[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [xen staging-4.10] x86: avoid calling {svm,vmx}_do_resume()
commit cbc06ee4280371f78f5858cd613c8d1e2a53ecd3 Author: Jan Beulich <jbeulich@xxxxxxxx> AuthorDate: Tue Dec 15 14:46:33 2020 +0100 Commit: Jan Beulich <jbeulich@xxxxxxxx> CommitDate: Tue Dec 15 14:46:33 2020 +0100 x86: avoid calling {svm,vmx}_do_resume() These functions follow the following path: hvm_do_resume() -> handle_hvm_io_completion() -> hvm_wait_for_io() -> wait_on_xen_event_channel() -> do_softirq() -> schedule() -> sched_context_switch() -> continue_running() and hence may recursively invoke themselves. If this ends up happening a couple of times, a stack overflow would result. Prevent this by also resetting the stack at the ->arch.ctxt_switch->tail() invocations (in both places for consistency) and thus jumping to the functions instead of calling them. This is XSA-348 / CVE-2020-29566. Reported-by: Julien Grall <jgrall@xxxxxxxxxx> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Juergen Gross <jgross@xxxxxxxx> master commit: e6ebd394385db52855d1517cea829ffff68b34b8 master date: 2020-12-15 13:41:23 +0100 --- xen/arch/x86/domain.c | 21 ++++----------------- xen/arch/x86/hvm/svm/svm.c | 3 ++- xen/arch/x86/hvm/vmx/vmcs.c | 3 ++- xen/arch/x86/pv/domain.c | 2 +- xen/include/asm-x86/current.h | 15 +++++++++++---- xen/include/asm-x86/domain.h | 2 +- xen/include/asm-x86/hvm/vmx/vmx.h | 2 +- 7 files changed, 22 insertions(+), 26 deletions(-) diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c index 7ae7266c5f..2c59863342 100644 --- a/xen/arch/x86/domain.c +++ b/xen/arch/x86/domain.c @@ -121,7 +121,7 @@ static void play_dead(void) (*dead_idle)(); } -static void idle_loop(void) +static void noreturn idle_loop(void) { unsigned int cpu = smp_processor_id(); @@ -161,11 +161,6 @@ void startup_cpu_idle_loop(void) reset_stack_and_jump(idle_loop); } -static void noreturn continue_idle_domain(struct vcpu *v) -{ - reset_stack_and_jump(idle_loop); -} - void dump_pageframe_info(struct domain *d) { struct page_info *page; @@ -560,7 +555,7 @@ int arch_domain_create(struct domain *d, unsigned int domcr_flags, static const struct arch_csw idle_csw = { .from = paravirt_ctxt_switch_from, .to = paravirt_ctxt_switch_to, - .tail = continue_idle_domain, + .tail = idle_loop, }; d->arch.ctxt_switch = &idle_csw; @@ -1765,20 +1760,12 @@ void context_switch(struct vcpu *prev, struct vcpu *next) /* Ensure that the vcpu has an up-to-date time base. */ update_vcpu_system_time(next); - /* - * Schedule tail *should* be a terminal function pointer, but leave a - * bug frame around just in case it returns, to save going back into the - * context switching code and leaving a far more subtle crash to diagnose. - */ - nextd->arch.ctxt_switch->tail(next); - BUG(); + reset_stack_and_jump_ind(nextd->arch.ctxt_switch->tail); } void continue_running(struct vcpu *same) { - /* See the comment above. */ - same->domain->arch.ctxt_switch->tail(same); - BUG(); + reset_stack_and_jump_ind(same->domain->arch.ctxt_switch->tail); } int __sync_local_execstate(void) diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c index 25fc9f2288..0365d6bfc2 100644 --- a/xen/arch/x86/hvm/svm/svm.c +++ b/xen/arch/x86/hvm/svm/svm.c @@ -1086,8 +1086,9 @@ static void svm_ctxt_switch_to(struct vcpu *v) wrmsr_tsc_aux(hvm_msr_tsc_aux(v)); } -static void noreturn svm_do_resume(struct vcpu *v) +static void noreturn svm_do_resume(void) { + struct vcpu *v = current; struct vmcb_struct *vmcb = v->arch.hvm_svm.vmcb; bool_t debug_state = v->domain->debugger_attached; bool_t vcpu_guestmode = 0; diff --git a/xen/arch/x86/hvm/vmx/vmcs.c b/xen/arch/x86/hvm/vmx/vmcs.c index e18ebbae9e..a500117781 100644 --- a/xen/arch/x86/hvm/vmx/vmcs.c +++ b/xen/arch/x86/hvm/vmx/vmcs.c @@ -1785,8 +1785,9 @@ void vmx_vmentry_failure(void) domain_crash_synchronous(); } -void vmx_do_resume(struct vcpu *v) +void vmx_do_resume(void) { + struct vcpu *v = current; bool_t debug_state; if ( v->arch.hvm_vmx.active_cpu == smp_processor_id() ) diff --git a/xen/arch/x86/pv/domain.c b/xen/arch/x86/pv/domain.c index 22269023bf..8834190feb 100644 --- a/xen/arch/x86/pv/domain.c +++ b/xen/arch/x86/pv/domain.c @@ -64,7 +64,7 @@ custom_runtime_param("pcid", parse_pcid); #undef page_to_mfn #define page_to_mfn(pg) _mfn(__page_to_mfn(pg)) -static void noreturn continue_nonidle_domain(struct vcpu *v) +static void noreturn continue_nonidle_domain(void) { check_wakeup_from_wait(); reset_stack_and_jump(ret_from_intr); diff --git a/xen/include/asm-x86/current.h b/xen/include/asm-x86/current.h index b7860a772f..2c15df54bd 100644 --- a/xen/include/asm-x86/current.h +++ b/xen/include/asm-x86/current.h @@ -124,16 +124,23 @@ unsigned long get_stack_dump_bottom (unsigned long sp); # define CHECK_FOR_LIVEPATCH_WORK "" #endif -#define reset_stack_and_jump(__fn) \ +#define switch_stack_and_jump(fn, instr, constr) \ ({ \ __asm__ __volatile__ ( \ "mov %0,%%"__OP"sp;" \ - CHECK_FOR_LIVEPATCH_WORK \ - "jmp %c1" \ - : : "r" (guest_cpu_user_regs()), "i" (__fn) : "memory" ); \ + CHECK_FOR_LIVEPATCH_WORK \ + instr "1" \ + : : "r" (guest_cpu_user_regs()), constr (fn) : "memory" ); \ unreachable(); \ }) +#define reset_stack_and_jump(fn) \ + switch_stack_and_jump(fn, "jmp %c", "i") + +/* The constraint may only specify non-call-clobbered registers. */ +#define reset_stack_and_jump_ind(fn) \ + switch_stack_and_jump(fn, "INDIRECT_JMP %", "b") + /* * Which VCPU's state is currently running on each CPU? * This is not necesasrily the same as 'current' as a CPU may be diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h index 5afaf6b9de..bd31fada49 100644 --- a/xen/include/asm-x86/domain.h +++ b/xen/include/asm-x86/domain.h @@ -330,7 +330,7 @@ struct arch_domain const struct arch_csw { void (*from)(struct vcpu *); void (*to)(struct vcpu *); - void (*tail)(struct vcpu *); + void noreturn (*tail)(void); } *ctxt_switch; /* nestedhvm: translate l2 guest physical to host physical */ diff --git a/xen/include/asm-x86/hvm/vmx/vmx.h b/xen/include/asm-x86/hvm/vmx/vmx.h index aad25335eb..a05a0d4d62 100644 --- a/xen/include/asm-x86/hvm/vmx/vmx.h +++ b/xen/include/asm-x86/hvm/vmx/vmx.h @@ -95,7 +95,7 @@ typedef enum { void vmx_asm_vmexit_handler(struct cpu_user_regs); void vmx_asm_do_vmentry(void); void vmx_intr_assist(void); -void noreturn vmx_do_resume(struct vcpu *); +void noreturn vmx_do_resume(void); void vmx_vlapic_msr_changed(struct vcpu *v); void vmx_realmode_emulate_one(struct hvm_emulate_ctxt *hvmemul_ctxt); void vmx_realmode(struct cpu_user_regs *regs); -- generated by git-patchbot for /home/xen/git/xen.git#staging-4.10
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |