The "special register buffer data sampling" hardware vulnerability
The mitigation involves more flushing and the serialization of RDRAND. That means a RDRAND instruction will take longer to run, but it also means that RDRAND requires locking across the system, which will slow things considerably if it is executed frequently. There are ways to turn the mitigations off, of course. See this new kernel document for more information.
These fixes are currently queued to be part of the
5.7.2,
5.6.18,
5.4.46,
4.19.128,
4.14.184
4.9.227,
4.4.227, and
3.16.85
stable updates.
Posted Jun 9, 2020 20:37 UTC (Tue)
by cesarb (subscriber, #6266)
[Link] (12 responses)
Does this mean that all the work on split lock detection (https://lwn.net/Articles/790464/ and https://lwn.net/Articles/806466/) was for nothing, since even with split lock detection enabled, unprivileged user space can use RDRAND for the same effect?
Posted Jun 10, 2020 1:15 UTC (Wed)
by Paf (subscriber, #91811)
[Link] (3 responses)
Posted Jun 10, 2020 1:50 UTC (Wed)
by nivedita76 (subscriber, #121790)
[Link] (2 responses)
So with mitigation enabled, userspace code can indeed can use RDRAND to lock the memory bus.
Posted Jun 10, 2020 2:11 UTC (Wed)
by nivedita76 (subscriber, #121790)
[Link] (1 responses)
Posted Jun 10, 2020 14:51 UTC (Wed)
by Paf (subscriber, #91811)
[Link]
Posted Jun 10, 2020 18:49 UTC (Wed)
by pbonzini (subscriber, #60935)
[Link] (7 responses)
Posted Jun 10, 2020 19:39 UTC (Wed)
by mjg59 (subscriber, #23239)
[Link] (6 responses)
Posted Jun 10, 2020 19:48 UTC (Wed)
by Cyberax (✭ supporter ✭, #52523)
[Link] (4 responses)
Posted Jun 10, 2020 19:57 UTC (Wed)
by mjg59 (subscriber, #23239)
[Link] (2 responses)
Posted Jun 10, 2020 20:12 UTC (Wed)
by mjg59 (subscriber, #23239)
[Link] (1 responses)
Posted Jun 10, 2020 20:32 UTC (Wed)
by pbonzini (subscriber, #60935)
[Link]
In this case it turned out to be a happy accident that the code to mitigate SRBDS from KVM was already implemented, which certainly was a relieve for me compared to ITLB multihit last fall...
Posted Jun 10, 2020 20:03 UTC (Wed)
by pbonzini (subscriber, #60935)
[Link]
Posted Jun 10, 2020 20:10 UTC (Wed)
by pbonzini (subscriber, #60935)
[Link]
Posted Jun 10, 2020 2:06 UTC (Wed)
by geofft (subscriber, #59789)
[Link] (3 responses)
The new notable thing about the attack is that the "special registers" are shared across CPU cores, so you can attack one CPU core from another (e.g. an SGX enclave on another core, another customer on the same public cloud hypervisor, etc). Previous attacks required the exploit code to run on the same core as the victim.
Posted Jun 10, 2020 15:33 UTC (Wed)
by jcm (subscriber, #18262)
[Link] (2 responses)
Posted Jun 10, 2020 15:49 UTC (Wed)
by zdzichu (subscriber, #17118)
[Link] (1 responses)
Posted Jun 11, 2020 1:08 UTC (Thu)
by clopez (guest, #66009)
[Link]
Posted Jun 22, 2020 12:59 UTC (Mon)
by intgr (subscriber, #39733)
[Link]
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
Yes, exactly. You have to add the <feature> XML element inside <cpu>; for example:
The "special register buffer data sampling" hardware vulnerability
<cpu mode='host-model'>
<feature policy='disable' name='rdrand'/>
<feature policy='disable' name='rdseed'/>
</cpu>
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
