]> xenbits.xensource.com Git - xen.git/commitdiff
x86/emulate: check cpl for all privileged instructions
authorAndrew Cooper <andrew.cooper3@citrix.com>
Tue, 23 Sep 2014 12:50:39 +0000 (14:50 +0200)
committerJan Beulich <jbeulich@suse.com>
Tue, 23 Sep 2014 12:50:39 +0000 (14:50 +0200)
Without this, it is possible for userspace to load its own IDT or GDT.

This is XSA-105.

Reported-by: Andrei LUTAS <vlutas@bitdefender.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Tested-by: Andrei LUTAS <vlutas@bitdefender.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
master commit: 0e442727ceccfa32a7276cccd205b4722e68fdc1
master date: 2014-09-23 14:33:06 +0200

xen/arch/x86/x86_emulate/x86_emulate.c

index b0363de550af668a0434ab4bc19752cdf9a88cfb..1d2eb03dbac622a7bf0633be3cab12cb2ce8948f 100644 (file)
@@ -3296,6 +3296,7 @@ x86_emulate(
         goto swint;
 
     case 0xf4: /* hlt */
+        generate_exception_if(!mode_ring0(), EXC_GP, 0);
         ctxt->retire.flags.hlt = 1;
         break;
 
@@ -3721,6 +3722,7 @@ x86_emulate(
             break;
         case 2: /* lgdt */
         case 3: /* lidt */
+            generate_exception_if(!mode_ring0(), EXC_GP, 0);
             generate_exception_if(ea.type != OP_MEM, EXC_UD, -1);
             fail_if(ops->write_segment == NULL);
             memset(&reg, 0, sizeof(reg));
@@ -3749,6 +3751,7 @@ x86_emulate(
         case 6: /* lmsw */
             fail_if(ops->read_cr == NULL);
             fail_if(ops->write_cr == NULL);
+            generate_exception_if(!mode_ring0(), EXC_GP, 0);
             if ( (rc = ops->read_cr(0, &cr0, ctxt)) )
                 goto done;
             if ( ea.type == OP_REG )