x86/HVM: properly bound x2APIC MSR range
authorJan Beulich <jbeulich@suse.com>
Wed, 1 Oct 2014 12:54:47 +0000 (14:54 +0200)
committerJan Beulich <jbeulich@suse.com>
Wed, 1 Oct 2014 12:54:47 +0000 (14:54 +0200)
commit61fdda7acf3de11f3d50d50e5b4f4ecfac7e0d04
treeaa63607a0f8d5ca6ab2a49335465802877695d28
parentb6e6ccfaa95109c26c8027e5c5b1c8e97d6ae87f
x86/HVM: properly bound x2APIC MSR range

While the write path change appears to be purely cosmetic (but still
gets done here for consistency), the read side mistake permitted
accesses beyond the virtual APIC page.

Note that while this isn't fully in line with the specification
(digesting MSRs 0x800-0xBFF for the x2APIC), this is the minimal
possible fix addressing the security issue and getting x2APIC related
code into a consistent shape (elsewhere a 256 rather than 1024 wide
window is being used too). This will be dealt with subsequently.

This is CVE-2014-7188 / XSA-108.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
xen/arch/x86/hvm/hvm.c