All of lore.kernel.org
 help / color / mirror / Atom feed
From: Paolo Bonzini <pbonzini@redhat.com>
To: Eugene Korenevsky <ekorenevsky@gmail.com>, kvm@vger.kernel.org
Subject: Re: [PATCH] kvm: x86: vmx: add checks on guest RIP
Date: Mon, 01 Dec 2014 17:27:44 +0100	[thread overview]
Message-ID: <547C9700.6020407@redhat.com> (raw)
In-Reply-To: <20141129152726.GA25370@gnote>



On 29/11/2014 16:27, Eugene Korenevsky wrote:
> Signed-off-by: Eugene Korenevsky <ekorenevsky@gmail.com>
> ---
> 
> Notes:
>     This patch adds checks on Guest RIP specified in Intel Software Developer Manual.
>     
>     The following checks are performed on processors that support Intel 64 architecture:
>     - Bits 63:32 must be 0 if the "IA-32e mode guest" VM-entry control is 0 or if
>     the L bit (bit 13) in the access-rights field for CS is 0.
>     - If the processor supports N < 64 linear-address bits, bits 63:N must be identical
>     if the "IA-32e mode guest" VM-entry control is 1 and the L bit in the access-rights
>     field for CS is 1. (No check applies if the processor supports 64 linear-address
>     bits.)
> 
>  arch/x86/kvm/vmx.c | 27 ++++++++++++++++++++++++++-
>  1 file changed, 26 insertions(+), 1 deletion(-)
> 
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> index 6a951d8..e2da83b 100644
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -3828,6 +3828,28 @@ static bool cs_ss_rpl_check(struct kvm_vcpu *vcpu)
>  		 (ss.selector & SELECTOR_RPL_MASK));
>  }
>  
> +#ifdef CONFIG_X86_64
> +static bool rip_valid(struct kvm_vcpu *vcpu)
> +{
> +	unsigned long rip;
> +	struct kvm_segment cs;
> +	bool longmode;
> +
> +	/* RIP must be canonical in long mode
> +	 * Bits 63:32 of RIP must be zero in other processor modes */
> +	longmode = false;
> +	if (vm_entry_controls_get(to_vmx(vcpu)) & VM_ENTRY_IA32E_MODE) {
> +		vmx_get_segment(vcpu, &cs, VCPU_SREG_CS);
> +		longmode = (cs.l != 0);
> +	}
> +	rip = kvm_register_read(vcpu, VCPU_REGS_RIP);
> +	if (longmode)
> +		return !is_noncanonical_address(rip);

This check is off by one.  It is checking bits 63:47 instead of bits
63:48 (this quirk is intentionally part of the specification, so that
you can reenter a guest at 0x800000000000 after e.g. a VMCALL vmexit and
cause a general protection fault).

However, I am not sure how this can occur.  A #GP should have been
injected as part of the instruction that caused RIP to become invalid.
Perhaps you should check in nested_vmx_run instead?

Paolo

> +	else
> +		return (rip >> 32) == 0;
> +}
> +#endif
> +
>  /*
>   * Check if guest state is valid. Returns true if valid, false if
>   * not.
> @@ -3873,8 +3895,11 @@ static bool guest_state_valid(struct kvm_vcpu *vcpu)
>  		if (!ldtr_valid(vcpu))
>  			return false;
>  	}
> +#ifdef CONFIG_X86_64
> +	if (!rip_valid(vcpu))
> +		return false;
> +#endif
>  	/* TODO:
> -	 * - Add checks on RIP
>  	 * - Add checks on RFLAGS
>  	 */
>  
> 

My

  reply	other threads:[~2014-12-01 16:27 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-11-29 15:27 [PATCH] kvm: x86: vmx: add checks on guest RIP Eugene Korenevsky
2014-12-01 16:27 ` Paolo Bonzini [this message]
2014-12-03 22:56   ` Andy Lutomirski
2014-12-04  7:41     ` Paolo Bonzini

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=547C9700.6020407@redhat.com \
    --to=pbonzini@redhat.com \
    --cc=ekorenevsky@gmail.com \
    --cc=kvm@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.