[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen staging] x86/CPUID: block speculative out-of-bound accesses
commit fd2f602c2f85944beb715559136f752a282b3836 Author: Norbert Manthey <nmanthey@xxxxxxxxx> AuthorDate: Mon Jan 28 17:38:29 2019 +0100 Commit: Jan Beulich <jbeulich@xxxxxxxx> CommitDate: Mon Jan 28 17:38:29 2019 +0100 x86/CPUID: block speculative out-of-bound accesses During instruction emulation, the cpuid instruction is emulated with data that is controlled by the guest. As speculation might pass bound checks, we have to ensure that no out-of-bound loads are possible. To not rely on the compiler to perform value propagation, instead of using the array_index_nospec macro, we replace the variable with the constant to be propagated instead. This commit is part of the SpectreV1+L1TF mitigation patch series. Signed-off-by: Norbert Manthey <nmanthey@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Release-acked-by: Juergen Gross <jgross@xxxxxxxx> --- xen/arch/x86/cpuid.c | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/xen/arch/x86/cpuid.c b/xen/arch/x86/cpuid.c index 0591a7dc60..ab0aab678c 100644 --- a/xen/arch/x86/cpuid.c +++ b/xen/arch/x86/cpuid.c @@ -1,6 +1,7 @@ #include <xen/init.h> #include <xen/lib.h> #include <xen/sched.h> +#include <xen/nospec.h> #include <asm/cpuid.h> #include <asm/hvm/hvm.h> #include <asm/hvm/nestedhvm.h> @@ -629,7 +630,7 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf, if ( subleaf >= ARRAY_SIZE(p->cache.raw) ) return; - *res = p->cache.raw[subleaf]; + *res = array_access_nospec(p->cache.raw, subleaf); break; case 0x7: @@ -638,25 +639,25 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf, ARRAY_SIZE(p->feat.raw) - 1) ) return; - *res = p->feat.raw[subleaf]; + *res = array_access_nospec(p->feat.raw, subleaf); break; case 0xb: if ( subleaf >= ARRAY_SIZE(p->topo.raw) ) return; - *res = p->topo.raw[subleaf]; + *res = array_access_nospec(p->topo.raw, subleaf); break; case XSTATE_CPUID: if ( !p->basic.xsave || subleaf >= ARRAY_SIZE(p->xstate.raw) ) return; - *res = p->xstate.raw[subleaf]; + *res = array_access_nospec(p->xstate.raw, subleaf); break; default: - *res = p->basic.raw[leaf]; + *res = array_access_nospec(p->basic.raw, leaf); break; } break; @@ -680,7 +681,7 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf, ARRAY_SIZE(p->extd.raw) - 1) ) return; - *res = p->extd.raw[leaf & 0xffff]; + *res = array_access_nospec(p->extd.raw, leaf & 0xffff); break; default: @@ -847,7 +848,7 @@ void guest_cpuid(const struct vcpu *v, uint32_t leaf, if ( is_pv_domain(d) && is_hardware_domain(d) && guest_kernel_mode(v, regs) && cpu_has_monitor && regs->entry_vector == TRAP_gp_fault ) - *res = raw_cpuid_policy.basic.raw[leaf]; + *res = raw_cpuid_policy.basic.raw[5]; break; case 0x7: -- generated by git-patchbot for /home/xen/git/xen.git#staging _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |