e2c:eb9a:a8b6:fd3e]) by smtp.gmail.com with ESMTPSA id r26sm6685065edc.43.2021.04.08.09.28.46 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 08 Apr 2021 09:28:47 -0700 (PDT) Subject: Re: [PATCH] KVM: vmx: add mismatched size in vmcs_check32 To: Sean Christopherson , lihaiwei.kernel@gmail.com Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, vkuznets@redhat.com, wanpengli@tencent.com, jmattson@google.com, joro@8bytes.org, Haiwei Li References: <20210408075436.13829-1-lihaiwei.kernel@gmail.com> From: Paolo Bonzini Message-ID: Date: Thu, 8 Apr 2021 18:28:45 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/04/21 18:05, Sean Christopherson wrote: > Add compile-time assertions in vmcs_check32() to disallow accesses to > 64-bit and 64-bit high fields via vmcs_{read,write}32(). Upper level > KVM code should never do partial accesses to VMCS fields. KVM handles > the split accesses automatically in vmcs_{read,write}64() when running > as a 32-bit kernel. KVM also uses raw vmread/vmwrite (__vmcs_readl/__vmcs_writel) when copying to and from the shadow VMCS, so that path will not go through vmcs_check32 either. Paolo