[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH 0/9] x86/spec-ctrl: AMD DIV fix, and VERW prerequisite bugfixes
- To: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
- Date: Fri, 15 Sep 2023 16:00:29 +0100
- Authentication-results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none
- Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Jan Beulich <JBeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, Jason Andryuk <jandryuk@xxxxxxxxx>
- Delivery-date: Fri, 15 Sep 2023 15:00:56 +0000
- Ironport-data: A9a23:+2eaAqLujdG83sdyFE+RG5UlxSXFcZb7ZxGr2PjKsXjdYENSgzMPz WNKDWCCb//ZN2H9LY8jPtmy8h5XuJHVnYM3TFdlqX01Q3x08seUXt7xwmUcnc+xBpaaEB84t ZV2hv3odp1coqr0/0/1WlTZhSAhk/nOHvylULKs1hlZHWdMUD0mhQ9oh9k3i4tphcnRKw6Ws Jb5rta31GWNglaYCUpKrfrZwP9TlK6q4mhA7wVjPaojUGL2zBH5MrpOfcldEFOgKmVkNrbSb /rOyri/4lTY838FYj9yuu+mGqGiaue60Tmm0hK6aYD76vRxjnVaPpIAHOgdcS9qZwChxLid/ jnvWauYEm/FNoWU8AgUvoIx/ytWZcWq85efSZSzXFD6I+QrvBIAzt03ZHzaM7H09c5HRmJCr KccIgwQcw683vuSzLXjRsZV05FLwMnDZOvzu1llxDDdS/0nXYrCU+PB4towMDUY354UW6yEP oxANGQpNU6bC/FMEg5/5JYWteGknHTgNRZfr0qYv/Ef6GnP1g1hlrPqNbI5f/TTH54Pxh/C/ jKuE2LRGyADD/+ZkSS/3DH3qu+UrGDGQ7IfC+jtnhJtqALKnTFCYPEMbnOrrP/8hkOgVtZ3L 00P5jFovaU07FasTNT2Q1u/unHsljw2VsdUEuY6wBqQ0aeS6AGcbkAbShZRZdpgs9U5LRQv3 0WMlsnkBhRutqOUUnOX8rqIrTK0NjMRJGVEbigBJSMH6t/vupAujTrAS99iFOi+ididJN3r6 2nU9m5k3exV1JNVkfzhpjgrng5AuLD5CQ05v17TVF648x1GPZeBa4vw5XfiuKMowJmicnGNu 30Nms675e8IDI2QmCHlfNjhDI1F9N7ebmSC3AcH840Jsm30piX9Jdw4DCRWfh8BDyoSRdP+j KY/Uyt17YQbAnalZLQfj2mZW5VzlviI+TgIu5npgjtyjnpZLl/vEMJGPxT4M4XRfK8EyPtXB HtjWZzwZUv28Iw+pNZMe88T0KUw2gc1zn7JSJbwwnyPiOTPOCHMF+xeYQTXPojVCZ9oRi2Pq 76z0OPQkH1ivBDWOHGLoeb/03hURZTEOXwGg5MOLbPSSuaXMGogF+XQ0dscl39NxsxoehPz1 ijlACdwkQOv7UAr3C3WMhiPnpuzB8cgxZ/6VARwVWuVN48LOtr3tv1GJsFmLdHKNoVLlJZJc hXMQO3Yatwnd9gN0211gUXVxGC6SCmWuA==
- Ironport-hdrordr: A9a23:U6LJRaHe1nY8ivoQpLqELMeALOsnbusQ8zAXPiBKJCC9E/bo8v xG+c5w6faaslkssR0b9+xoW5PwI080l6QU3WB5B97LMDUO0FHCEGgI1/qA/9SPIUzDHu4279 YbT0B9YueAcGSTW6zBkXWF+9VL+qj5zEix792uq0uE1WtRGtldBwESMHf9LmRGADNoKLAeD5 Sm6s9Ot1ObCA8qhpTSPAhiYwDbzee77a7bXQ==
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
Patch 9 is the XSA-439 fix for the AMD DIV issue, disclosed insufficiently
ahead of August 8th for us to prepare a fix for the embargo.
Patches 1 thru 8 are prerequisites, identified while trying to write patch 9.
All 9 patches are for all security trees.
Andrew Cooper (9):
x86/spec-ctrl: Fix confusion between SPEC_CTRL_EXIT_TO_XEN{,_IST}
x86/spec-ctrl: Fold DO_SPEC_CTRL_EXIT_TO_XEN into it's single user
x86/spec-ctrl: Turn the remaining SPEC_CTRL_{ENTRY,EXIT}_* into asm
macros
x86/spec-ctrl: Improve all SPEC_CTRL_{ENTER,EXIT}_* comments
x86/entry: Adjust restore_all_xen to hold stack_end in %r14
x86/entry: Track the IST-ness of an entry for the exit paths
x86/spec-ctrl: Issue VERW during IST exit to Xen
x86/amd: Introduce is_zen{1,2}_uarch() predicates
x86/spec-ctrl: Mitigate the Zen1 DIV leakge
docs/misc/xen-command-line.pandoc | 6 +-
xen/arch/x86/cpu/amd.c | 18 +--
xen/arch/x86/hvm/svm/entry.S | 1 +
xen/arch/x86/include/asm/amd.h | 11 ++
xen/arch/x86/include/asm/cpufeatures.h | 2 +-
xen/arch/x86/include/asm/spec_ctrl_asm.h | 152 ++++++++++++++++-------
xen/arch/x86/spec_ctrl.c | 49 +++++++-
xen/arch/x86/traps.c | 13 ++
xen/arch/x86/x86_64/compat/entry.S | 9 +-
xen/arch/x86/x86_64/entry.S | 30 ++++-
10 files changed, 220 insertions(+), 71 deletions(-)
--
2.30.2
|