diff mbox series

[2/2] x86emul: ignore VEX.W for BMI{1,2} insns in 32-bit mode

Message ID 39de64e1-c615-4ec3-ad05-ff99f27a8e30@suse.com (mailing list archive)
State New
Headers show
Series x86emul: BMI{1,2} corrections | expand

Commit Message

Jan Beulich Nov. 12, 2024, 3 p.m. UTC
While result values and other status flags are unaffected as long as we
can ignore the case of registers having their upper 32 bits non-zero
outside of 64-bit mode, EFLAGS.SF may obtain a wrong value when we
mistakenly re-execute the original insn with VEX.W set.

Note that the memory access, if any, is correctly carried out as 32-bit
regardless of VEX.W. Internal state also isn't leaked, as the field the
memory value is read into (which is then wrongly accessed as a 64-bit
quantity when executing the stub) is pre-initialized to zero.

Fixes: 771daacd197a ("x86emul: support BMI1 insns")
Signed-off-by: Jan Beulich <jbeulich@suse.com>

Comments

Andrew Cooper Nov. 13, 2024, 12:24 a.m. UTC | #1
On 12/11/2024 3:00 pm, Jan Beulich wrote:
> While result values and other status flags are unaffected as long as we
> can ignore the case of registers having their upper 32 bits non-zero
> outside of 64-bit mode, EFLAGS.SF may obtain a wrong value when we
> mistakenly re-execute the original insn with VEX.W set.
>
> Note that the memory access, if any, is correctly carried out as 32-bit
> regardless of VEX.W.

I don't understand why this is true.

If we write out a VEX.W=1 form of BEXTR/etc and emulate while in 64bit
mode, it will have an operand size of 64.

I can believe that ...

>  Internal state also isn't leaked, as the field the
> memory value is read into (which is then wrongly accessed as a 64-bit
> quantity when executing the stub) is pre-initialized to zero.

... everything else treats the memory operand as 32bit, and uses the
bottom half of the internal buffer, and generally does the right thing.

~Andrew
Jan Beulich Nov. 13, 2024, 8:01 a.m. UTC | #2
On 13.11.2024 01:24, Andrew Cooper wrote:
> On 12/11/2024 3:00 pm, Jan Beulich wrote:
>> While result values and other status flags are unaffected as long as we
>> can ignore the case of registers having their upper 32 bits non-zero
>> outside of 64-bit mode, EFLAGS.SF may obtain a wrong value when we
>> mistakenly re-execute the original insn with VEX.W set.
>>
>> Note that the memory access, if any, is correctly carried out as 32-bit
>> regardless of VEX.W.
> 
> I don't understand why this is true.

This talks about the access to guest memory, which is op_bytes based.
And op_bytes determination handles VEX.W correctly afaics. I've added
"guest" near the start of the sentence for clarification.

> If we write out a VEX.W=1 form of BEXTR/etc and emulate while in 64bit
> mode, it will have an operand size of 64.
> 
> I can believe that ...
> 
>>  Internal state also isn't leaked, as the field the
>> memory value is read into (which is then wrongly accessed as a 64-bit
>> quantity when executing the stub) is pre-initialized to zero.
> 
> ... everything else treats the memory operand as 32bit, and uses the
> bottom half of the internal buffer, and generally does the right thing.

No, if I'm getting right what you say it was the other way around:
Right now we
- read guest memory (ahead of the big switch()); that's always a 32-bit
  access for VEX-encoded GPR insns in 32-bit code (the value is read
  into an internal field which is pre-set to zero, i.e. when used as a
  64-bit quantity, it's effectively the zero-extended value that was
  read from guest memory),
- emit a VEX-encoded insn into the stub with VEX.W set,
- execute that insn, resulting in a 64-bit memory access to the internal
  field, where as per above the upper half is zero.
It's only this way that it can be explained why the new testcase added
would previously have failed (wrongly set EFLAGS.SF).

Jan
Andrew Cooper Nov. 13, 2024, 1:31 p.m. UTC | #3
On 13/11/2024 8:01 am, Jan Beulich wrote:
> On 13.11.2024 01:24, Andrew Cooper wrote:
>> On 12/11/2024 3:00 pm, Jan Beulich wrote:
>>> While result values and other status flags are unaffected as long as we
>>> can ignore the case of registers having their upper 32 bits non-zero
>>> outside of 64-bit mode, EFLAGS.SF may obtain a wrong value when we
>>> mistakenly re-execute the original insn with VEX.W set.
>>>
>>> Note that the memory access, if any, is correctly carried out as 32-bit
>>> regardless of VEX.W.
>> I don't understand why this is true.
> This talks about the access to guest memory, which is op_bytes based.
> And op_bytes determination handles VEX.W correctly afaics. I've added
> "guest" near the start of the sentence for clarification.

