From: Sean Christopherson <seanjc@google.com>
To: Paolo Bonzini <pbonzini@redhat.com>
Cc: kvm@vger.kernel.org, Chao Gao <chao.gao@intel.com>,
Mathias Krause <minipli@grsecurity.net>,
Sean Christopherson <seanjc@google.com>
Subject: [kvm-unit-tests PATCH v4 18/18] x86: cet: Add testcases to verify KVM rejects emulation of CET instructions
Date: Fri, 14 Nov 2025 12:51:00 -0800 [thread overview]
Message-ID: <20251114205100.1873640-19-seanjc@google.com> (raw)
In-Reply-To: <20251114205100.1873640-1-seanjc@google.com>
Add SHSTK and IBT testcases to verify that KVM rejects (forced) emulation
of instructions that interact with SHSTK and/or IBT state, as KVM doesn't
support emulating SHSTK or IBT (rejecting emulation is preferable to
compromising guest security).
Signed-off-by: Sean Christopherson <seanjc@google.com>
---
x86/cet.c | 125 +++++++++++++++++++++++++++++++++++++++++++++++++++++-
1 file changed, 124 insertions(+), 1 deletion(-)
diff --git a/x86/cet.c b/x86/cet.c
index 7ffe234b..e94ffb72 100644
--- a/x86/cet.c
+++ b/x86/cet.c
@@ -74,6 +74,116 @@ static uint64_t cet_ibt_func(void)
return 0;
}
+#define __CET_TEST_UNSUPPORTED_INSTRUCTION(insn) \
+({ \
+ struct far_pointer32 fp = { \
+ .offset = 0, \
+ .selector = USER_CS, \
+ }; \
+ \
+ asm volatile ("push %%rax\n" \
+ ASM_TRY_FEP("1f") insn "\n\t" \
+ "1:" \
+ "pop %%rax\n" \
+ : : "m" (fp), "a" (NONCANONICAL) : "memory"); \
+ \
+ exception_vector(); \
+})
+
+#define SHSTK_TEST_UNSUPPORTED_INSTRUCTION(insn) \
+do { \
+ uint8_t vector = __CET_TEST_UNSUPPORTED_INSTRUCTION(insn); \
+ \
+ report(vector == UD_VECTOR, "SHSTK: Wanted #UD on %s, got %s", \
+ insn, exception_mnemonic(vector)); \
+} while (0)
+
+/*
+ * Treat IRET as unsupported with IBT even though the minimal interactions with
+ * IBT _could_ be easily emulated by KVM, as KVM doesn't support emulating IRET
+ * outside of Real Mode.
+ */
+#define CET_TEST_UNSUPPORTED_INSTRUCTIONS(CET) \
+do { \
+ CET##_TEST_UNSUPPORTED_INSTRUCTION("callq *%%rax"); \
+ CET##_TEST_UNSUPPORTED_INSTRUCTION("lcall *%0"); \
+ CET##_TEST_UNSUPPORTED_INSTRUCTION("syscall"); \
+ CET##_TEST_UNSUPPORTED_INSTRUCTION("sysenter"); \
+ CET##_TEST_UNSUPPORTED_INSTRUCTION("iretq"); \
+} while (0)
+
+static uint64_t cet_shstk_emulation(void)
+{
+ CET_TEST_UNSUPPORTED_INSTRUCTIONS(SHSTK);
+
+ SHSTK_TEST_UNSUPPORTED_INSTRUCTION("call 1f");
+ SHSTK_TEST_UNSUPPORTED_INSTRUCTION("retq");
+ SHSTK_TEST_UNSUPPORTED_INSTRUCTION("retq $10");
+ SHSTK_TEST_UNSUPPORTED_INSTRUCTION("lretq");
+ SHSTK_TEST_UNSUPPORTED_INSTRUCTION("lretq $10");
+
+ /* Do a handful of JMPs to verify they aren't impacted by SHSTK. */
+ asm volatile(KVM_FEP "jmp 1f\n\t"
+ "1:\n\t"
+ KVM_FEP "lea 2f(%%rip), %%rax\n\t"
+ KVM_FEP "jmp *%%rax\n\t"
+ "2:\n\t"
+ KVM_FEP "push $" xstr(USER_CS) "\n\t"
+ KVM_FEP "lea 3f(%%rip), %%rax\n\t"
+ KVM_FEP "push %%rax\n\t"
+ /*
+ * Manually encode ljmpq, which gas doesn't recognize due
+ * to AMD not supporting the instruction (64-bit JMP FAR).
+ */
+ KVM_FEP ".byte 0x48\n\t"
+ "ljmpl *(%%rsp)\n\t"
+ "3:\n\t"
+ KVM_FEP "pop %%rax\n\t"
+ KVM_FEP "pop %%rax\n\t"
+ ::: "eax");
+
+ return 0;
+}
+
+/*
+ * Don't invoke printf() or report() in the IBT testcase, as it will likely
+ * generate an indirect branch without an endbr64 annotation and thus #CP.
+ * Return the line number of the macro invocation to signal failure.
