[PATCH] kvm-unit-tests: Add test case for accessing bpl via modr/m

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Test access to %bpl via modr/m addressing mode. This case can test another bug in the boot of RHEL5.9 64-bit.

Signed-off-by: Arthur Chunqi Li <yzt356@xxxxxxxxx>
---
 x86/emulator.c |   41 +++++++++++++++++++++++++++++++++++++++++
 1 file changed, 41 insertions(+)

diff --git a/x86/emulator.c b/x86/emulator.c
index 96576e5..3563971 100644
--- a/x86/emulator.c
+++ b/x86/emulator.c
@@ -901,6 +901,45 @@ static void test_simplealu(u32 *mem)
     report("test", *mem == 0x8400);
 }
 
+static void test_bpl_modrm(uint64_t *mem, uint8_t *insn_page,
+                       uint8_t *alt_insn_page, void *insn_ram)
+{
+	ulong *cr3 = (ulong *)read_cr3();
+	uint16_t cx = 0;
+
+	// Pad with RET instructions
+	memset(insn_page, 0xc3, 4096);
+	memset(alt_insn_page, 0xc3, 4096);
+	// Place a trapping instruction in the page to trigger a VMEXIT
+	insn_page[0] = 0x66; // mov $0x4321, %cx
+	insn_page[1] = 0xb9;
+	insn_page[2] = 0x21;
+	insn_page[3] = 0x43;
+	insn_page[4] = 0x89; // mov %eax, (%rax)
+	insn_page[5] = 0x00;
+	insn_page[6] = 0x90; // nop
+	// Place mov %cl, %bpl in alt_insn_page for emulator to execuate
+	// If emulator mistaken addressing %bpl, %cl may be moved to %ch
+	// %cx will be broken to 0x2121, not 0x4321
+	alt_insn_page[4] = 0x40;
+	alt_insn_page[5] = 0x88;
+	alt_insn_page[6] = 0xcd;
+
+	// Load the code TLB with insn_page, but point the page tables at
+	// alt_insn_page (and keep the data TLB clear, for AMD decode assist).
+	// This will make the CPU trap on the insn_page instruction but the
+	// hypervisor will see alt_insn_page.
+	install_page(cr3, virt_to_phys(insn_page), insn_ram);
+	// Load code TLB
+	invlpg(insn_ram);
+	asm volatile("call *%0" : : "r"(insn_ram+3));
+	// Trap, let hypervisor emulate at alt_insn_page
+	install_page(cr3, virt_to_phys(alt_insn_page), insn_ram);
+	asm volatile("call *%0" : : "r"(insn_ram), "a"(mem));
+	asm volatile("":"=c"(cx));
+	report("access bpl in modr/m", cx == 0x4321);
+}
+
 int main()
 {
 	void *mem;
@@ -964,6 +1003,8 @@ int main()
 
 	test_string_io_mmio(mem);
 
+	test_bpl_modrm(mem, insn_page, alt_insn_page, insn_ram);
+
 	printf("\nSUMMARY: %d tests, %d failures\n", tests, fails);
 	return fails ? 1 : 0;
 }
-- 
1.7.9.5

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux