On 01/05/2018 12:35 PM, Lars Kurth wrote:Hi all, this is a repost of https://blog.xenproject.org/2018/01/04/xen-project-spectremeltdown-faq/ for xen-users/xen-devel. If you have questions, please reply to this thread and we will try and improve the FAQ based on questions. Regards Lars
Thanks for the writeup.The main reason for the reader to get confused is the amount ofdifferent combinations of situations that are possible, which all againhave their own set of vulnerabilities and also their own (maybe evendifferent) set of possibilities to be used as environment for executingan attack.So let's help them by being more explicit.
That sounds reasonable On Intel processors, only 64-bit PV mode guests can attack Xen.
"On Intel processors an attack at Xen using SP3 can only be done by64-bit PV mode guests."
Even if it looks super-redundant, I think keeping explicit information in every sentence is preferable, so they cannot be misinterpreted or accidentally be taken out of context.
Alright: I think I prefer "On Intel processors, only 64-bit PV mode guests can attack Xen using SP3." Guests running in 32-bit PV mode, HVM mode, and PVH mode cannot attack the hypervisor using SP3. However, in 32-bit PV mode, HVM mode, and PVH mode, guest userspaces can attack guest kernels using SP3; so updating guest kernels is advisable.
Interestingly, guest kernels running in 64-bit PV mode are not vulnerable to attack using SP3, because 64-bit PV guests already run in a KPTI-like mode.
Like Juergen already mentioned, additionally: "However, keep in mindthat a succesful attack on the hypervisor can still be used to recoverinformation about the same guest from physical memory."
Good suggestion. = Does Xen have any equivalent to Linux’s KPTI series? =
Linux’s KPTI series is designed to address SP3 only.
This one...For Xen guests, only 64-bit PV guests are affected by SP3.
...should be more explicit. The words "affected" and "impacted" do nottell the reader if it's about being an attacker, or about being thevictim and what is attacked or attacking."For Xen guests, only 64-bit PV guests are able to execute a SP3 attackagainst the hypervisor."
Sounds fine
I will update the blog post sometimes tomorrow or Monday. There were a few further comments, which may be worth rolling into a change
Lars
|