+ */
+#define IBT_TEST_UNSUPPORTED_INSTRUCTION(insn) \
+do { \
+ uint8_t vector = __CET_TEST_UNSUPPORTED_INSTRUCTION(insn); \
+ \
+ report(vector == UD_VECTOR, "IBT: Wanted #UD on %s, got %s", \
+ insn, exception_mnemonic(vector)); \
+} while (0)
+
+static uint64_t cet_ibt_emulation(void)
+{
+ CET_TEST_UNSUPPORTED_INSTRUCTIONS(IBT);
+
+ IBT_TEST_UNSUPPORTED_INSTRUCTION("jmp *%%rax");
+ IBT_TEST_UNSUPPORTED_INSTRUCTION("ljmpl *%0");
+
+ /* Verify direct CALLs and JMPs, and all RETs aren't impacted by IBT. */
+ asm volatile(KVM_FEP "jmp 2f\n\t"
+ "1: " KVM_FEP " ret\n\t"
+ "2: " KVM_FEP " call 1b\n\t"
+ KVM_FEP "push $" xstr(USER_CS) "\n\t"
+ KVM_FEP "lea 3f(%%rip), %%rax\n\t"
+ KVM_FEP "push %%rax\n\t"
+ KVM_FEP "lretq\n\t"
+ "3:\n\t"
+ KVM_FEP "push $0x55555555\n\t"
+ KVM_FEP "push $" xstr(USER_CS) "\n\t"
+ KVM_FEP "lea 4f(%%rip), %%rax\n\t"
+ KVM_FEP "push %%rax\n\t"
+ KVM_FEP "lretq $8\n\t"
+ "4:\n\t"
+ ::: "eax");
+ return 0;
+}
+
#define CP_ERR_NEAR_RET 0x0001
#define CP_ERR_FAR_RET 0x0002
#define CP_ERR_ENDBR 0x0003
@@ -119,7 +229,7 @@ static void test_shstk(void)
/* Store shadow-stack pointer. */
wrmsr(MSR_IA32_PL3_SSP, (u64)(shstk_virt + 0x1000));
- printf("Unit tests for CET user mode...\n");
+ printf("Running user mode Shadow Stack tests\n");
run_in_user(cet_shstk_func, CP_VECTOR, 0, 0, 0, 0, &rvc);
report(rvc && exception_error_code() == CP_ERR_NEAR_RET,
"NEAR RET shadow-stack protection test");
@@ -128,6 +238,12 @@ static void test_shstk(void)
report(rvc && exception_error_code() == CP_ERR_FAR_RET,
"FAR RET shadow-stack protection test");
+ if (is_fep_available &&
+ (run_in_user(cet_shstk_emulation, CP_VECTOR, 0, 0, 0, 0, &rvc) || rvc))
+ report_fail("Forced emulation with SHSTK generated %s(%u)",
+ exception_mnemonic(exception_vector()),
+ exception_error_code());
+
/* SSP should be 4-Byte aligned */
vector = wrmsr_safe(MSR_IA32_PL3_SSP, 0x1);
report(vector == GP_VECTOR, "MSR_IA32_PL3_SSP alignment test.");
@@ -158,6 +274,7 @@ static uint64_t ibt_run_in_user(usermode_func func, bool *got_cp)
static void test_ibt(void)
{
bool got_cp;
+ uint64_t l;
if (!this_cpu_has(X86_FEATURE_IBT)) {
report_skip("IBT not supported");
@@ -170,6 +287,12 @@ static void test_ibt(void)
ibt_run_in_user(cet_ibt_func, &got_cp);
report(got_cp && exception_error_code() == CP_ERR_ENDBR,
"Indirect-branch tracking test");
+
+ if (is_fep_available &&
+ ((l = ibt_run_in_user(cet_ibt_emulation, &got_cp)) || got_cp))
+ report_fail("Forced emulation with IBT generated %s(%u) at line %lu",
+ exception_mnemonic(exception_vector()),
+ exception_error_code(), l);
}
int main(int ac, char **av)
--
2.52.0.rc1.455.g30608eb744-goog
next prev parent reply other threads:[~2025-11-14 20:51 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-14 20:50 [kvm-unit-tests PATCH v4 00/18] x86: Improve CET tests Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 01/18] x86: cet: Pass virtual addresses to invlpg Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 02/18] x86: cet: Remove unnecessary memory zeroing for shadow stack Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 03/18] x86: cet: Directly check for #CP exception in run_in_user() Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 04/18] x86: cet: Validate #CP error code Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 05/18] x86: cet: Use report_skip() Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 06/18] x86: cet: Drop unnecessary casting Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 07/18] x86: cet: Validate writing unaligned values to SSP MSR causes #GP Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 08/18] x86: cet: Validate CET states during VMX transitions Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 09/18] x86: cet: Make shadow stack less fragile Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 10/18] x86: cet: Simplify IBT test Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 11/18] x86: cet: Use symbolic values for the #CP error codes Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 12/18] x86: cet: Test far returns too Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 13/18] x86: Avoid top-most page for vmalloc on x86-64 Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 14/18] x86: cet: Run SHSTK and IBT tests as appropriate if either feature is supported Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 15/18] x86: cet: Drop the "intel_" prefix from the CET testcase Sean Christopherson
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 16/18] x86: cet: Enable NOTRACK handling for IBT tests Sean Christopherson
2025-11-15 5:30 ` Mathias Krause
2025-11-14 20:50 ` [kvm-unit-tests PATCH v4 17/18] x86: cet: Reset IBT tracker state on #CP violations Sean Christopherson
2025-11-15 5:40 ` Mathias Krause
2025-11-14 20:51 ` Sean Christopherson [this message]
2025-11-15 6:15 ` [kvm-unit-tests PATCH v4 18/18] x86: cet: Add testcases to verify KVM rejects emulation of CET instructions Mathias Krause
2025-11-17 7:32 ` Mathias Krause
2025-11-18 22:26 ` [kvm-unit-tests PATCH v4 00/18] x86: Improve CET tests Sean Christopherson
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251114205100.1873640-19-seanjc@google.com \
--to=seanjc@google.com \
--cc=chao.gao@intel.com \
--cc=kvm@vger.kernel.org \
--cc=minipli@grsecurity.net \
--cc=pbonzini@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox