Module Name: src Committed By: maxv Date: Sun Dec 31 08:29:38 UTC 2017
Modified Files: src/sys/arch/amd64/amd64: machdep.c src/sys/arch/amd64/include: segments.h src/sys/arch/i386/i386: machdep.c src/sys/arch/i386/include: segments.h src/sys/arch/x86/x86: vm_machdep.c Log Message: Fix a huge privilege separation vulnerability in Xen-amd64. On amd64 the kernel runs in ring3, like userland, and therefore SEL_KPL equals SEL_UPL. While Xen can make a distinction between usermode and kernelmode in %cs, it can't when it comes to iopl. Since we set SEL_KPL in iopl, Xen sees SEL_UPL, and allows (unprivileged) userland processes to read and write to the CPU ports. It is easy, then, to completely escalate privileges; by reprogramming the PIC, by reading the ATA disks, by intercepting the keyboard interrupts (keylogger), etc. Declare IOPL_KPL, set to 1 on Xen-amd64, which allows the kernel to use the ports but not userland. I didn't test this change on i386, but it seems fine enough. To generate a diff of this commit: cvs rdiff -u -r1.279 -r1.280 src/sys/arch/amd64/amd64/machdep.c cvs rdiff -u -r1.33 -r1.34 src/sys/arch/amd64/include/segments.h cvs rdiff -u -r1.799 -r1.800 src/sys/arch/i386/i386/machdep.c cvs rdiff -u -r1.63 -r1.64 src/sys/arch/i386/include/segments.h cvs rdiff -u -r1.29 -r1.30 src/sys/arch/x86/x86/vm_machdep.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/arch/amd64/amd64/machdep.c diff -u src/sys/arch/amd64/amd64/machdep.c:1.279 src/sys/arch/amd64/amd64/machdep.c:1.280 --- src/sys/arch/amd64/amd64/machdep.c:1.279 Fri Dec 1 21:22:45 2017 +++ src/sys/arch/amd64/amd64/machdep.c Sun Dec 31 08:29:38 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: machdep.c,v 1.279 2017/12/01 21:22:45 maxv Exp $ */ +/* $NetBSD: machdep.c,v 1.280 2017/12/31 08:29:38 maxv Exp $ */ /* * Copyright (c) 1996, 1997, 1998, 2000, 2006, 2007, 2008, 2011 @@ -110,7 +110,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: machdep.c,v 1.279 2017/12/01 21:22:45 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: machdep.c,v 1.280 2017/12/31 08:29:38 maxv Exp $"); /* #define XENDEBUG_LOW */ @@ -479,7 +479,7 @@ x86_64_proc0_pcb_ldt_init(void) pcb->pcb_fs = 0; pcb->pcb_gs = 0; pcb->pcb_rsp0 = (uvm_lwp_getuarea(l) + USPACE - 16) & ~0xf; - pcb->pcb_iopl = SEL_KPL; + pcb->pcb_iopl = IOPL_KPL; pcb->pcb_dbregs = NULL; pcb->pcb_cr0 = rcr0() & ~CR0_TS; l->l_md.md_regs = (struct trapframe *)pcb->pcb_rsp0 - 1; Index: src/sys/arch/amd64/include/segments.h diff -u src/sys/arch/amd64/include/segments.h:1.33 src/sys/arch/amd64/include/segments.h:1.34 --- src/sys/arch/amd64/include/segments.h:1.33 Sat Nov 4 08:50:47 2017 +++ src/sys/arch/amd64/include/segments.h Sun Dec 31 08:29:38 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: segments.h,v 1.33 2017/11/04 08:50:47 cherry Exp $ */ +/* $NetBSD: segments.h,v 1.34 2017/12/31 08:29:38 maxv Exp $ */ /* * Copyright (c) 1990 The Regents of the University of California. @@ -107,6 +107,12 @@ #define ISLDT(s) ((s) & SEL_LDT) /* is it local or global */ #define SEL_LDT 4 /* local descriptor table */ +#ifdef XEN +#define IOPL_KPL 1 +#else +#define IOPL_KPL SEL_KPL +#endif + /* Dynamically allocated TSSs and LDTs start (byte offset) */ #define SYSSEL_START (NGDT_MEM << 3) #define DYNSEL_START (SYSSEL_START + (NGDT_SYS << 4)) Index: src/sys/arch/i386/i386/machdep.c diff -u src/sys/arch/i386/i386/machdep.c:1.799 src/sys/arch/i386/i386/machdep.c:1.800 --- src/sys/arch/i386/i386/machdep.c:1.799 Sat Nov 11 12:51:06 2017 +++ src/sys/arch/i386/i386/machdep.c Sun Dec 31 08:29:38 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: machdep.c,v 1.799 2017/11/11 12:51:06 maxv Exp $ */ +/* $NetBSD: machdep.c,v 1.800 2017/12/31 08:29:38 maxv Exp $ */ /* * Copyright (c) 1996, 1997, 1998, 2000, 2004, 2006, 2008, 2009, 2017 @@ -67,7 +67,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: machdep.c,v 1.799 2017/11/11 12:51:06 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: machdep.c,v 1.800 2017/12/31 08:29:38 maxv Exp $"); #include "opt_beep.h" #include "opt_compat_freebsd.h" @@ -472,7 +472,7 @@ i386_proc0_pcb_ldt_init(void) pcb->pcb_cr0 = rcr0() & ~CR0_TS; pcb->pcb_esp0 = uvm_lwp_getuarea(l) + USPACE - 16; - pcb->pcb_iopl = SEL_KPL; + pcb->pcb_iopl = IOPL_KPL; l->l_md.md_regs = (struct trapframe *)pcb->pcb_esp0 - 1; memcpy(&pcb->pcb_fsd, &gdtstore[GUDATA_SEL], sizeof(pcb->pcb_fsd)); memcpy(&pcb->pcb_gsd, &gdtstore[GUDATA_SEL], sizeof(pcb->pcb_gsd)); Index: src/sys/arch/i386/include/segments.h diff -u src/sys/arch/i386/include/segments.h:1.63 src/sys/arch/i386/include/segments.h:1.64 --- src/sys/arch/i386/include/segments.h:1.63 Sat Nov 4 08:50:47 2017 +++ src/sys/arch/i386/include/segments.h Sun Dec 31 08:29:38 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: segments.h,v 1.63 2017/11/04 08:50:47 cherry Exp $ */ +/* $NetBSD: segments.h,v 1.64 2017/12/31 08:29:38 maxv Exp $ */ /*- * Copyright (c) 1990 The Regents of the University of California. @@ -105,6 +105,8 @@ #define ISLDT(s) ((s) & SEL_LDT) /* is it local or global */ #define SEL_LDT 4 /* local descriptor table */ +#define IOPL_KPL SEL_KPL + /* Dynamically allocated TSSs and LDTs start (byte offset) */ #define DYNSEL_START (NGDT << 3) Index: src/sys/arch/x86/x86/vm_machdep.c diff -u src/sys/arch/x86/x86/vm_machdep.c:1.29 src/sys/arch/x86/x86/vm_machdep.c:1.30 --- src/sys/arch/x86/x86/vm_machdep.c:1.29 Sat Jun 17 07:45:13 2017 +++ src/sys/arch/x86/x86/vm_machdep.c Sun Dec 31 08:29:38 2017 @@ -1,4 +1,4 @@ -/* $NetBSD: vm_machdep.c,v 1.29 2017/06/17 07:45:13 maxv Exp $ */ +/* $NetBSD: vm_machdep.c,v 1.30 2017/12/31 08:29:38 maxv Exp $ */ /*- * Copyright (c) 1982, 1986 The Regents of the University of California. @@ -80,7 +80,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: vm_machdep.c,v 1.29 2017/06/17 07:45:13 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: vm_machdep.c,v 1.30 2017/12/31 08:29:38 maxv Exp $"); #include "opt_mtrr.h" @@ -164,7 +164,7 @@ cpu_lwp_fork(struct lwp *l1, struct lwp pcb2->pcb_dbregs = NULL; #if defined(XEN) - pcb2->pcb_iopl = SEL_KPL; + pcb2->pcb_iopl = IOPL_KPL; #endif /*