mirror of https://github.com/xemu-project/xemu.git
hw/arm: add control knob to disable kaslr_seed via DTB
Generally a guest needs an external source of randomness to properly enable things like address space randomisation. However in a trusted boot environment where the firmware will cryptographically verify components having random data in the DTB will cause verification to fail. Add a control knob so we can prevent this being added to the system DTB. Signed-off-by: Alex Bennée <alex.bennee@linaro.org> Tested-by: Heinrich Schuchardt <xypron.glpk@gmx.de> Acked-by: Ilias Apalodimas <ilias.apalodimas@linaro.org> Acked-by: Jerome Forissier <jerome@forissier.org> Reviewed-by: Andrew Jones <drjones@redhat.com> Message-Id: <20220105135009.1584676-22-alex.bennee@linaro.org>
This commit is contained in:
parent
7bef20d729
commit
33973e1e1f
|
@ -121,6 +121,14 @@ ras
|
||||||
Set ``on``/``off`` to enable/disable reporting host memory errors to a guest
|
Set ``on``/``off`` to enable/disable reporting host memory errors to a guest
|
||||||
using ACPI and guest external abort exceptions. The default is off.
|
using ACPI and guest external abort exceptions. The default is off.
|
||||||
|
|
||||||
|
dtb-kaslr-seed
|
||||||
|
Set ``on``/``off`` to pass a random seed via the guest dtb
|
||||||
|
kaslr-seed node (in both "/chosen" and /secure-chosen) to use
|
||||||
|
for features like address space randomisation. The default is
|
||||||
|
``on``. You will want to disable it if your trusted boot chain will
|
||||||
|
verify the DTB it is passed. It would be the responsibility of the
|
||||||
|
firmware to come up with a seed and pass it on if it wants to.
|
||||||
|
|
||||||
Linux guest kernel configuration
|
Linux guest kernel configuration
|
||||||
""""""""""""""""""""""""""""""""
|
""""""""""""""""""""""""""""""""
|
||||||
|
|
||||||
|
|
|
@ -247,11 +247,15 @@ static void create_fdt(VirtMachineState *vms)
|
||||||
|
|
||||||
/* /chosen must exist for load_dtb to fill in necessary properties later */
|
/* /chosen must exist for load_dtb to fill in necessary properties later */
|
||||||
qemu_fdt_add_subnode(fdt, "/chosen");
|
qemu_fdt_add_subnode(fdt, "/chosen");
|
||||||
create_kaslr_seed(ms, "/chosen");
|
if (vms->dtb_kaslr_seed) {
|
||||||
|
create_kaslr_seed(ms, "/chosen");
|
||||||
|
}
|
||||||
|
|
||||||
if (vms->secure) {
|
if (vms->secure) {
|
||||||
qemu_fdt_add_subnode(fdt, "/secure-chosen");
|
qemu_fdt_add_subnode(fdt, "/secure-chosen");
|
||||||
create_kaslr_seed(ms, "/secure-chosen");
|
if (vms->dtb_kaslr_seed) {
|
||||||
|
create_kaslr_seed(ms, "/secure-chosen");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Clock node, for the benefit of the UART. The kernel device tree
|
/* Clock node, for the benefit of the UART. The kernel device tree
|
||||||
|
@ -2235,6 +2239,20 @@ static void virt_set_its(Object *obj, bool value, Error **errp)
|
||||||
vms->its = value;
|
vms->its = value;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static bool virt_get_dtb_kaslr_seed(Object *obj, Error **errp)
|
||||||
|
{
|
||||||
|
VirtMachineState *vms = VIRT_MACHINE(obj);
|
||||||
|
|
||||||
|
return vms->dtb_kaslr_seed;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void virt_set_dtb_kaslr_seed(Object *obj, bool value, Error **errp)
|
||||||
|
{
|
||||||
|
VirtMachineState *vms = VIRT_MACHINE(obj);
|
||||||
|
|
||||||
|
vms->dtb_kaslr_seed = value;
|
||||||
|
}
|
||||||
|
|
||||||
static char *virt_get_oem_id(Object *obj, Error **errp)
|
static char *virt_get_oem_id(Object *obj, Error **errp)
|
||||||
{
|
{
|
||||||
VirtMachineState *vms = VIRT_MACHINE(obj);
|
VirtMachineState *vms = VIRT_MACHINE(obj);
|
||||||
|
@ -2764,6 +2782,13 @@ static void virt_machine_class_init(ObjectClass *oc, void *data)
|
||||||
"Set on/off to enable/disable "
|
"Set on/off to enable/disable "
|
||||||
"ITS instantiation");
|
"ITS instantiation");
|
||||||
|
|
||||||
|
object_class_property_add_bool(oc, "dtb-kaslr-seed",
|
||||||
|
virt_get_dtb_kaslr_seed,
|
||||||
|
virt_set_dtb_kaslr_seed);
|
||||||
|
object_class_property_set_description(oc, "dtb-kaslr-seed",
|
||||||
|
"Set off to disable passing of kaslr-seed "
|
||||||
|
"dtb node to guest");
|
||||||
|
|
||||||
object_class_property_add_str(oc, "x-oem-id",
|
object_class_property_add_str(oc, "x-oem-id",
|
||||||
virt_get_oem_id,
|
virt_get_oem_id,
|
||||||
virt_set_oem_id);
|
virt_set_oem_id);
|
||||||
|
@ -2828,6 +2853,9 @@ static void virt_instance_init(Object *obj)
|
||||||
/* MTE is disabled by default. */
|
/* MTE is disabled by default. */
|
||||||
vms->mte = false;
|
vms->mte = false;
|
||||||
|
|
||||||
|
/* Supply a kaslr-seed by default */
|
||||||
|
vms->dtb_kaslr_seed = true;
|
||||||
|
|
||||||
vms->irqmap = a15irqmap;
|
vms->irqmap = a15irqmap;
|
||||||
|
|
||||||
virt_flash_create(vms);
|
virt_flash_create(vms);
|
||||||
|
|
|
@ -148,6 +148,7 @@ struct VirtMachineState {
|
||||||
bool virt;
|
bool virt;
|
||||||
bool ras;
|
bool ras;
|
||||||
bool mte;
|
bool mte;
|
||||||
|
bool dtb_kaslr_seed;
|
||||||
OnOffAuto acpi;
|
OnOffAuto acpi;
|
||||||
VirtGICType gic_version;
|
VirtGICType gic_version;
|
||||||
VirtIOMMUType iommu;
|
VirtIOMMUType iommu;
|
||||||
|
|
Loading…
Reference in New Issue