Rusty Russell
2007-Apr-30 06:05 UTC
[PATCH] lguest: properly kill guest userspace programs accessing kernel mem
Kernel pages on x86 are protected by not having the _PAGE_USER bit set. When guest userspace accesses a kernel page, we didn't check this, so we'd think we'd handled the fault and return to the guest, causing the guest userspace program to loop instead of segfaulting. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au> --- drivers/lguest/core.c | 2 +- drivers/lguest/lg.h | 2 +- drivers/lguest/page_tables.c | 12 ++++++++---- 3 files changed, 10 insertions(+), 6 deletions(-) ==================================================================--- a/drivers/lguest/core.c +++ b/drivers/lguest/core.c @@ -346,7 +346,7 @@ int run_guest(struct lguest *lg, char *_ } break; case 14: /* We've intercepted a page fault. */ - if (demand_page(lg, cr2, lg->regs->errcode & 2)) + if (demand_page(lg, cr2, lg->regs->errcode)) continue; /* If lguest_data is NULL, this won't hurt. */ ==================================================================--- a/drivers/lguest/lg.h +++ b/drivers/lguest/lg.h @@ -216,7 +216,7 @@ void guest_set_pte(struct lguest *lg, un void guest_set_pte(struct lguest *lg, unsigned long cr3, unsigned long vaddr, gpte_t val); void map_switcher_in_guest(struct lguest *lg, struct lguest_pages *pages); -int demand_page(struct lguest *info, unsigned long cr2, int write); +int demand_page(struct lguest *info, unsigned long cr2, int errcode); void pin_page(struct lguest *lg, unsigned long vaddr); /* lguest_user.c: */ ==================================================================--- a/drivers/lguest/page_tables.c +++ b/drivers/lguest/page_tables.c @@ -109,7 +109,7 @@ static void check_gpgd(struct lguest *lg /* We fault pages in, which allows us to update accessed/dirty bits. * Return true if we got page. */ -int demand_page(struct lguest *lg, unsigned long vaddr, int write) +int demand_page(struct lguest *lg, unsigned long vaddr, int errcode) { gpgd_t gpgd; spgd_t *spgd; @@ -138,12 +140,16 @@ int demand_page(struct lguest *lg, unsig return 0; /* Write to read-only page? */ - if (write && !(gpte.flags & _PAGE_RW)) + if ((errcode & 2) && !(gpte.flags & _PAGE_RW)) return 0; + + /* User access to a non-user page? */ + if ((errcode & 4) && !(gpte.flags & _PAGE_USER)) + return 0; check_gpte(lg, gpte); gpte.flags |= _PAGE_ACCESSED; - if (write) + if (errcode & 2) gpte.flags |= _PAGE_DIRTY; /* We're done with the old pte. */ @@ -185,7 +200,7 @@ static int page_writable(struct lguest * void pin_page(struct lguest *lg, unsigned long vaddr) { - if (!page_writable(lg, vaddr) && !demand_page(lg, vaddr, 0)) + if (!page_writable(lg, vaddr) && !demand_page(lg, vaddr, 2)) kill_guest(lg, "bad stack page %#lx", vaddr); }
Possibly Parallel Threads
- [PATCH] lguest: properly kill guest userspace programs accessing kernel mem
- [patch 3/9] lguest: the host code
- [patch 3/9] lguest: the host code
- [PATCH] Lguest32, use guest page tables to find paddr for emulated instructions
- [PATCH] Lguest32, use guest page tables to find paddr for emulated instructions