From: Keir Fraser <keir.xen@gmail.com>
To: Jan Beulich <JBeulich@suse.com>, xen-devel <xen-devel@lists.xen.org>
Subject: Re: [PATCH] x86-64: refine the XSA-9 fix
Date: Fri, 17 Aug 2012 16:49:21 +0100 [thread overview]
Message-ID: <CC542691.3C453%keir.xen@gmail.com> (raw)
In-Reply-To: <4FD881CB0200007800089ADB@nat28.tlf.novell.com>
On 13/06/2012 11:04, "Jan Beulich" <JBeulich@suse.com> wrote:
> Our product management wasn't happy with the "solution" for XSA-9, and
> demanded that customer systems must continue to boot. Rather than
> having our and perhaps other distros carry non-trivial patches, allow
> for more fine grained control (panic on boot, deny guest creation, or
> merely warn) by means of a single line change.
>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Keir Fraser <keir@xen.org>
> --- a/xen/arch/x86/cpu/amd.c
> +++ b/xen/arch/x86/cpu/amd.c
> @@ -32,8 +32,11 @@
> static char opt_famrev[14];
> string_param("cpuid_mask_cpu", opt_famrev);
>
> -static bool_t opt_allow_unsafe;
> +#ifdef __x86_64__
> +/* 1 = allow, 0 = don't allow guest creation, -1 = don't allow boot */
> +s8 __read_mostly opt_allow_unsafe = -1;
> boolean_param("allow_unsafe", opt_allow_unsafe);
> +#endif
>
> static inline void wrmsr_amd(unsigned int index, unsigned int lo,
> unsigned int hi)
> @@ -496,10 +499,19 @@ static void __devinit init_amd(struct cp
> clear_bit(X86_FEATURE_MWAIT, c->x86_capability);
>
> #ifdef __x86_64__
> - if (cpu_has_amd_erratum(c, AMD_ERRATUM_121) && !opt_allow_unsafe)
> + if (!cpu_has_amd_erratum(c, AMD_ERRATUM_121))
> + opt_allow_unsafe = 1;
> + else if (opt_allow_unsafe < 0)
> panic("Xen will not boot on this CPU for security reasons.\n"
> "Pass \"allow_unsafe\" if you're trusting all your"
> " (PV) guest kernels.\n");
> + else if (!opt_allow_unsafe && c == &boot_cpu_data)
> + printk(KERN_WARNING
> + "*** Xen will not allow creation of DomU-s on"
> + " this CPU for security reasons. ***\n"
> + KERN_WARNING
> + "*** Pass \"allow_unsafe\" if you're trusting"
> + " all your (PV) guest kernels. ***\n");
>
> /* AMD CPUs do not support SYSENTER outside of legacy mode. */
> clear_bit(X86_FEATURE_SEP, c->x86_capability);
> --- a/xen/arch/x86/domain.c
> +++ b/xen/arch/x86/domain.c
> @@ -55,6 +55,7 @@
> #include <asm/traps.h>
> #include <asm/nmi.h>
> #include <asm/mce.h>
> +#include <asm/amd.h>
> #include <xen/numa.h>
> #include <xen/iommu.h>
> #ifdef CONFIG_COMPAT
> @@ -531,6 +532,20 @@ int arch_domain_create(struct domain *d,
>
> #else /* __x86_64__ */
>
> + if ( d->domain_id && !is_idle_domain(d) &&
> + cpu_has_amd_erratum(&boot_cpu_data, AMD_ERRATUM_121) )
> + {
> + if ( !opt_allow_unsafe )
> + {
> + printk(XENLOG_G_ERR "Xen does not allow DomU creation on this
> CPU"
> + " for security reasons.\n");
> + return -EPERM;
> + }
> + printk(XENLOG_G_WARNING
> + "Dom%d may compromise security on this CPU.\n",
> + d->domain_id);
> + }
> +
> BUILD_BUG_ON(PDPT_L2_ENTRIES * sizeof(*d->arch.mm_perdomain_pt_pages)
> != PAGE_SIZE);
> pg = alloc_domheap_page(NULL, MEMF_node(domain_to_node(d)));
> --- a/xen/include/asm-x86/amd.h
> +++ b/xen/include/asm-x86/amd.h
> @@ -147,6 +147,8 @@ struct cpuinfo_x86;
> int cpu_has_amd_erratum(const struct cpuinfo_x86 *, int, ...);
>
> #ifdef __x86_64__
> +extern s8 opt_allow_unsafe;
> +
> void fam10h_check_enable_mmcfg(void);
> void check_enable_amd_mmconf_dmi(void);
> #endif
>
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
prev parent reply other threads:[~2012-08-17 15:49 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2012-06-13 10:04 [PATCH] x86-64: refine the XSA-9 fix Jan Beulich
2012-06-18 14:06 ` Keir Fraser
2012-06-18 14:28 ` Jan Beulich
2012-08-17 15:11 ` Olaf Hering
2012-08-17 15:48 ` Keir Fraser
2012-08-17 15:56 ` Olaf Hering
2012-08-17 16:28 ` Jan Beulich
2012-08-17 16:41 ` Keir Fraser
2012-08-17 15:49 ` Keir Fraser [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CC542691.3C453%keir.xen@gmail.com \
--to=keir.xen@gmail.com \
--cc=JBeulich@suse.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).