The "special register buffer data sampling" hardware vulnerability
The "special register buffer data sampling" hardware vulnerability
Posted Jun 9, 2020 20:37 UTC (Tue) by cesarb (subscriber, #6266)Parent article: The "special register buffer data sampling" hardware vulnerability
Does this mean that all the work on split lock detection (https://lwn.net/Articles/790464/ and https://lwn.net/Articles/806466/) was for nothing, since even with split lock detection enabled, unprivileged user space can use RDRAND for the same effect?
      Posted Jun 10, 2020 1:15 UTC (Wed)
                               by Paf (subscriber, #91811)
                              [Link] (3 responses)
       
     
    
      Posted Jun 10, 2020 1:50 UTC (Wed)
                               by nivedita76 (subscriber, #121790)
                              [Link] (2 responses)
       
So with mitigation enabled, userspace code can indeed can use RDRAND to lock the memory bus. 
     
    
      Posted Jun 10, 2020 2:11 UTC (Wed)
                               by nivedita76 (subscriber, #121790)
                              [Link] (1 responses)
       
     
    
      Posted Jun 10, 2020 14:51 UTC (Wed)
                               by Paf (subscriber, #91811)
                              [Link] 
       
     
      Posted Jun 10, 2020 18:49 UTC (Wed)
                               by pbonzini (subscriber, #60935)
                              [Link] (7 responses)
       
     
    
      Posted Jun 10, 2020 19:39 UTC (Wed)
                               by mjg59 (subscriber, #23239)
                              [Link] (6 responses)
       
     
    
      Posted Jun 10, 2020 19:48 UTC (Wed)
                               by Cyberax (✭ supporter ✭, #52523)
                              [Link] (4 responses)
       
     
    
      Posted Jun 10, 2020 19:57 UTC (Wed)
                               by mjg59 (subscriber, #23239)
                              [Link] (2 responses)
       
     
    
      Posted Jun 10, 2020 20:12 UTC (Wed)
                               by mjg59 (subscriber, #23239)
                              [Link] (1 responses)
       
     
    
      Posted Jun 10, 2020 20:32 UTC (Wed)
                               by pbonzini (subscriber, #60935)
                              [Link] 
       
In this case it turned out to be a happy accident that the code to mitigate SRBDS from KVM was already implemented, which certainly was a relieve for me compared to ITLB multihit last fall... 
     
      Posted Jun 10, 2020 20:03 UTC (Wed)
                               by pbonzini (subscriber, #60935)
                              [Link] 
       
     
      Posted Jun 10, 2020 20:10 UTC (Wed)
                               by pbonzini (subscriber, #60935)
                              [Link] 
       
     
    The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
The "special register buffer data sampling" hardware vulnerability
      
      Yes, exactly. You have to add the <feature> XML element inside <cpu>; for example:
The "special register buffer data sampling" hardware vulnerability
      
<cpu mode='host-model'>
<feature policy='disable' name='rdrand'/>
<feature policy='disable' name='rdseed'/>
</cpu>
      
          
           