Ah - that makes things much clearer.

I had neglected to consider the access to guest memory.

In addition to a "guest" earlier, I'd suggest having a new paragraph at
this point, and ...

>
>> If we write out a VEX.W=1 form of BEXTR/etc and emulate while in 64bit
>> mode, it will have an operand size of 64.
>>
>> I can believe that ...
>>
>>>  Internal state also isn't leaked, as the field the
>>> memory value is read into (which is then wrongly accessed as a 64-bit
>>> quantity when executing the stub) is pre-initialized to zero.

... this reading:

"The emulator-local memory operand will be accessed as a 64-bit
quantity, but it is pre-initialised to zero so no internal state an leak"

or similar.

~Andrew
Andrew Cooper Nov. 13, 2024, 1:32 p.m. UTC | #4
On 13/11/2024 1:31 pm, Andrew Cooper wrote:
> On 13/11/2024 8:01 am, Jan Beulich wrote:
>> On 13.11.2024 01:24, Andrew Cooper wrote:
>>> On 12/11/2024 3:00 pm, Jan Beulich wrote:
>>>> While result values and other status flags are unaffected as long as we
>>>> can ignore the case of registers having their upper 32 bits non-zero
>>>> outside of 64-bit mode, EFLAGS.SF may obtain a wrong value when we
>>>> mistakenly re-execute the original insn with VEX.W set.
>>>>
>>>> Note that the memory access, if any, is correctly carried out as 32-bit
>>>> regardless of VEX.W.
>>> I don't understand why this is true.
>> This talks about the access to guest memory, which is op_bytes based.
>> And op_bytes determination handles VEX.W correctly afaics. I've added
>> "guest" near the start of the sentence for clarification.
> Ah - that makes things much clearer.
>
> I had neglected to consider the access to guest memory.
>
> In addition to a "guest" earlier, I'd suggest having a new paragraph at
> this point, and ...
>
>>> If we write out a VEX.W=1 form of BEXTR/etc and emulate while in 64bit
>>> mode, it will have an operand size of 64.
>>>
>>> I can believe that ...
>>>
>>>>  Internal state also isn't leaked, as the field the
>>>> memory value is read into (which is then wrongly accessed as a 64-bit
>>>> quantity when executing the stub) is pre-initialized to zero.
> ... this reading:
>
> "The emulator-local memory operand will be accessed as a 64-bit
> quantity, but it is pre-initialised to zero so no internal state an leak"
>
> or similar.

Oh, and Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>

~Andrew
Jan Beulich Nov. 14, 2024, 9:39 a.m. UTC | #5
On 13.11.2024 14:32, Andrew Cooper wrote:
> On 13/11/2024 1:31 pm, Andrew Cooper wrote:
>> On 13/11/2024 8:01 am, Jan Beulich wrote:
>>> On 13.11.2024 01:24, Andrew Cooper wrote:
>>>> On 12/11/2024 3:00 pm, Jan Beulich wrote:
>>>>> While result values and other status flags are unaffected as long as we
>>>>> can ignore the case of registers having their upper 32 bits non-zero
>>>>> outside of 64-bit mode, EFLAGS.SF may obtain a wrong value when we
>>>>> mistakenly re-execute the original insn with VEX.W set.
>>>>>
>>>>> Note that the memory access, if any, is correctly carried out as 32-bit
>>>>> regardless of VEX.W.
>>>> I don't understand why this is true.
>>> This talks about the access to guest memory, which is op_bytes based.
>>> And op_bytes determination handles VEX.W correctly afaics. I've added
>>> "guest" near the start of the sentence for clarification.
>> Ah - that makes things much clearer.
>>
>> I had neglected to consider the access to guest memory.
>>
>> In addition to a "guest" earlier, I'd suggest having a new paragraph at
>> this point, and ...
>>
>>>> If we write out a VEX.W=1 form of BEXTR/etc and emulate while in 64bit
>>>> mode, it will have an operand size of 64.
>>>>
>>>> I can believe that ...
>>>>
>>>>>  Internal state also isn't leaked, as the field the
>>>>> memory value is read into (which is then wrongly accessed as a 64-bit
>>>>> quantity when executing the stub) is pre-initialized to zero.
>> ... this reading:
>>
>> "The emulator-local memory operand will be accessed as a 64-bit
>> quantity, but it is pre-initialised to zero so no internal state an leak"
>>
>> or similar.

That's to _replace_ the "Internal state ..." sentence then, rather than an
added separate sentence / paragraph? It says exactly the same, after all.

> Oh, and Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>

Thanks, but I'll wait some for clarification above.

