lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 10 Jan 2019 12:26:17 +1100 From: Dave Chinner <david@...morbit.com> To: Pankaj Gupta <pagupta@...hat.com> Cc: linux-kernel@...r.kernel.org, kvm@...r.kernel.org, qemu-devel@...gnu.org, linux-nvdimm@...1.01.org, linux-fsdevel@...r.kernel.org, virtualization@...ts.linux-foundation.org, linux-acpi@...r.kernel.org, linux-ext4@...r.kernel.org, linux-xfs@...r.kernel.org, jack@...e.cz, stefanha@...hat.com, dan.j.williams@...el.com, riel@...riel.com, nilal@...hat.com, kwolf@...hat.com, pbonzini@...hat.com, zwisler@...nel.org, vishal.l.verma@...el.com, dave.jiang@...el.com, david@...hat.com, jmoyer@...hat.com, xiaoguangrong.eric@...il.com, hch@...radead.org, mst@...hat.com, jasowang@...hat.com, lcapitulino@...hat.com, imammedo@...hat.com, eblake@...hat.com, willy@...radead.org, tytso@....edu, adilger.kernel@...ger.ca, darrick.wong@...cle.com, rjw@...ysocki.net Subject: Re: [PATCH v3 0/5] kvm "virtio pmem" device On Wed, Jan 09, 2019 at 08:17:31PM +0530, Pankaj Gupta wrote: > This patch series has implementation for "virtio pmem". > "virtio pmem" is fake persistent memory(nvdimm) in guest > which allows to bypass the guest page cache. This also > implements a VIRTIO based asynchronous flush mechanism. Hmmmm. Sharing the host page cache direct into the guest VM. Sounds like a good idea, but..... This means the guest VM can now run timing attacks to observe host side page cache residency, and depending on the implementation I'm guessing that the guest will be able to control host side page cache eviction, too (e.g. via discard or hole punch operations). Which means this functionality looks to me like a new vector for information leakage into and out of the guest VM via guest controlled host page cache manipulation. https://arxiv.org/pdf/1901.01161 I might be wrong, but if I'm not we're going to have to be very careful about how guest VMs can access and manipulate host side resources like the page cache..... Cheers, Dave. -- Dave Chinner david@...morbit.com
Powered by blists - more mailing lists