From: Euan Harris <euan.harris@citrix.com>
To: xen-devel@lists.xenproject.org
Cc: andrew.cooper3@citrix.com, kevin.tian@intel.com,
Euan Harris <euan.harris@citrix.com>,
jun.nakajima@intel.com, jbeulich@suse.com
Subject: [PATCH 9/9] x86/vvmx: Use hvm_copy_{to, from}_guest_virt() to read operands
Date: Thu, 26 Oct 2017 18:03:19 +0100 [thread overview]
Message-ID: <1509037399-48926-10-git-send-email-euan.harris@citrix.com> (raw)
In-Reply-To: <1509037399-48926-1-git-send-email-euan.harris@citrix.com>
decode_vmx_inst() contains its own segmentation logic. This
unnecessarily duplicates segmentation code used elsewhere and contains
errors: it raises a #GP fault instead of an #SS fault for an invalid
memory access through the stack segment.
Replace this logic with hvm_copy_{to,from}_guest_virt(), which use
well-tested memory access code used in various other parts of the
hypervisor.
Signed-off-by: Euan Harris <euan.harris@citrix.com>
---
xen/arch/x86/hvm/vmx/vvmx.c | 80 +++++++++++++++------------------------------
1 file changed, 26 insertions(+), 54 deletions(-)
diff --git a/xen/arch/x86/hvm/vmx/vvmx.c b/xen/arch/x86/hvm/vmx/vvmx.c
index 9a4e6177ad..f0a2242711 100644
--- a/xen/arch/x86/hvm/vmx/vvmx.c
+++ b/xen/arch/x86/hvm/vmx/vvmx.c
@@ -199,7 +199,10 @@ struct vmx_inst_decoded {
int type;
unsigned int bytes;
union {
- unsigned long mem;
+ struct {
+ enum x86_segment seg;
+ unsigned long offset;
+ };
unsigned int reg_idx;
};
} op[2];
@@ -380,17 +383,7 @@ static int operand_read(void *buf, struct vmx_inst_op *op,
return X86EMUL_OKAY;
}
else
- {
- pagefault_info_t pfinfo;
- int rc = hvm_copy_from_guest_linear(buf, op->mem, bytes, 0, &pfinfo);
-
- if ( rc == HVMTRANS_bad_linear_to_gfn )
- hvm_inject_page_fault(pfinfo.ec, pfinfo.linear);
- if ( rc != HVMTRANS_okay )
- return X86EMUL_EXCEPTION;
-
- return X86EMUL_OKAY;
- }
+ return hvm_copy_from_guest_virt(buf, op->seg, op->offset, bytes, 0);
}
static inline u32 __n2_pin_exec_control(struct vcpu *v)
@@ -458,9 +451,8 @@ static int decode_vmx_inst(struct cpu_user_regs *regs,
{
struct vcpu *v = current;
union vmx_inst_info info;
- struct segment_register seg;
- unsigned long base, index, seg_base, disp, offset;
- int scale, size;
+ unsigned long base, index, disp, offset;
+ int scale;
unsigned int bytes = vmx_guest_x86_mode(v);
@@ -477,14 +469,11 @@ static int decode_vmx_inst(struct cpu_user_regs *regs,
}
else
{
- bool mode_64bit = (bytes == 8);
-
- decode->op[0].type = VMX_INST_MEMREG_TYPE_MEMORY;
-
if ( info.fields.segment > x86_seg_gs )
- goto gp_fault;
- hvm_get_segment_register(v, info.fields.segment, &seg);
- seg_base = seg.base;
+ {
+ ASSERT_UNREACHABLE();
+ return X86EMUL_UNHANDLEABLE;
+ }
base = info.fields.base_reg_invalid ? 0 :
reg_read(regs, info.fields.base_reg);
@@ -496,19 +485,12 @@ static int decode_vmx_inst(struct cpu_user_regs *regs,
__vmread(EXIT_QUALIFICATION, &disp);
- size = 1 << (info.fields.addr_size + 1);
-
- offset = base + index * scale + disp;
- base = !mode_64bit || info.fields.segment >= x86_seg_fs ?
- seg_base + offset : offset;
- if ( offset + size - 1 < offset ||
- (mode_64bit ?
- !is_canonical_address((long)base < 0 ? base :
- base + size - 1) :
- offset + size - 1 > seg.limit) )
- goto gp_fault;
+ decode->op[0].type = VMX_INST_MEMREG_TYPE_MEMORY;
+ decode->op[0].seg = info.fields.segment;
+ decode->op[0].offset = base + index * scale + disp;
+ if ( info.fields.addr_size < 2 )
+ decode->op[0].offset = (uint32_t)decode->op[0].offset;
- decode->op[0].mem = base;
decode->op[0].bytes = bytes;
}
@@ -517,10 +499,6 @@ static int decode_vmx_inst(struct cpu_user_regs *regs,
decode->op[1].bytes = bytes;
return X86EMUL_OKAY;
-
-gp_fault:
- hvm_inject_hw_exception(TRAP_gp_fault, 0);
- return X86EMUL_EXCEPTION;
}
static void vmsucceed(struct cpu_user_regs *regs)
@@ -1792,8 +1770,7 @@ int nvmx_handle_vmptrst(struct cpu_user_regs *regs)
struct vcpu *v = current;
struct vmx_inst_decoded decode;
struct nestedvcpu *nvcpu = &vcpu_nestedhvm(v);
- pagefault_info_t pfinfo;
- unsigned long gpa = 0;
+ uint64_t gpa;
int rc;
rc = decode_vmx_inst(regs, &decode, 0);
@@ -1802,12 +1779,10 @@ int nvmx_handle_vmptrst(struct cpu_user_regs *regs)
gpa = nvcpu->nv_vvmcxaddr;
- rc = hvm_copy_to_guest_linear(decode.op[0].mem, &gpa,
- decode.op[0].bytes, 0, &pfinfo);
- if ( rc == HVMTRANS_bad_linear_to_gfn )
- hvm_inject_page_fault(pfinfo.ec, pfinfo.linear);
- if ( rc != HVMTRANS_okay )
- return X86EMUL_EXCEPTION;
+ rc = hvm_copy_to_guest_virt(decode.op[0].seg, decode.op[0].offset,
+ &gpa, sizeof(gpa), 0);
+ if ( rc != X86EMUL_OKAY )
+ return rc;
vmsucceed(regs);
return X86EMUL_OKAY;
@@ -1873,8 +1848,7 @@ int nvmx_handle_vmread(struct cpu_user_regs *regs)
{
struct vcpu *v = current;
struct vmx_inst_decoded decode;
- pagefault_info_t pfinfo;
- u64 value = 0;
+ uint64_t value;
int rc;
unsigned long vmcs_encoding = 0;
@@ -1901,12 +1875,10 @@ int nvmx_handle_vmread(struct cpu_user_regs *regs)
switch ( decode.op[0].type ) {
case VMX_INST_MEMREG_TYPE_MEMORY:
- rc = hvm_copy_to_guest_linear(decode.op[0].mem, &value,
- decode.op[0].bytes, 0, &pfinfo);
- if ( rc == HVMTRANS_bad_linear_to_gfn )
- hvm_inject_page_fault(pfinfo.ec, pfinfo.linear);
- if ( rc != HVMTRANS_okay )
- return X86EMUL_EXCEPTION;
+ rc = hvm_copy_to_guest_virt(decode.op[0].seg, decode.op[0].offset,
+ &value, sizeof(value), 0);
+ if ( rc != X86EMUL_OKAY )
+ return rc;
break;
case VMX_INST_MEMREG_TYPE_REG:
reg_write(regs, decode.op[0].reg_idx, value);
--
2.13.6
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next prev parent reply other threads:[~2017-10-26 17:03 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-10-26 17:03 [PATCH 0/9] x86/vvmx: Read instruction operands correctly on VM exit Euan Harris
2017-10-26 17:03 ` [PATCH 1/9] x86/vvmx: Remove enum vmx_regs_enc Euan Harris
2017-10-26 17:03 ` [PATCH 2/9] x86/vvmx: Unify operands in struct vmx_inst_decoded Euan Harris
2017-10-26 17:03 ` [PATCH 3/9] x86/vvmx: Extract operand reading logic into operand_read() Euan Harris
2017-11-27 17:01 ` Jan Beulich
2017-11-27 18:08 ` Andrew Cooper
2017-11-28 8:40 ` Jan Beulich
2017-11-28 8:14 ` Jan Beulich
2017-10-26 17:03 ` [PATCH 4/9] x86/vvmx: Remove unnecessary VMX operand reads Euan Harris
2017-11-02 7:07 ` Tian, Kevin
2017-11-27 17:03 ` Jan Beulich
2017-10-26 17:03 ` [PATCH 5/9] x86/vvmx: Replace direct calls to reg_read() with operand_read() Euan Harris
2017-10-26 17:03 ` [PATCH 6/9] x86/vvmx: Remove operand reading from decode_vmx_inst() Euan Harris
2017-10-26 17:03 ` [PATCH 7/9] x86/vvmx: Use correct sizes when reading operands Euan Harris
2017-11-28 8:32 ` Jan Beulich
2017-12-01 18:45 ` Andrew Cooper
2017-12-04 8:55 ` Jan Beulich
2017-10-26 17:03 ` [PATCH 8/9] x86/hvm: Add hvm_copy_{to, from}_guest_virt() helpers Euan Harris
2017-11-28 8:38 ` Jan Beulich
2017-10-26 17:03 ` Euan Harris [this message]
2017-11-28 8:49 ` [PATCH 9/9] x86/vvmx: Use hvm_copy_{to, from}_guest_virt() to read operands Jan Beulich
2017-10-26 17:59 ` [PATCH 0/9] x86/vvmx: Read instruction operands correctly on VM exit Andrew Cooper
2017-11-02 7:23 ` Tian, Kevin
2017-11-02 18:39 ` Andrew Cooper
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1509037399-48926-10-git-send-email-euan.harris@citrix.com \
--to=euan.harris@citrix.com \
--cc=andrew.cooper3@citrix.com \
--cc=jbeulich@suse.com \
--cc=jun.nakajima@intel.com \
--cc=kevin.tian@intel.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).