|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2/2] x86/svm: Write the correct %eip into the outgoing task
On 22/11/2019 13:31, Jan Beulich wrote:
> On 21.11.2019 23:15, Andrew Cooper wrote:
>> --- a/xen/arch/x86/hvm/svm/emulate.c
>> +++ b/xen/arch/x86/hvm/svm/emulate.c
>> @@ -117,6 +117,61 @@ unsigned int svm_get_insn_len(struct vcpu *v, unsigned
>> int instr_enc)
>> }
>>
>> /*
>> + * TASK_SWITCH vmexits never provide an instruction length. We must always
>> + * decode under %rip to find the answer.
>> + */
>> +unsigned int svm_get_task_switch_insn_len(struct vcpu *v)
>> +{
>> + struct hvm_emulate_ctxt ctxt;
>> + struct x86_emulate_state *state;
>> + unsigned int emul_len, modrm_reg;
>> +
>> + ASSERT(v == current);
> You look to be using v here just for this ASSERT() - is this really
> worth it? By making the function take "void" it would be quite obvious
> that it would act on the current vCPU only.
This was cribbed largely from svm_get_insn_len(), which also behaves the
same.
>
>> + hvm_emulate_init_once(&ctxt, NULL, guest_cpu_user_regs());
>> + hvm_emulate_init_per_insn(&ctxt, NULL, 0);
>> + state = x86_decode_insn(&ctxt.ctxt, hvmemul_insn_fetch);
>> + if ( IS_ERR_OR_NULL(state) )
>> + return 0;
>> +
>> + emul_len = x86_insn_length(state, &ctxt.ctxt);
>> +
>> + /*
>> + * Check for an instruction which can cause a task switch. Any far
>> + * jmp/call/ret, any software interrupt/exception, and iret.
>> + */
>> + switch ( ctxt.ctxt.opcode )
>> + {
>> + case 0xff: /* Grp 5 */
>> + /* call / jmp (far, absolute indirect) */
>> + if ( x86_insn_modrm(state, NULL, &modrm_reg) != 3 ||
> DYM "== 3", to bail upon non-memory operands?
Ah yes (and this demonstrates that I really need to get an XTF tested
sorted soon.)
>
>> + (modrm_reg != 3 && modrm_reg != 5) )
>> + {
>> + /* Wrong instruction. Throw #GP back for now. */
>> + default:
>> + hvm_inject_hw_exception(TRAP_gp_fault, 0);
>> + emul_len = 0;
>> + break;
>> + }
>> + /* Fallthrough */
>> + case 0x62: /* bound */
> Does "bound" really belong on this list? It raising #BR is like
> insns raising random other exceptions, not like INTO / INT3,
> where the IDT descriptor also has to have suitable DPL for the
> exception to actually get delivered (rather than #GP). I.e. it
> shouldn't make it here in the first place, due to the
> X86_EVENTTYPE_HW_EXCEPTION check in the caller.
>
> IOW if "bound" needs to be here, then all others need to be as
> well, unless they can't cause any exception at all.
More experimentation required. BOUND doesn't appear to be special cased
by SVM, but is by VT-x. VT-x however does throw it in the same category
as #UD, and identify it to be a hardware exception.
I suspect you are right, and t doesn't want to be here.
>> + case 0x9a: /* call (far, absolute) */
>> + case 0xca: /* ret imm16 (far) */
>> + case 0xcb: /* ret (far) */
>> + case 0xcc: /* int3 */
>> + case 0xcd: /* int imm8 */
>> + case 0xce: /* into */
>> + case 0xcf: /* iret */
>> + case 0xea: /* jmp (far, absolute) */
>> + case 0xf1: /* icebp */
> Same perhaps for ICEBP, albeit I'm less certain here, as its
> behavior is too poorly documented (if at all).
ICEBP's #DB is a trap, not a fault, so instruction length is important.
>
>> --- a/xen/arch/x86/hvm/svm/svm.c
>> +++ b/xen/arch/x86/hvm/svm/svm.c
>> @@ -2776,7 +2776,41 @@ void svm_vmexit_handler(struct cpu_user_regs *regs)
>>
>> case VMEXIT_TASK_SWITCH: {
>> enum hvm_task_switch_reason reason;
>> - int32_t errcode = -1;
>> + int32_t errcode = -1, insn_len = -1;
>> +
>> + /*
>> + * All TASK_SWITCH intercepts have fault-like semantics. NRIP is
>> + * never provided, even for instruction-induced task switches, but
>> we
>> + * need to know the instruction length in order to set %eip suitably
>> + * in the outgoing TSS.
>> + *
>> + * For a task switch which vectored through the IDT, look at the
>> type
>> + * to distinguish interrupts/exceptions from instruction based
>> + * switches.
>> + */
>> + if ( vmcb->eventinj.fields.v )
>> + {
>> + /*
>> + * HW_EXCEPTION, NMI and EXT_INTR are not instruction based.
>> All
>> + * others are.
>> + */
>> + if ( vmcb->eventinj.fields.type <= X86_EVENTTYPE_HW_EXCEPTION )
>> + insn_len = 0;
>> +
>> + /*
>> + * Clobber the vectoring information, as we are going to emulate
>> + * the task switch in full.
>> + */
>> + vmcb->eventinj.bytes = 0;
>> + }
>> +
>> + /*
>> + * insn_len being -1 indicates that we have an instruction-induced
>> + * task switch. Decode under %rip to find its length.
>> + */
>> + if ( insn_len < 0 && (insn_len = svm_get_task_switch_insn_len(v))
>> == 0 )
>> + break;
> Won't this live-lock the guest?
Potentially, yes.
> I.e. isn't it better to e.g. crash it
> if svm_get_task_switch_insn_len() didn't raise #GP(0)?
No - that would need and XSA if we got it wrong, as none of these are
privileged instruction.
However, it occurs to me that we are in a position to use
svm_crash_or_fault(), so I'll respin with that in mind.
~Andrew
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |