lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <202005070511.pZlxKRhh%lkp@intel.com>
Date:   Thu, 7 May 2020 06:01:21 +0800
From:   kbuild test robot <lkp@...el.com>
To:     Paolo Bonzini <pbonzini@...hat.com>, linux-kernel@...r.kernel.org,
        kvm@...r.kernel.org
Cc:     kbuild-all@...ts.01.org
Subject: Re: [PATCH v3] KVM: x86: fix DR6 delivery for various cases of #DB
 injection

Hi Paolo,

I love your patch! Yet something to improve:

[auto build test ERROR on tip/auto-latest]
[also build test ERROR on linus/master v5.7-rc4 next-20200505]
[cannot apply to kvm/linux-next linux/master]
[if your patch is applied to the wrong git tree, please drop us a note to help
improve the system. BTW, we also suggest to use '--base' option to specify the
base tree in git format-patch, please see https://stackoverflow.com/a/37406982]

url:    https://github.com/0day-ci/linux/commits/Paolo-Bonzini/KVM-x86-fix-DR6-delivery-for-various-cases-of-DB-injection/20200507-022910
base:   https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git 5545b0d34f37831e20cb401ae8160284d20bba30
config: i386-allyesconfig (attached as .config)
compiler: gcc-7 (Ubuntu 7.5.0-6ubuntu2) 7.5.0
reproduce:
        # save the attached .config to linux build tree
        make ARCH=i386 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kbuild test robot <lkp@...el.com>

All errors (new ones prefixed by >>):

   arch/x86/kvm/vmx/vmx.c: In function 'handle_exception_nmi':
>> arch/x86/kvm/vmx/vmx.c:4683:4: error: implicit declaration of function 'kvm_queue_exception_p'; did you mean 'kvm_queue_exception_e'? [-Werror=implicit-function-declaration]
       kvm_queue_exception_p(vcpu, DB_VECTOR, dr6);
       ^~~~~~~~~~~~~~~~~~~~~
       kvm_queue_exception_e
   cc1: some warnings being treated as errors

