Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp3064737pxy; Mon, 3 May 2021 14:20:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy30PD/XfXJOG1CrYtyyagikbn8s5kAFdfXM3r/UBFXAhQOlTUT6/sdQ1SbhrwfvxSQdzzg X-Received: by 2002:a17:90a:c298:: with SMTP id f24mr750193pjt.38.1620076801301; Mon, 03 May 2021 14:20:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620076801; cv=none; d=google.com; s=arc-20160816; b=sBJE8mRvWxhUWvY3ausVSMcbr/47OZhUTfMikqJYcu5cSkxOJA1Wh8atyI9OUmB5sw mc839syV/fRCjUarMBmXBbtEQB699Q3cxVGPhmEg4g/Mhuc+o9hxZQg17MGhi5WIFPuT oWFP0wV+oaWvBVgoelQgSZU9HqGghY+9+6u4+QcAmFgtjAb9HxrEcPcOzww7B1hATJUf lwbq0YLxL64kTaUu+hzSnnOCTf1dGAljHldEVui3BmxgIkXjoEEPeMP4DDU9E59R02DV qsbgzyBLUZapeI8KdCXxJa8gYzLJBvBgRKBWwefZaDhf1jkQY6V+ZmJD1BLIl1UACJtb hg6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:cc:to:from:date:subject :dkim-signature; bh=04TqWL9x3kySh2dDc818s2E7ADPYmdphIO/5JHsPMSc=; b=NyYhwlUzHIZPhiTGZ3moI0dpJ3QLFkSuedjdnEr3B5ewx7ZMPcHwZ/bBVVLcqf7EHp N2Gz8AZTFYpoD2KunLDw91dymJL69SqW1QNAo3cU+8JhvZIh3wIzBtlserc/Izk+kYwM y3mvUl4QAeCS3aRIKo5gdvZqxXKw4QL8VIn0ZMk8IUgWVHSVsZvg38yVkyiNV24q0jfK Ppt0mO37kabS0Fh0RjXpxjKFfO0mqcD1sbhA7kRwHJpgN8Dgf10/JXHpZxBkGMZh99CM aJSm4aYFhCveGUKiIRTyQlmIKsISTANvxcdu/DJeI0ff1OmxlLUa3ARv+/ovV/54B+HU SuDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=rH+QVhBh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b14si14944595pfd.346.2021.05.03.14.19.45; Mon, 03 May 2021 14:20:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=rH+QVhBh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229695AbhECVSg (ORCPT + 99 others); Mon, 3 May 2021 17:18:36 -0400 Received: from smtp-fw-4101.amazon.com ([72.21.198.25]:33927 "EHLO smtp-fw-4101.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229499AbhECVSg (ORCPT ); Mon, 3 May 2021 17:18:36 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209; t=1620076663; x=1651612663; h=date:from:to:cc:message-id:references:mime-version: in-reply-to:subject; bh=04TqWL9x3kySh2dDc818s2E7ADPYmdphIO/5JHsPMSc=; b=rH+QVhBhwaJS+0U5EPixs8azYWre4dvVBrbNTeKgDbbbyyHKUrDza3vx Zmk2hehkk94dkLHt0QLneMQS3vJ4f4QPVJSuD+6oazt92nc+L+SvogcXR 4B0lxhPRa9V1iy13uiAkGLYeGeDlzw49PbG9R9KlWgrq6oK1SdifRWuTe Q=; X-IronPort-AV: E=Sophos;i="5.82,271,1613433600"; d="scan'208";a="105449271" Subject: Re: [PATCH] KVM: x86: Hoist input checks in kvm_add_msr_filter() Received: from iad12-co-svc-p1-lb1-vlan3.amazon.com (HELO email-inbound-relay-2b-8cc5d68b.us-west-2.amazon.com) ([10.43.8.6]) by smtp-border-fw-4101.iad4.amazon.com with ESMTP; 03 May 2021 21:17:35 +0000 Received: from EX13D28EUC003.ant.amazon.com (pdx1-ws-svc-p6-lb9-vlan3.pdx.amazon.com [10.236.137.198]) by email-inbound-relay-2b-8cc5d68b.us-west-2.amazon.com (Postfix) with ESMTPS id 02C54A059E; Mon, 3 May 2021 21:17:32 +0000 (UTC) Received: from uc8bbc9586ea454.ant.amazon.com (10.43.162.28) by EX13D28EUC003.ant.amazon.com (10.43.164.43) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Mon, 3 May 2021 21:17:27 +0000 Date: Mon, 3 May 2021 23:17:23 +0200 From: Siddharth Chandrasekaran