]> xenbits.xensource.com Git - xen.git/commitdiff
x86/HVM: fail virt-to-linear conversion for insn fetches from non-code segments
authorJan Beulich <jbeulich@suse.com>
Fri, 7 Jan 2022 07:51:51 +0000 (08:51 +0100)
committerJan Beulich <jbeulich@suse.com>
Fri, 7 Jan 2022 07:51:51 +0000 (08:51 +0100)
Just like (in protected mode) reads may not go to exec-only segments and
writes may not go to non-writable ones, insn fetches may not access data
segments.

Fixes: 623e83716791 ("hvm: Support hardware task switching")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
master commit: 311297f4216a4387bdae6df6cfbb1f5edb06618a
master date: 2021-12-06 14:15:05 +0100

xen/arch/x86/hvm/hvm.c

index 5b7e494ca3ec1c5499dac289b1e778c9a232f107..89926a5bf60c155e8310dd180328ee41aa350eed 100644 (file)
@@ -2530,6 +2530,9 @@ bool_t hvm_virtual_to_linear_addr(
      */
     ASSERT(seg < x86_seg_none);
 
+    /* However, check that insn fetches only ever specify CS. */
+    ASSERT(access_type != hvm_access_insn_fetch || seg == x86_seg_cs);
+
     if ( !(curr->arch.hvm.guest_cr[0] & X86_CR0_PE) )
     {
         /*
@@ -2594,10 +2597,17 @@ bool_t hvm_virtual_to_linear_addr(
                 if ( (reg->type & 0xa) == 0x8 )
                     goto out; /* execute-only code segment */
                 break;
+
             case hvm_access_write:
                 if ( (reg->type & 0xa) != 0x2 )
                     goto out; /* not a writable data segment */
                 break;
+
+            case hvm_access_insn_fetch:
+                if ( !(reg->type & 0x8) )
+                    goto out; /* not a code segment */
+                break;
+
             default:
                 break;
             }