Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1627413pxb; Wed, 9 Feb 2022 00:30:29 -0800 (PST) X-Google-Smtp-Source: ABdhPJzbpkqk5Zb2dTsCsdAV6sz/cGPy3S2BW0OF8JfOHE+8TdvT83UXAPYaBkIstmISbmp7yPhH X-Received: by 2002:a17:90a:1988:: with SMTP id 8mr704034pji.33.1644395428826; Wed, 09 Feb 2022 00:30:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644395428; cv=none; d=google.com; s=arc-20160816; b=lU4rVTwtbqQoG4CSHUTjlQb0P15XvWk2tBjnxCIFAwZ6nVIeoaO5DYxthD/6pyKOdM ny+UknkkZ1YvhoBjgTKwUzAHvMYs+BGKiOjjkxth1iLyhncj9lVq+KtAYBb7TJ0NZJlF Yi3p8tADOPiICoJkEFLBQ+zonIRLi0u7sqT8OaOk9eXfr9g3WVvIwFMEbNJb6uMPWh/U +tY+GCwjLBdJWf+e72luQ0nSYh1V7Sd3A3YmQ/YljwKWskuPHGG3mv0/XLGhHH4Om1gP TUYV9iCjTochA5K02zxtaY6lVa3aJkUEHyRKjSY7Rx81zr1e6r2T7QKVV5+hOxyE6FAO IzvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=w9rcd9FcY1R8SZkazelrJb2TsQkfRvgBYAH9fsbRgrg=; b=kNyA3aYLDEbhc5GzP8lRlnBcINKbbabSW4mNguEGGfMO4+abq0Wn+vWGRBvSx0Xk0R qMyCiFRL6N0aAy1RuAxxQ7gwhU2S/viNqALFoEIm0lxm5KfkJxeVq4lYjvjB6nnJBO4j q9mIaJYXpMNrJ6TbPZXC7P+3Oqukq9E37nsawnzFSxY/m8wrRDqSIv7NdGhX/nkMwX1/ z6T2RMbxjEfg2Xix8eaf4QOQdXeNLV52puxt1UWBxO6TDqmARmtoPUn4JjVtPmEP7hzc 8KZGn9P8q32ysqVlExDvTMCLhwhOPIx4R9uDN9RCDu7DsgG0U31fdx+n6WjkZpHISyEy mJbA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=antgroup.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 198si15747707pgc.799.2022.02.09.00.30.15; Wed, 09 Feb 2022 00:30:28 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=antgroup.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1355379AbiBHJeR (ORCPT + 99 others); Tue, 8 Feb 2022 04:34:17 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41890 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1355334AbiBHJeO (ORCPT ); Tue, 8 Feb 2022 04:34:14 -0500 Received: from out0-144.mail.aliyun.com (out0-144.mail.aliyun.com [140.205.0.144]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7CD32C03FEC9; Tue, 8 Feb 2022 01:34:13 -0800 (PST) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R111e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018047206;MF=houwenlong.hwl@antgroup.com;NM=1;PH=DS;RN=14;SR=0;TI=SMTPD_---.Mn034LU_1644312848; Received: from localhost(mailfrom:houwenlong.hwl@antgroup.com fp:SMTPD_---.Mn034LU_1644312848) by smtp.aliyun-inc.com(127.0.0.1); Tue, 08 Feb 2022 17:34:08 +0800 From: "Hou Wenlong" To: kvm@vger.kernel.org Cc: Sean Christopherson , Paolo Bonzini , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , linux-kernel@vger.kernel.org Subject: [PATCH v2 2/3] KVM: x86/emulator: Fix wrong privilege check for code segment in __load_segment_descriptor() Date: Tue, 08 Feb 2022 17:34:04 +0800 Message-Id: X-Mailer: git-send-email 2.31.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Code segment descriptor can be loaded by jmp/call/ret, iret and int. The privilege checks are different between those instructions above realmode. Although, the emulator has use x86_transfer_type enumerate to differentiate them, but it is not really used in __load_segment_descriptor(). Note, far jump/call to call gate, task gate or task state segment are not implemented in emulator. As for far jump/call to code segment, if DPL > CPL for conforming code or (RPL > CPL or DPL != CPL) for non-conforming code, it should trigger #GP. The current checks are ok. As for far return, if RPL < CPL or DPL > RPL for conforming code or DPL != RPL for non-conforming code, it should trigger #GP. Outer level return is not implemented above virtual-8086 mode in emulator. So it implies that RPL <= CPL, but the current checks wouldn't trigger #GP if RPL < CPL. As for code segment loading in task switch, if DPL > RPL for conforming code or DPL != RPL for non-conforming code, it should trigger #TS. Since segment selector is loaded before segment descriptor when load state from tss, it implies that RPL = CPL, so the current checks are ok. The only problem in current implementation is missing RPL < CPL check for far return. However, change code to follow the manual is better. Reviewed-by: Sean Christopherson Signed-off-by: Hou Wenlong --- arch/x86/kvm/emulate.c | 31 +++++++++++++++++++++++-------- 1 file changed, 23 insertions(+), 8 deletions(-) diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c index b7ee7de9f8cd..37c4213bdcc1 100644 --- a/arch/x86/kvm/emulate.c +++ b/arch/x86/kvm/emulate.c @@ -1631,14 +1631,29 @@ static int __load_segment_descriptor(struct x86_emulate_ctxt *ctxt, if (!(seg_desc.type & 8)) goto exception; - if (seg_desc.type & 4) { - /* conforming */ - if (dpl > cpl) - goto exception; - } else { - /* nonconforming */ - if (rpl > cpl || dpl != cpl) - goto exception; + /* RET can never return to an inner privilege level. */ + if (transfer == X86_TRANSFER_RET && rpl < cpl) + goto exception; + if (transfer == X86_TRANSFER_RET || transfer == X86_TRANSFER_TASK_SWITCH) { + if (seg_desc.type & 4) { + /* conforming */ + if (dpl > rpl) + goto exception; + } else { + /* nonconforming */ + if (dpl != rpl) + goto exception; + } + } else { /* X86_TRANSFER_CALL_JMP */ + if (seg_desc.type & 4) { + /* conforming */ + if (dpl > cpl) + goto exception; + } else { + /* nonconforming */ + if (rpl > cpl || dpl != cpl) + goto exception; + } } /* in long-mode d/b must be clear if l is set */ if (seg_desc.d && seg_desc.l) { -- 2.31.1