vim +4683 arch/x86/kvm/vmx/vmx.c

  4610	
  4611	static int handle_exception_nmi(struct kvm_vcpu *vcpu)
  4612	{
  4613		struct vcpu_vmx *vmx = to_vmx(vcpu);
  4614		struct kvm_run *kvm_run = vcpu->run;
  4615		u32 intr_info, ex_no, error_code;
  4616		unsigned long cr2, rip, dr6;
  4617		u32 vect_info;
  4618	
  4619		vect_info = vmx->idt_vectoring_info;
  4620		intr_info = vmx->exit_intr_info;
  4621	
  4622		if (is_machine_check(intr_info) || is_nmi(intr_info))
  4623			return 1; /* handled by handle_exception_nmi_irqoff() */
  4624	
  4625		if (is_invalid_opcode(intr_info))
  4626			return handle_ud(vcpu);
  4627	
  4628		error_code = 0;
  4629		if (intr_info & INTR_INFO_DELIVER_CODE_MASK)
  4630			error_code = vmcs_read32(VM_EXIT_INTR_ERROR_CODE);
  4631	
  4632		if (!vmx->rmode.vm86_active && is_gp_fault(intr_info)) {
  4633			WARN_ON_ONCE(!enable_vmware_backdoor);
  4634	
  4635			/*
  4636			 * VMware backdoor emulation on #GP interception only handles
  4637			 * IN{S}, OUT{S}, and RDPMC, none of which generate a non-zero
  4638			 * error code on #GP.
  4639			 */
  4640			if (error_code) {
  4641				kvm_queue_exception_e(vcpu, GP_VECTOR, error_code);
  4642				return 1;
  4643			}
  4644			return kvm_emulate_instruction(vcpu, EMULTYPE_VMWARE_GP);
  4645		}
  4646	
  4647		/*
  4648		 * The #PF with PFEC.RSVD = 1 indicates the guest is accessing
  4649		 * MMIO, it is better to report an internal error.
  4650		 * See the comments in vmx_handle_exit.
  4651		 */
  4652		if ((vect_info & VECTORING_INFO_VALID_MASK) &&
  4653		    !(is_page_fault(intr_info) && !(error_code & PFERR_RSVD_MASK))) {
  4654			vcpu->run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
  4655			vcpu->run->internal.suberror = KVM_INTERNAL_ERROR_SIMUL_EX;
  4656			vcpu->run->internal.ndata = 3;
  4657			vcpu->run->internal.data[0] = vect_info;
  4658			vcpu->run->internal.data[1] = intr_info;
  4659			vcpu->run->internal.data[2] = error_code;
  4660			return 0;
  4661		}
  4662	
  4663		if (is_page_fault(intr_info)) {
  4664			cr2 = vmcs_readl(EXIT_QUALIFICATION);
  4665			/* EPT won't cause page fault directly */
  4666			WARN_ON_ONCE(!vcpu->arch.apf.host_apf_reason && enable_ept);
  4667			return kvm_handle_page_fault(vcpu, error_code, cr2, NULL, 0);
  4668		}
  4669	
  4670		ex_no = intr_info & INTR_INFO_VECTOR_MASK;
  4671	
  4672		if (vmx->rmode.vm86_active && rmode_exception(vcpu, ex_no))
  4673			return handle_rmode_exception(vcpu, ex_no, error_code);
  4674	
  4675		switch (ex_no) {
  4676		case DB_VECTOR:
  4677			dr6 = vmcs_readl(EXIT_QUALIFICATION);
  4678			if (!(vcpu->guest_debug &
  4679			      (KVM_GUESTDBG_SINGLESTEP | KVM_GUESTDBG_USE_HW_BP))) {
  4680				if (is_icebp(intr_info))
  4681					WARN_ON(!skip_emulated_instruction(vcpu));
  4682	
> 4683				kvm_queue_exception_p(vcpu, DB_VECTOR, dr6);
  4684				return 1;
  4685			}
  4686			kvm_run->debug.arch.dr6 = dr6 | DR6_FIXED_1;
  4687			kvm_run->debug.arch.dr7 = vmcs_readl(GUEST_DR7);
  4688			/* fall through */
  4689		case BP_VECTOR:
  4690			/*
  4691			 * Update instruction length as we may reinject #BP from
  4692			 * user space while in guest debugging mode. Reading it for
  4693			 * #DB as well causes no harm, it is not used in that case.
  4694			 */
  4695			vmx->vcpu.arch.event_exit_inst_len =
  4696				vmcs_read32(VM_EXIT_INSTRUCTION_LEN);
  4697			kvm_run->exit_reason = KVM_EXIT_DEBUG;
  4698			rip = kvm_rip_read(vcpu);
  4699			kvm_run->debug.arch.pc = vmcs_readl(GUEST_CS_BASE) + rip;
  4700			kvm_run->debug.arch.exception = ex_no;
  4701			break;
  4702		case AC_VECTOR:
  4703			if (guest_inject_ac(vcpu)) {
  4704				kvm_queue_exception_e(vcpu, AC_VECTOR, error_code);
  4705				return 1;
  4706			}
  4707	
  4708			/*
  4709			 * Handle split lock. Depending on detection mode this will
  4710			 * either warn and disable split lock detection for this
  4711			 * task or force SIGBUS on it.
  4712			 */
  4713			if (handle_guest_split_lock(kvm_rip_read(vcpu)))
  4714				return 1;
  4715			fallthrough;
  4716		default:
  4717			kvm_run->exit_reason = KVM_EXIT_EXCEPTION;
  4718			kvm_run->ex.exception = ex_no;
  4719			kvm_run->ex.error_code = error_code;
  4720			break;
  4721		}
  4722		return 0;
  4723	}
  4724	

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Download attachment ".config.gz" of type "application/gzip" (72239 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