Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 15 Oct 2018 02:07:17 -0600
From: Khalid Aziz <khalid.aziz@...cle.com>
To: "Stecklina, Julian" <jsteckli@...zon.de>
Cc: "juerg.haefliger@....com" <juerg.haefliger@....com>,
        "deepa.srinivasan@...cle.com" <deepa.srinivasan@...cle.com>,
        "jmattson@...gle.com" <jmattson@...gle.com>,
        "andrew.cooper3@...rix.com" <andrew.cooper3@...rix.com>,
        "Woodhouse, David" <dwmw@...zon.co.uk>,
        "torvalds@...ux-foundation.org" <torvalds@...ux-foundation.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "linux-mm@...ck.org" <linux-mm@...ck.org>,
        "boris.ostrovsky@...cle.com" <boris.ostrovsky@...cle.com>,
        "pradeep.vincent@...cle.com" <pradeep.vincent@...cle.com>,
        "konrad.wilk@...cle.com" <konrad.wilk@...cle.com>,
        "tglx@...utronix.de" <tglx@...utronix.de>,
        "kanth.ghatraju@...cle.com" <kanth.ghatraju@...cle.com>,
        "joao.m.martins@...cle.com" <joao.m.martins@...cle.com>,
        "liran.alon@...cle.com" <liran.alon@...cle.com>,
        "ak@...ux.intel.com" <ak@...ux.intel.com>,
        "keescook@...gle.com" <keescook@...gle.com>,
        "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>,
        "chris.hyser@...cle.com" <chris.hyser@...cle.com>,
        "tyhicks@...onical.com" <tyhicks@...onical.com>,
        "john.haxby@...cle.com" <john.haxby@...cle.com>,
        "jcm@...hat.com" <jcm@...hat.com>
Subject: Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs
 in mind (for KVM to isolate its guests per CPU)

On 09/24/2018 08:45 AM, Stecklina, Julian wrote:
> I didn't test the version with TLB flushes, because it's clear that the
> overhead is so bad that no one wants to use this.

I don't think we can ignore the vulnerability caused by not flushing 
stale TLB entries. On a mostly idle system, TLB entries hang around long 
enough to make it fairly easy to exploit this. I was able to use the 
additional test in lkdtm module added by this patch series to 
successfully read pages unmapped from physmap by just waiting for system 
to become idle. A rogue program can simply monitor system load and mount 
its attack using ret2dir exploit when system is mostly idle. This brings 
us back to the prohibitive cost of TLB flushes. If we are unmapping a 
page from physmap every time the page is allocated to userspace, we are 
forced to incur the cost of TLB flushes in some way. Work Tycho was 
doing to implement Dave's suggestion can help here. Once Tycho has 
something working, I can measure overhead on my test machine. Tycho, I 
can help with your implementation if you need.

--
Khalid

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.