From nobody Mon Feb 9 13:02:36 2026 Received: from mail-pj1-f74.google.com (mail-pj1-f74.google.com [209.85.216.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D6D722BEC3A for ; Fri, 17 Oct 2025 00:33:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760661207; cv=none; b=kCMFF2OmBJdQ76Ams0gdTGkigBA0Rons6HyO9qWACB+avwA09Qfc0ZL+VWV3EdSzNxXwv/K6xJuR3imsLFGvVPXSLOLJRgpGLV54CCRqRyTXJVVd4/h0YUcpng0KU47+HwF1nNN0AJ8Eu5GUn2Qa/smmxO0q9a4uQ+6tRMU104Y= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1760661207; c=relaxed/simple; bh=7L8ZMSuIkRJTkNiFBvS5epoU4gg7pv9o+BehY7SDauc=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=K3J1sYf2r6tc32nxwLSLsA6MCe3E1KpNk8yaMhXqqv+lH0SbtGMhdb3IuhV0Yhg/vcZ/4x6Jg6iOeiNRB2YSxchRxNmD+PWwJB/BsIz9pUpnjLhaeFIX5h/5Z01dQypfCeOSqdJwJE8a8E7l5RPbUd35mjbzSBzmRwD2IeWDbWs= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=I2d2BaLt; arc=none smtp.client-ip=209.85.216.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="I2d2BaLt" Received: by mail-pj1-f74.google.com with SMTP id 98e67ed59e1d1-32ee4998c50so1124848a91.3 for ; Thu, 16 Oct 2025 17:33:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1760661205; x=1761266005; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=G1uT4yQcba8Ntip8LDR4veCehne/0rON+KC3PlpYlbc=; b=I2d2BaLtXqDJIKsNYUqpCOnQeIzAGYVpirrMAlP0NvOM+mzhb0h0sgpGfn0PitSFTU +5dns31JOWekYVeclB4cNzOz/l06RBk+7mBe+cupAbWT/FfI0Jl7ZUFTYguzroQROfqw +hFhYY6VZR8XnV7MFhanRhR9G9xvLAxF4X46uQbEubCFfqLGRiEuWlYpVhCb7JpINlyM nlabs3mKEln6vSpYDZEPDRai6uaWjlsqTEFM6xQ8QBrW6ullentcn29VVQnk1T/XsCo/ 10AWXS1pVYoYiud2ksL9f6HFJzWRLNNxEEJiS3dVOdgcOVLgyGkJ6kiO5T5BMRXMjhNt 6VSg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760661205; x=1761266005; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=G1uT4yQcba8Ntip8LDR4veCehne/0rON+KC3PlpYlbc=; b=JpQ0CQX0mSXpiz9j+dHun1z4LuqcSYX6LvFeXO/ZeqQqDNbEeKyrIqJPZ4IedhuPEs fslAjxY0Ap3YxZzPdF3wjSSK2SoZidQpdPwJKoUQOWbNKHFJkDL8Rekicim9Vo6TfaHX LVN9KgPKpbDyBKA1Q9PqQM24Pv8lxuo/nyiVo6/Fk5AJ55vjTtl1kDNgBUbH8CIPD1TN xV4NxSYMnWOr0Qa5yjKUJYQZVSsZCeqCRIPvhMCExREOTb6dT5OFGCjscWjyjXZFPV3a pbM1n+XsWPHjLc5imkfoMWBe6h+v+88rQmerJ/4DT7iSNvMRAhh2itDlNjYKlUtj2QRN T9DA== X-Forwarded-Encrypted: i=1; AJvYcCXUnipsLHdVxapxiT2F9zSwFxku/kIAZPmrE1whTRb5kjqo5A2AoiiJzcOJj4tqdQDY2mudSL6nGRgnJEM=@vger.kernel.org X-Gm-Message-State: AOJu0YwztrGbHFOm8yL/aSzoTxyPvZlg5pi+7NxkHbgisSnrYRXUU/6T KvLPOtowozWpFe8TXigR+NNEUSz3PdAxCy9YexfSgeyriiLIEsXn/SEuedfdUU5NGFrURraNsqH EU6ByPA== X-Google-Smtp-Source: AGHT+IFb3cb9XScIkfIbQA2oQID7nhqxfExRyWF6N5UGcVhE3T71y0SJP1d51io6pNMM6/KZP3XG25y1rx0= X-Received: from pjoa3.prod.google.com ([2002:a17:90a:8c03:b0:32e:a549:83e3]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a17:90b:2d8f:b0:335:2eee:19dc with SMTP id 98e67ed59e1d1-33bcf8f94b6mr1826093a91.28.1760661204960; Thu, 16 Oct 2025 17:33:24 -0700 (PDT) Reply-To: Sean Christopherson Date: Thu, 16 Oct 2025 17:32:39 -0700 In-Reply-To: <20251017003244.186495-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251017003244.186495-1-seanjc@google.com> X-Mailer: git-send-email 2.51.0.858.gf9c4a03a3a-goog Message-ID: <20251017003244.186495-22-seanjc@google.com> Subject: [PATCH v3 21/25] KVM: TDX: Add tdx_get_cmd() helper to get and validate sub-ioctl command From: Sean Christopherson To: Marc Zyngier , Oliver Upton , Tianrui Zhao , Bibo Mao , Huacai Chen , Madhavan Srinivasan , Anup Patel , Paul Walmsley , Palmer Dabbelt , Albert Ou , Christian Borntraeger , Janosch Frank , Claudio Imbrenda , Sean Christopherson , Paolo Bonzini , "Kirill A. Shutemov" Cc: linux-arm-kernel@lists.infradead.org, kvmarm@lists.linux.dev, kvm@vger.kernel.org, loongarch@lists.linux.dev, linux-mips@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kvm-riscv@lists.infradead.org, linux-riscv@lists.infradead.org, x86@kernel.org, linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, Ira Weiny , Kai Huang , Michael Roth , Yan Zhao , Vishal Annapurve , Rick Edgecombe , Ackerley Tng , Binbin Wu Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add a helper to copy a kvm_tdx_cmd structure from userspace and verify that must-be-zero fields are indeed zero. No functional change intended. Signed-off-by: Sean Christopherson Reviewed-by: Kai Huang Reviewed-by: Rick Edgecombe --- arch/x86/kvm/vmx/tdx.c | 31 +++++++++++++++++-------------- 1 file changed, 17 insertions(+), 14 deletions(-) diff --git a/arch/x86/kvm/vmx/tdx.c b/arch/x86/kvm/vmx/tdx.c index 2e2dab89c98f..d5f810435f34 100644 --- a/arch/x86/kvm/vmx/tdx.c +++ b/arch/x86/kvm/vmx/tdx.c @@ -2761,20 +2761,25 @@ static int tdx_td_finalize(struct kvm *kvm, struct = kvm_tdx_cmd *cmd) return 0; } =20 +static int tdx_get_cmd(void __user *argp, struct kvm_tdx_cmd *cmd) +{ + if (copy_from_user(cmd, argp, sizeof(*cmd))) + return -EFAULT; + + if (cmd->hw_error) + return -EINVAL; + + return 0; +} + int tdx_vm_ioctl(struct kvm *kvm, void __user *argp) { struct kvm_tdx_cmd tdx_cmd; int r; =20 - if (copy_from_user(&tdx_cmd, argp, sizeof(struct kvm_tdx_cmd))) - return -EFAULT; - - /* - * Userspace should never set hw_error. It is used to fill - * hardware-defined error by the kernel. - */ - if (tdx_cmd.hw_error) - return -EINVAL; + r =3D tdx_get_cmd(argp, &tdx_cmd); + if (r) + return r; =20 mutex_lock(&kvm->lock); =20 @@ -3152,11 +3157,9 @@ int tdx_vcpu_ioctl(struct kvm_vcpu *vcpu, void __use= r *argp) if (!is_hkid_assigned(kvm_tdx) || kvm_tdx->state =3D=3D TD_STATE_RUNNABLE) return -EINVAL; =20 - if (copy_from_user(&cmd, argp, sizeof(cmd))) - return -EFAULT; - - if (cmd.hw_error) - return -EINVAL; + ret =3D tdx_get_cmd(argp, &cmd); + if (ret) + return ret; =20 switch (cmd.id) { case KVM_TDX_INIT_VCPU: --=20 2.51.0.858.gf9c4a03a3a-goog