[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 3/6] x86/AMD: Rework XSA-9 / Erratum 121 handling entirely
There are multiple problems: * The opt_allow_unsafe < 0 logic is dead since 2012 (c/s 0c7a6966511 "x86-64: refine the XSA-9 fix"). * Given that opt_allow_unsafe was deliberately intended not to be specific to #121 alone, setting it to true for the not-affected case will cause a security issue if a second use of this option ever appears. * Calling cpu_has_amd_erratum() on every domain creation is wasteful, given that the answer is static after boot. Move opt_allow_unsafe into domain.c, as a better location for it to live, and switch it to be a straight boolean. Use the new cpu_bug_* infrastructure to precompute erratum 121 during boot, rather than repeatedly at runtime. Leave a comment beside the check in arch_domain_create() to explain why we may refuse to boot DomU's. Reflow the printed information for grep-ability, and fix them for correctness and brevity. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> --- CC: Jan Beulich <JBeulich@xxxxxxxx> CC: Wei Liu <wei.liu2@xxxxxxxxxx> CC: Roger Pau Monné <roger.pau@xxxxxxxxxx> --- xen/arch/x86/cpu/amd.c | 26 ++++++++------------------ xen/arch/x86/domain.c | 19 +++++++++++++------ xen/include/asm-x86/amd.h | 5 ----- xen/include/asm-x86/cpufeature.h | 3 +++ xen/include/asm-x86/cpufeatures.h | 2 ++ xen/include/asm-x86/domain.h | 2 ++ 6 files changed, 28 insertions(+), 29 deletions(-) diff --git a/xen/arch/x86/cpu/amd.c b/xen/arch/x86/cpu/amd.c index c3aa1f4..8089fb9 100644 --- a/xen/arch/x86/cpu/amd.c +++ b/xen/arch/x86/cpu/amd.c @@ -40,10 +40,6 @@ integer_param("cpuid_mask_l7s0_ebx", opt_cpuid_mask_l7s0_ebx); static unsigned int __initdata opt_cpuid_mask_thermal_ecx = ~0u; integer_param("cpuid_mask_thermal_ecx", opt_cpuid_mask_thermal_ecx); -/* 1 = allow, 0 = don't allow guest creation, -1 = don't allow boot */ -s8 __read_mostly opt_allow_unsafe; -boolean_param("allow_unsafe", opt_allow_unsafe); - /* Signal whether the ACPI C1E quirk is required. */ bool __read_mostly amd_acpi_c1e_quirk; @@ -538,6 +534,14 @@ static void init_amd_k8(struct cpuinfo_x86 *c) { uint64_t val; + setup_force_cpu_cap(X86_BUG_AMD_ERRATUM_121); + + if ( c == &boot_cpu_data && !opt_allow_unsafe ) + printk(KERN_WARNING + "*** Xen will not allow DomU creation on this CPU for security reasons ***\n" + KERN_WARNING + "*** Pass \"allow_unsafe\" if you trust all your guest kernels ***\n"); + /* * Skip errata workarounds if we are virtualised. We won't have * sufficient control of hardware to do anything useful. @@ -784,20 +788,6 @@ static void init_amd(struct cpuinfo_x86 *c) amd_get_topology(c); - if (!cpu_has_amd_erratum(c, AMD_ERRATUM_121)) - opt_allow_unsafe = 1; - else if (opt_allow_unsafe < 0) - panic("Xen will not boot on this CPU for security reasons" - "Pass \"allow_unsafe\" if you're trusting all your" - " (PV) guest kernels.\n"); - else if (!opt_allow_unsafe && c == &boot_cpu_data) - printk(KERN_WARNING - "*** Xen will not allow creation of DomU-s on" - " this CPU for security reasons. ***\n" - KERN_WARNING - "*** Pass \"allow_unsafe\" if you're trusting" - " all your (PV) guest kernels. ***\n"); - /* AMD CPUs do not support SYSENTER outside of legacy mode. */ __clear_bit(X86_FEATURE_SEP, c->x86_capability); diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c index 32dc4253..beeb1d7 100644 --- a/xen/arch/x86/domain.c +++ b/xen/arch/x86/domain.c @@ -71,6 +71,10 @@ DEFINE_PER_CPU(struct vcpu *, curr_vcpu); +/* Permit creating domains on unsafe systems? */ +bool __read_mostly opt_allow_unsafe; +boolean_param("allow_unsafe", opt_allow_unsafe); + static void default_idle(void); void (*pm_idle) (void) __read_mostly = default_idle; void (*dead_idle) (void) __read_mostly = default_dead_idle; @@ -506,17 +510,20 @@ int arch_domain_create(struct domain *d, return -EINVAL; } - if ( d->domain_id && cpu_has_amd_erratum(&boot_cpu_data, AMD_ERRATUM_121) ) + /* + * AMD Erratum 121 results in a core hang when executing into the + * non-canonical region. 64bit PV and HVM guests can pull this off, and + * there is nothing Xen can do to mitigate. + */ + if ( unlikely(cpu_bug_amd_erratum_121) && d->domain_id ) { if ( !opt_allow_unsafe ) { - printk(XENLOG_G_ERR "Xen does not allow DomU creation on this CPU" - " for security reasons.\n"); + printk(XENLOG_G_ERR + "Xen does not allow DomU creation on this CPU for security reasons\n"); return -EPERM; } - printk(XENLOG_G_WARNING - "Dom%d may compromise security on this CPU.\n", - d->domain_id); + printk(XENLOG_G_WARNING "%pd may compromise security on this CPU\n", d); } d->arch.s3_integrity = config->flags & XEN_DOMCTL_CDF_s3_integrity; diff --git a/xen/include/asm-x86/amd.h b/xen/include/asm-x86/amd.h index a82382e..3d82db1 100644 --- a/xen/include/asm-x86/amd.h +++ b/xen/include/asm-x86/amd.h @@ -124,9 +124,6 @@ #define AMD_MODEL_RANGE_START(range) (((range) >> 12) & 0xfff) #define AMD_MODEL_RANGE_END(range) ((range) & 0xfff) -#define AMD_ERRATUM_121 \ - AMD_LEGACY_ERRATUM(AMD_MODEL_RANGE(0x0f, 0x0, 0x0, 0x3f, 0xf)) - #define AMD_ERRATUM_170 \ AMD_LEGACY_ERRATUM(AMD_MODEL_RANGE(0x0f, 0x0, 0x0, 0x67, 0xf)) @@ -143,8 +140,6 @@ struct cpuinfo_x86; int cpu_has_amd_erratum(const struct cpuinfo_x86 *, int, ...); -extern s8 opt_allow_unsafe; - void fam10h_check_enable_mmcfg(void); void check_enable_amd_mmconf_dmi(void); diff --git a/xen/include/asm-x86/cpufeature.h b/xen/include/asm-x86/cpufeature.h index 5592e17..4ed7be3 100644 --- a/xen/include/asm-x86/cpufeature.h +++ b/xen/include/asm-x86/cpufeature.h @@ -122,6 +122,9 @@ #define cpu_has_msr_tsc_aux (cpu_has_rdtscp || cpu_has_rdpid) +/* Bugs. */ +#define cpu_bug_amd_erratum_121 boot_cpu_has(X86_BUG_AMD_ERRATUM_121) + enum _cache_type { CACHE_TYPE_NULL = 0, CACHE_TYPE_DATA = 1, diff --git a/xen/include/asm-x86/cpufeatures.h b/xen/include/asm-x86/cpufeatures.h index ba468ea..a19116c 100644 --- a/xen/include/asm-x86/cpufeatures.h +++ b/xen/include/asm-x86/cpufeatures.h @@ -38,5 +38,7 @@ XEN_CPUFEATURE(XEN_LBR, X86_SYNTH(22)) /* Xen uses MSR_DEBUGCTL.LBR */ #define X86_NR_BUG 1 #define X86_BUG(x) ((FSCAPINTS + X86_NR_SYNTH) * 32 + (x)) +#define X86_BUG_AMD_ERRATUM_121 X86_BUG( 0) /* Hang on fetch across non-canonical boundary. */ + /* Total number of capability words, inc synth and bug words. */ #define NCAPINTS (FSCAPINTS + X86_NR_SYNTH + X86_NR_BUG) /* N 32-bit words worth of info */ diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h index 277f99f..62bafe3 100644 --- a/xen/include/asm-x86/domain.h +++ b/xen/include/asm-x86/domain.h @@ -12,6 +12,8 @@ #include <public/vcpu.h> #include <public/hvm/hvm_info_table.h> +extern bool opt_allow_unsafe; + #define has_32bit_shinfo(d) ((d)->arch.has_32bit_shinfo) #define is_hvm_pv_evtchn_domain(d) (is_hvm_domain(d) && \ -- 2.1.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |