Yang, Sheng wrote:
> From 9743b5299bae1779c2b893cbeb86122bcccb9b2d Mon Sep 17 00:00:00 2001
> From: Sheng Yang <[EMAIL PROTECTED]>
> Date: Wed, 2 Jan 2008 14:49:22 +0800
> Subject: [PATCH] KVM: emulator: Only allow VMCALL/VMMCALL trapped by #UD
>
> When executing a test program called "crashme", we found the KVM guest cannot 
> survived more than ten seconds, then encounterd kernel panic. The basic 
> concept of "crashme" is graduating random assembly code and trying to execute 
> them in a fork process.
>
> After some fix on emulator valid judgment, we found it's hard to get the 
> current emulator handle the invalid instructions correctly, for the #UD trap 
> for hypercall patching caused troubles. The problem is, if the opcode itself 
> was OK, but combination of opcode and modrm_reg was invalid, and one operand 
> of the opcode was memory(SrcMem or DstMem), emulator would fetched the memory 
> operand first rather than judged the validity, and may encounter error there. 
>   

Nice catch!

Regards,

Anthony Liguori

> For example, ".byte 0xfe, 0x34, 0xcd" got this trouble.
>
> In the patch, we simply check that if the invalid opcode isn't 
> vmcall/vmmcall, 
> then return from emulate_instruction() and inject a #UD to guest. With the 
> patch, the guest had been run for more than 12 hours.
>
> Signed-off-by: Feng (Eric) Liu <[EMAIL PROTECTED]>
> Signed-off-by: Sheng Yang <[EMAIL PROTECTED]>
> ---
>  arch/x86/kvm/svm.c         |    2 +-
>  arch/x86/kvm/vmx.c         |    2 +-
>  arch/x86/kvm/x86.c         |   18 +++++++++++++++---
>  include/asm-x86/kvm_host.h |    4 +++-
>  4 files changed, 20 insertions(+), 6 deletions(-)
>
> diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
> index 11e5baf..2da9e11 100644
> --- a/arch/x86/kvm/svm.c
> +++ b/arch/x86/kvm/svm.c
> @@ -942,7 +942,7 @@ static int ud_interception(struct vcpu_svm *svm, struct 
> kvm_run *kvm_run)
>  {
>       int er;
>  
> -     er = emulate_instruction(&svm->vcpu, kvm_run, 0, 0, 0);
> +     er = emulate_instruction(&svm->vcpu, kvm_run, 0, 0, EMULTYPE_TRAP_UD);
>       if (er != EMULATE_DONE)
>               kvm_queue_exception(&svm->vcpu, UD_VECTOR);
>       return 1;
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> index 4741806..5346e42 100644
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -1862,7 +1862,7 @@ static int handle_exception(struct kvm_vcpu *vcpu, 
> struct kvm_run *kvm_run)
>       }
>  
>       if (is_invalid_opcode(intr_info)) {
> -             er = emulate_instruction(vcpu, kvm_run, 0, 0, 0);
> +             er = emulate_instruction(vcpu, kvm_run, 0, 0, EMULTYPE_TRAP_UD);
>               if (er != EMULATE_DONE)
>                       kvm_queue_exception(vcpu, UD_VECTOR);
>               return 1;
> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> index c5b4825..2a659ce 100644
> --- a/arch/x86/kvm/x86.c
> +++ b/arch/x86/kvm/x86.c
> @@ -1840,9 +1840,10 @@ int emulate_instruction(struct kvm_vcpu *vcpu,
>                       struct kvm_run *run,
>                       unsigned long cr2,
>                       u16 error_code,
> -                     int no_decode)
> +                     int emulation_type)
>  {
>       int r;
> +     struct decode_cache *c;
>  
>       vcpu->arch.mmio_fault_cr2 = cr2;
>       kvm_x86_ops->cache_regs(vcpu);
> @@ -1850,7 +1851,7 @@ int emulate_instruction(struct kvm_vcpu *vcpu,
>       vcpu->mmio_is_write = 0;
>       vcpu->arch.pio.string = 0;
>  
> -     if (!no_decode) {
> +     if (!(emulation_type & EMULTYPE_NO_DECODE)) {
>               int cs_db, cs_l;
>               kvm_x86_ops->get_cs_db_l_bits(vcpu, &cs_db, &cs_l);
>  
> @@ -1884,6 +1885,16 @@ int emulate_instruction(struct kvm_vcpu *vcpu,
>                                       get_segment_base(vcpu, VCPU_SREG_FS);
>  
>               r = x86_decode_insn(&vcpu->arch.emulate_ctxt, &emulate_ops);
> +
> +             /* Reject the instructions other than VMCALL/VMMCALL when
> +              * try to emulate invalid opcode */
> +             c = &vcpu->arch.emulate_ctxt.decode;
> +             if ((emulation_type & EMULTYPE_TRAP_UD) &&
> +                 (!(c->twobyte && c->b == 0x01 &&
> +                   (c->modrm_reg == 0 || c->modrm_reg == 3) &&
> +                    c->modrm_mod == 3 && c->modrm_rm == 1)))
> +                     return EMULATE_FAIL;
> +
>               ++vcpu->stat.insn_emulation;
>               if (r)  {
>                       ++vcpu->stat.insn_emulation_fail;
> @@ -2639,7 +2650,8 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, 
> struct kvm_run *kvm_run)
>               vcpu->mmio_read_completed = 1;
>               vcpu->mmio_needed = 0;
>               r = emulate_instruction(vcpu, kvm_run,
> -                                     vcpu->arch.mmio_fault_cr2, 0, 1);
> +                                     vcpu->arch.mmio_fault_cr2, 0,
> +                                     EMULTYPE_NO_DECODE);
>               if (r == EMULATE_DO_MMIO) {
>                       /*
>                        * Read-modify-write.  Back to userspace.
> diff --git a/include/asm-x86/kvm_host.h b/include/asm-x86/kvm_host.h
> index 20597bc..4702b04 100644
> --- a/include/asm-x86/kvm_host.h
> +++ b/include/asm-x86/kvm_host.h
> @@ -415,8 +415,10 @@ enum emulation_result {
>       EMULATE_FAIL,         /* can't emulate this instruction */
>  };
>  
> +#define EMULTYPE_NO_DECODE       (1 << 0)
> +#define EMULTYPE_TRAP_UD         (1 << 1)
>  int emulate_instruction(struct kvm_vcpu *vcpu, struct kvm_run *run,
> -                     unsigned long cr2, u16 error_code, int no_decode);
> +                     unsigned long cr2, u16 error_code, int emulation_type);
>  void kvm_report_emulation_failure(struct kvm_vcpu *cvpu, const char 
> *context);
>  void realmode_lgdt(struct kvm_vcpu *vcpu, u16 size, unsigned long address);
>  void realmode_lidt(struct kvm_vcpu *vcpu, u16 size, unsigned long address);
>   
> ------------------------------------------------------------------------
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Microsoft
> Defy all challenges. Microsoft(R) Visual Studio 2005.
> http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
> ------------------------------------------------------------------------
>
> _______________________________________________
> kvm-devel mailing list
> kvm-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/kvm-devel


-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to