Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp6901680pxv; Fri, 30 Jul 2021 05:27:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyqgqqqff6nXeKaWmAeaRKpjq6qkiZYLV/anlFxutRqtuBGuSoEBBXvFAmjBQqMfAc0hy2k X-Received: by 2002:a92:a30b:: with SMTP id a11mr1766288ili.206.1627648049213; Fri, 30 Jul 2021 05:27:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627648049; cv=none; d=google.com; s=arc-20160816; b=yUOIpqp2/PT3Yd5FZ8F0N5eA8x5uPFwlr8M8s1hiC5F0pd70zriKjXUjd+HvZ2t1mo L4FGONeSofZt7rHIT6JcRKgQdX5NuDuKz3TnvWkZh3Qp3KL7ra0Ee/cpdyJLVmBJvrKL ZshOVDhD8QIf6ur9ZUQ9oHCGP6zVTE1n1lWjPWXEulzrsKwU96S3/dNY2+p8m+eeJS2j qcU15ICuJ3+YpWLyjmjmPHvT4SfSw7ikVc42pqSFQvonViM06qF/4ZKMp8pBGjbm1xyw +z7zRGwaWJWcvLxxpVuuGhOlZ1HjQeEQQI4uo0AX1N+fWT+7VS1AIAkT+g15VDYtYx09 rzEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=Rrhyyvp0zkFQtrfd/3DV5heIe5kJo0eO//g6b1U7eNs=; b=Zz/2Ix3QQptUaKoqOJA6ekP/jxZvG8JDgeH5LqZc9QCHJQqGvO7mOvr+u57+viScF6 8ovhzWMiE4k5X1WCApth6E4vz2S6VdICV2gSRdADJ0OJJlfQhs9RO0RwjCoF/1DV/Ie7 9vulvj+wFV52NJbiAM4DWSHJU+j1qrMowjXoD8P/Ja2HrY5UO/LkpdEz3sPQU1U3kVq/ WYZ9jzByKSiNtuFFgt6hHdPzY+Ad1wuCqQhNMPDWHhCKf/yd3dQ06tu/r5o+XzEjp2TJ 337Py6fCW/TwfDSmqUG7md4RmBIlMham+SLZJI4WLsdpWM3w/IOOKK6r+IVGtIJ1Qapv UB4w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PPYOkXVk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o18si1925241jat.46.2021.07.30.05.27.18; Fri, 30 Jul 2021 05:27:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=PPYOkXVk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238742AbhG3M0k (ORCPT + 99 others); Fri, 30 Jul 2021 08:26:40 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:53373 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238663AbhG3M0j (ORCPT ); Fri, 30 Jul 2021 08:26:39 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1627647994; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Rrhyyvp0zkFQtrfd/3DV5heIe5kJo0eO//g6b1U7eNs=; b=PPYOkXVkpx+AEWHDBhTVyL1sHyt1C1ZBTuJcVaLuXdLCnTgz8qPuIKh7adp6nJNLUbt3Ex CTJ/NyA5atlm6K9U+wi4KL2xoAzpTcstZCVS2YC2h6ogKxxQ2lT6SBlCejwFBPef4bV47z HyTvCuOwlnyXU2l2iYwV2Ic9HIPwgm8= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-478-DCfAMmnqMcupEaG5ApwhTg-1; Fri, 30 Jul 2021 08:26:33 -0400 X-MC-Unique: DCfAMmnqMcupEaG5ApwhTg-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id F156018C89DA; Fri, 30 Jul 2021 12:26:31 +0000 (UTC) Received: from vitty.brq.redhat.com (unknown [10.40.194.154]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9DD0B18C7A; Fri, 30 Jul 2021 12:26:26 +0000 (UTC) From: Vitaly Kuznetsov To: kvm@vger.kernel.org, Paolo Bonzini Cc: Sean Christopherson , Wanpeng Li , Jim Mattson , Siddharth Chandrasekaran , linux-kernel@vger.kernel.org Subject: [PATCH 0/4] KVM: x86: hyper-v: Check if guest is allowed to use XMM registers for hypercall input Date: Fri, 30 Jul 2021 14:26:21 +0200 Message-Id: <20210730122625.112848-1-vkuznets@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org "KVM: x86: hyper-v: Fine-grained access check to Hyper-V hypercalls and MSRs" and "Add support for XMM fast hypercalls" series were developed at the same time so the later landed without a proper feature bit check for 'strict' (KVM_CAP_HYPERV_ENFORCE_CPUID) mode. Add it now. TLFS states that "Availability of the XMM fast hypercall interface is indicated via the “Hypervisor Feature Identification” CPUID Leaf (0x40000003, see section 2.4.4) ... Any attempt to use this interface when the hypervisor does not indicate availability will result in a #UD fault." Vitaly Kuznetsov (4): KVM: x86: hyper-v: Check access to hypercall before reading XMM registers KVM: x86: Introduce trace_kvm_hv_hypercall_done() KVM: x86: hyper-v: Check if guest is allowed to use XMM registers for hypercall input KVM: selftests: Test access to XMM fast hypercalls arch/x86/kvm/hyperv.c | 18 ++++++-- arch/x86/kvm/trace.h | 15 +++++++ .../selftests/kvm/include/x86_64/hyperv.h | 5 ++- .../selftests/kvm/x86_64/hyperv_features.c | 41 +++++++++++++++++-- 4 files changed, 71 insertions(+), 8 deletions(-) -- 2.31.1