To: Sean Christopherson CC: Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , , "H. Peter Anvin" , , Message-ID: <20210503211722.GA8688@uc8bbc9586ea454.ant.amazon.com> References: <20210503122111.13775-1-sidcha@amazon.de> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) X-Originating-IP: [10.43.162.28] X-ClientProxiedBy: EX13D18UWA003.ant.amazon.com (10.43.160.238) To EX13D28EUC003.ant.amazon.com (10.43.164.43) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 03, 2021 at 08:53:09PM +0000, Sean Christopherson wrote: > CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe. > > > > CAUTION: This email originated from outside of the organization. Do not click links or open attachments unless you can confirm the sender and know the content is safe. > > On Mon, May 03, 2021, Siddharth Chandrasekaran wrote: > > In ioctl KVM_X86_SET_MSR_FILTER, input from user space is validated > > after a memdup_user(). For invalid inputs we'd memdup and then call > > kfree unnecessarily. Hoist input validation to avoid kfree altogether. > > > > Signed-off-by: Siddharth Chandrasekaran > > --- > > arch/x86/kvm/x86.c | 21 ++++++--------------- > > 1 file changed, 6 insertions(+), 15 deletions(-) > > > > diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c > > index ee0dc58ac3a5..15c20b31cc91 100644 > > --- a/arch/x86/kvm/x86.c > > +++ b/arch/x86/kvm/x86.c > > @@ -5393,11 +5393,16 @@ static int kvm_add_msr_filter(struct kvm_x86_msr_filter *msr_filter, > > struct msr_bitmap_range range; > > unsigned long *bitmap = NULL; > > size_t bitmap_size; > > - int r; > > > > if (!user_range->nmsrs) > > return 0; > > > > + if (user_range->flags & ~(KVM_MSR_FILTER_READ | KVM_MSR_FILTER_WRITE)) > > + return -EINVAL; > > + > > + if (!user_range->flags) > > + return -EINVAL; > > + > > bitmap_size = BITS_TO_LONGS(user_range->nmsrs) * sizeof(long); > > if (!bitmap_size || bitmap_size > KVM_MSR_FILTER_MAX_BITMAP_SIZE) > > return -EINVAL; > > @@ -5413,24 +5418,10 @@ static int kvm_add_msr_filter(struct kvm_x86_msr_filter *msr_filter, > > .bitmap = bitmap, > > }; > > > > - if (range.flags & ~(KVM_MSR_FILTER_READ | KVM_MSR_FILTER_WRITE)) { > > - r = -EINVAL; > > - goto err; > > - } > > - > > - if (!range.flags) { > > - r = -EINVAL; > > - goto err; > > - } > > - > > - /* Everything ok, add this range identifier. */ > > msr_filter->ranges[msr_filter->count] = range; > > Might be worth elminating the intermediate "range", too. Doesn't affect output, > but it would make it a little more obvious that the new range is mostly coming > straight from userspace input. E.g. > > msr_filter->ranges[msr_filter->count] = (struct msr_bitmap_range) { > .flags = user_range->flags, > .base = user_range->base, > .nmsrs = user_range->nmsrs, > .bitmap = bitmap, > }; > > Either way: > > Reviewed-by: Sean Christopherson Thanks for the review. Changed as suggested. ~ Sid. Amazon Development Center Germany GmbH Krausenstr. 38 10117 Berlin Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B Sitz: Berlin Ust-ID: DE 289 237 879