]> xenbits.xensource.com Git - xen.git/commit
x86emul: only emulate software interrupt injection for real mode
authorJan Beulich <jbeulich@suse.com>
Tue, 23 Sep 2014 12:33:50 +0000 (14:33 +0200)
committerJan Beulich <jbeulich@suse.com>
Tue, 23 Sep 2014 12:33:50 +0000 (14:33 +0200)
commit346d4545569928b652c40c7815c1732676f8587c
treec61e0354f0d519dd2ab37e53811950241fa4fa7f
parent0e442727ceccfa32a7276cccd205b4722e68fdc1
x86emul: only emulate software interrupt injection for real mode

Protected mode emulation currently lacks proper privilege checking of
the referenced IDT entry, and there's currently no legitimate way for
any of the respective instructions to reach the emulator when the guest
is in protected mode.

This is XSA-106.

Reported-by: Andrei LUTAS <vlutas@bitdefender.com>
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
xen/arch/x86/x86_emulate/x86_emulate.c