aboutsummaryrefslogtreecommitdiffstats
path: root/executor
diff options
context:
space:
mode:
authorAlexander Potapenko <glider@google.com>2026-01-14 12:01:10 +0100
committerAlexander Potapenko <glider@google.com>2026-01-15 07:19:29 +0000
commit3b7a3359989abfb9ee0c821fdc0a8be33f7e996d (patch)
treeeaaee157ddc8909a12b5c30edef7155913b615bb /executor
parent0a1338c68f19bbea13b3ae7ce61a185b6a5f65ef (diff)
executor: sys/linux: SYZOS: add support for AMD Nested Event Injection
Implement SYZOS_API_NESTED_AMD_INJECT_EVENT to allow the L1 guest to inject events (Interrupts, NMIs, Exceptions) into L2 via the VMCB EVENTINJ field. This primitive abstracts the VMCB bit-packing logic (Vector, Type, Valid, Error Code) into a high-level API, enabling the fuzzer to semantically mutate event injection parameters. This targets KVM's nested event merging logic, specifically where L0 must reconcile L1-injected events with Host-pending events.
Diffstat (limited to 'executor')
-rw-r--r--executor/common_kvm_amd64_syzos.h33
1 files changed, 33 insertions, 0 deletions
diff --git a/executor/common_kvm_amd64_syzos.h b/executor/common_kvm_amd64_syzos.h
index 002308c3c..846569af5 100644
--- a/executor/common_kvm_amd64_syzos.h
+++ b/executor/common_kvm_amd64_syzos.h
@@ -36,6 +36,7 @@ typedef enum {
SYZOS_API_NESTED_AMD_INVLPGA = 381,
SYZOS_API_NESTED_AMD_STGI = 382,
SYZOS_API_NESTED_AMD_CLGI = 383,
+ SYZOS_API_NESTED_AMD_INJECT_EVENT = 384,
SYZOS_API_STOP, // Must be the last one
} syzos_api_id;
@@ -119,6 +120,7 @@ GUEST_CODE static void guest_handle_nested_amd_vmcb_write_mask(struct api_call_5
GUEST_CODE static void guest_handle_nested_amd_invlpga(struct api_call_2* cmd, uint64 cpu_id);
GUEST_CODE static void guest_handle_nested_amd_stgi();
GUEST_CODE static void guest_handle_nested_amd_clgi();
+GUEST_CODE static void guest_handle_nested_amd_inject_event(struct api_call_5* cmd, uint64 cpu_id);
typedef enum {
UEXIT_END = (uint64)-1,
@@ -243,6 +245,9 @@ guest_main(uint64 size, uint64 cpu)
} else if (call == SYZOS_API_NESTED_AMD_CLGI) {
// Clear Global Interrupt Flag (Disable Interrupts, including NMI).
guest_handle_nested_amd_clgi();
+ } else if (call == SYZOS_API_NESTED_AMD_INJECT_EVENT) {
+ // Inject an event (IRQ/Exception) into the L2 guest via VMCB.
+ guest_handle_nested_amd_inject_event((struct api_call_5*)cmd, cpu);
}
addr += cmd->size;
size -= cmd->size;
@@ -1326,4 +1331,32 @@ guest_handle_nested_amd_clgi()
asm volatile("clgi" ::: "memory");
}
+GUEST_CODE static noinline void
+guest_handle_nested_amd_inject_event(struct api_call_5* cmd, uint64 cpu_id)
+{
+ if (get_cpu_vendor() != CPU_VENDOR_AMD)
+ return;
+
+ uint64 vm_id = cmd->args[0];
+ uint64 vmcb_addr = X86_SYZOS_ADDR_VMCS_VMCB(cpu_id, vm_id);
+
+ uint64 vector = cmd->args[1] & 0xFF;
+ uint64 type = cmd->args[2] & 0x7;
+ uint64 error_code = cmd->args[3] & 0xFFFFFFFF;
+ uint64 flags = cmd->args[4];
+
+ // Flags bit 0: Valid (V)
+ // Flags bit 1: Error Code Valid (EV)
+ uint64 event_inj = vector;
+ event_inj |= (type << 8);
+ if (flags & 2)
+ event_inj |= (1ULL << 11); // EV bit
+ if (flags & 1)
+ event_inj |= (1ULL << 31); // V bit
+ event_inj |= (error_code << 32);
+
+ // Write to VMCB Offset 0x60 (EVENTINJ)
+ vmcb_write64(vmcb_addr, 0x60, event_inj);
+}
+
#endif // EXECUTOR_COMMON_KVM_AMD64_SYZOS_H