Jan
Andrew Cooper Nov. 14, 2024, 11:45 a.m. UTC | #6
On 14/11/2024 9:39 am, Jan Beulich wrote:
> On 13.11.2024 14:32, Andrew Cooper wrote:
>> On 13/11/2024 1:31 pm, Andrew Cooper wrote:
>>> On 13/11/2024 8:01 am, Jan Beulich wrote:
>>>> On 13.11.2024 01:24, Andrew Cooper wrote:
>>>>> On 12/11/2024 3:00 pm, Jan Beulich wrote:
>>>>>> While result values and other status flags are unaffected as long as we
>>>>>> can ignore the case of registers having their upper 32 bits non-zero
>>>>>> outside of 64-bit mode, EFLAGS.SF may obtain a wrong value when we
>>>>>> mistakenly re-execute the original insn with VEX.W set.
>>>>>>
>>>>>> Note that the memory access, if any, is correctly carried out as 32-bit
>>>>>> regardless of VEX.W.
>>>>> I don't understand why this is true.
>>>> This talks about the access to guest memory, which is op_bytes based.
>>>> And op_bytes determination handles VEX.W correctly afaics. I've added
>>>> "guest" near the start of the sentence for clarification.
>>> Ah - that makes things much clearer.
>>>
>>> I had neglected to consider the access to guest memory.
>>>
>>> In addition to a "guest" earlier, I'd suggest having a new paragraph at
>>> this point, and ...
>>>
>>>>> If we write out a VEX.W=1 form of BEXTR/etc and emulate while in 64bit
>>>>> mode, it will have an operand size of 64.
>>>>>
>>>>> I can believe that ...
>>>>>
>>>>>>  Internal state also isn't leaked, as the field the
>>>>>> memory value is read into (which is then wrongly accessed as a 64-bit
>>>>>> quantity when executing the stub) is pre-initialized to zero.
>>> ... this reading:
>>>
>>> "The emulator-local memory operand will be accessed as a 64-bit
>>> quantity, but it is pre-initialised to zero so no internal state an leak"
>>>
>>> or similar.
> That's to _replace_ the "Internal state ..." sentence then, rather than an
> added separate sentence / paragraph? It says exactly the same, after all.

Ideally, yes.  I think it's clearer this way around.

~Andrew
diff mbox series

Patch

--- a/tools/tests/x86_emulator/test_x86_emulator.c
+++ b/tools/tests/x86_emulator/test_x86_emulator.c
@@ -2021,6 +2021,30 @@  int main(int argc, char **argv)
               (EFLAGS_ALWAYS_SET | X86_EFLAGS_SF) ||
              !check_eip(blsr) )
             goto fail;
+
+#ifdef __x86_64__
+        /* Re-test with VEX.W set while emulating 32-bit mode. */
+        ctxt.lma       = 0;
+        ctxt.addr_size = 32;
+        ctxt.sp_size   = 32;
+
+        memcpy(instr, blsr, blsr_end - blsr);
+        instr[2] |= 0x80;
+        regs.rip = (unsigned long)&instr[0];
+        regs.eflags = EFLAGS_ALWAYS_SET | X86_EFLAGS_OF | X86_EFLAGS_ZF | \
+                      X86_EFLAGS_CF;
+        rc = x86_emulate(&ctxt, &emulops);
+        if ( (rc != X86EMUL_OKAY) || regs.ecx != 0xfedcba90 ||
+             (regs.eflags & (EFLAGS_MASK & ~(X86_EFLAGS_AF | X86_EFLAGS_PF))) !=
+              (EFLAGS_ALWAYS_SET | X86_EFLAGS_SF) ||
+             (regs.rip != (unsigned long)&instr[blsr_end - blsr]) )
+            goto fail;
+
+        ctxt.lma       = 1;
+        ctxt.addr_size = 64;
+        ctxt.sp_size   = 64;
+#endif
+
         printf("okay\n");
     }
     else
--- a/xen/arch/x86/x86_emulate/x86_emulate.c
+++ b/xen/arch/x86/x86_emulate/x86_emulate.c
@@ -6896,6 +6896,8 @@  x86_emulate(
         *pvex = vex;
         pvex->b = 1;
         pvex->r = 1;
+        if ( !mode_64bit() )
+            pvex->w = 0;
         pvex->reg = 0xf; /* rAX */
         buf[3] = b;
         buf[4] = 0x09; /* reg=rCX r/m=(%rCX) */
@@ -6930,6 +6932,8 @@  x86_emulate(
         *pvex = vex;
         pvex->b = 1;
         pvex->r = 1;
+        if ( !mode_64bit() )
+            pvex->w = 0;
         pvex->reg = 0xf; /* rAX */
         buf[3] = b;
         buf[4] = (modrm & 0x38) | 0x01; /* r/m=(%rCX) */