lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Yx8Q1L3jNAJxa84L@nazgul.tnic>
Date:   Mon, 12 Sep 2022 12:58:28 +0200
From:   Borislav Petkov <bp@...en8.de>
To:     Manikandan Jagatheesan <mjagatheesan@...are.com>
Cc:     "peterz@...radead.org" <peterz@...radead.org>,
        "jpoimboe@...nel.org" <jpoimboe@...nel.org>,
        "tglx@...utronix.de" <tglx@...utronix.de>,
        "mingo@...hat.com" <mingo@...hat.com>,
        "dave.hansen@...ux.intel.com" <dave.hansen@...ux.intel.com>,
        "x86@...nel.org" <x86@...nel.org>, "hpa@...or.com" <hpa@...or.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "srivatsa@...il.mit.edu" <srivatsa@...il.mit.edu>,
        Peter Jonasson <pjonasson@...are.com>,
        Yiu Cho Lau <lauyiuch@...are.com>,
        Rajender M <manir@...are.com>,
        Abdul Anshad Azeez <aazees@...are.com>,
        Kodeswaran Kumarasamy <kkumarasamy@...are.com>,
        Rahul Gopakumar <gopakumarr@...are.com>
Subject: Re: Performance Regression in Linux Kernel 5.19

A couple more notes after talking to tglx:

So this works as expected. The threat model where the guest needs
to protect itself from malicious userspace is there so if the guest
emulates a CPU which is affected by retbleed and the hypervisor exposes
SPEC_CTRL, then the guest *should* enable IBRS to flush the RSB.

It is a lot nastier if the guest emulates a CPU which is *not* affected
by retbleed but the host uarch is - then the guest will be vulnerable
and it would not even warn about it! So people should be careful what
they do there.

In addition, if the guest trusts its userspace, it might disable IBRS
in order not to suffer the penalty but that's left to the guest owner.
The default setting has to be secure.

HTH.

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