On 2014-06-04 23:17, Bandan Das wrote:
> Verify that vmon fails with unaligned vmxon region or
> any bits set beyong the physical address width. Also verify
> failure with an invalid revision identifier.
> 
> Signed-off-by: Bandan Das <[email protected]>
> ---
>  x86/vmx.c | 46 +++++++++++++++++++++++++++++++++++++++++++---
>  1 file changed, 43 insertions(+), 3 deletions(-)
> 
> diff --git a/x86/vmx.c b/x86/vmx.c
> index 1182eef..207eb81 100644
> --- a/x86/vmx.c
> +++ b/x86/vmx.c
> @@ -37,7 +37,7 @@
>  #include "smp.h"
>  #include "io.h"
>  
> -u32 *vmxon_region;
> +u64 *vmxon_region;
>  struct vmcs *vmcs_root;
>  u32 vpid_cnt;
>  void *guest_stack, *guest_syscall_stack;
> @@ -598,13 +598,53 @@ static int test_vmx_feature_control(void)
>  
>  static int test_vmxon(void)
>  {
> -     int ret;
> +     int ret, ret1;
>       u64 rflags;
> +     u64 *tmp_region = vmxon_region;
> +     int width = cpuid(0x80000008).a & 0xff;
> +
> +     /* Unaligned page access */
> +     vmxon_region = (u64 *)((intptr_t)vmxon_region + 1);
> +     rflags = read_rflags() | X86_EFLAGS_CF | X86_EFLAGS_ZF;
> +     write_rflags(rflags);
> +     ret1 = vmx_on();

Can we ensure that the compiler doesn't inject any ops between
write_rflags and the vmxon that overwrite CF or ZF? If you want those
flags in a specific state, maybe it's better to pass that to vmx_on and
do this in the assembly block with vmxon.

> +     report("test vmxon with unaligned vmxon region", ret1);
> +     if (!ret1) {
> +             ret = 1;
> +             goto out;
> +     }
>  
> +     /* gpa bits beyond physical address width are set*/
> +     vmxon_region = (u64 *)((intptr_t)tmp_region | ((u64)1 << (width+1)));
> +     rflags = read_rflags() | X86_EFLAGS_CF | X86_EFLAGS_ZF;
> +     write_rflags(rflags);
> +     ret1 = vmx_on();
> +     report("test vmxon with bits set beyond physical address width", ret1);
> +     if (!ret1) {
> +             ret = 1;
> +             goto out;
> +     }
> +
> +     /* invalid revision indentifier */
> +     vmxon_region = tmp_region;
> +     *vmxon_region = 0xba9da9;
> +     rflags = read_rflags() | X86_EFLAGS_CF | X86_EFLAGS_ZF;
> +     write_rflags(rflags);
> +     ret1 = vmx_on();
> +     report("test vmxon with invalid revision identifier", ret1);
> +     if (!ret1) {
> +             ret = 1;
> +             goto out;
> +     }
> +
> +     /* and finally a valid region */
> +     *vmxon_region = basic.revision;
>       rflags = read_rflags() | X86_EFLAGS_CF | X86_EFLAGS_ZF;
>       write_rflags(rflags);
>       ret = vmx_on();

Oh, this pattern is not by you! OK, but let's address this first, then
add the new tests on top.

Jan

> -     report("test vmxon", !ret);
> +     report("test vmxon with valid vmxon region", !ret);
> +
> +out:
>       return ret;
>  }
>  
> 

-- 
Siemens AG, Corporate Technology, CT RTC ITP SES-DE
Corporate Competence Center Embedded Linux
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to