[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: kfence_protect_page() writing L1TF vulnerable PTE
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On Sun, Dec 11, 2022 at 11:50:39PM +0100, Marco Elver wrote: > On Sun, 11 Dec 2022 at 22:34, Demi Marie Obenour > <demi@xxxxxxxxxxxxxxxxxxxxxx> wrote: > > On Sun, Dec 11, 2022 at 01:15:06PM +0100, Juergen Gross wrote: > > > During tests with QubesOS a problem was found which seemed to be related > > > to kfence_protect_page() writing a L1TF vulnerable page table entry [1]. > > > > > > Looking into the function I'm seeing: > > > > > > set_pte(pte, __pte(pte_val(*pte) & ~_PAGE_PRESENT)); > > > > > > I don't think this can be correct, as keeping the PFN unmodified and > > > just removing the _PAGE_PRESENT bit is wrong regarding L1TF. > > > > > > There should be at least the highest PFN bit set in order to be L1TF > > > safe. > > Could you elaborate what we want to be safe from? The problem is not Linux’s safety, but Xen’s. To prevent PV guests from arbitrarily reading and writing memory, all updates to PV guest page tables must be done via hypercalls. This allows Xen to ensure that a guest can only read from its own memory and that pages used for page tables or segment descriptors are not mapped writable. > KFENCE is only for kernel memory, i.e. slab allocations. The > page-protection mechanism is used to detect memory safety bugs in the > Linux kernel. The page protection does not prevent or mitigate any > such bugs because KFENCE only samples sl[au]b allocations. Normal slab > allocations never change the page protection bits; KFENCE merely uses > them to receive a page fault, upon which we determine either a > use-after-free or out-of-bounds access. After a bug is detected, > KFENCE unprotects the page so that the kernel can proceed "as normal" > given that's the state of things if it had been a normal sl[au]b > allocation. > > https://docs.kernel.org/dev-tools/kfence.html > > From [1] I see: "If an instruction accesses a virtual address for > which the relevant page table entry (PTE) has the Present bit cleared > or other reserved bits set, then speculative execution ignores the > invalid PTE and loads the referenced data if it is present in the > Level 1 Data Cache, as if the page referenced by the address bits in > the PTE was still present and accessible." > > [1] https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html > > This is perfectly fine in the context of KFENCE, as stated above, the > page protection is merely used to detect out-of-bounds and > use-after-free bugs of sampled slab allocations. KFENCE does not > mitigate nor prevent such bugs, because it samples allocations, i.e. > most allocations are still serviced by sl[au]b. It is not fine when running paravirtualized under Xen, though. Xen strictly validates that present PTEs point into a guest’s own memory, but (in the absence of L1TF) allows not-present PTEs to have any value. However, L1TF means that doing so would allow a PV guest to leak memory from Xen or other guests! Therefore, Xen requires that not-present PTEs be L1TF-safe, ensuring that PV guests cannot use L1TF to obtain memory from other guests or the hypervisor. If a guest creates an L1TF-vulnerable PTE, Xen’s behavior depends on whether it has been compiled with shadow paging support. If it has, Xen will transition the guest to shadow paging mode. This works, but comes at a significant performance hit, so you don’t want that. If shadow paging has been disabled at compile time, as is the case in Qubes, Xen simply crashes the guest. dom0 is exempted from these checks by default, because the dom0 kernel is considered trusted. However, this can be changed by a Xen command-line option, so it is not to be relied on. > How can we teach whatever is complaining about L1TF on that KFENCE PTE > modification that KFENCE does not use page protection to stop anyone > from accessing that memory? With current Xen, you can’t. Any not-present PTE must be L1TF-safe on L1TF-vulnerable hardware, and I am not aware of any way to ask Xen if it considers the hardware vulnerable to L1TF. Therefore, KFENCE would need to either not generate L1TF-vulnerable not-present PTEs, or automatically disable itself when running in Xen PV mode. In theory, it ought to be safe for Xen to instead treat not-present L1TF-vulnerable PTEs as if they were present, and apply the same validation that it does for present PTEs. However, the PV memory management code has been involved in several fatal, reliably exploitable PV guest escape vulnerabilities, and I would rather not make it any more complex than it already is. A much better solution would be for KFENCE to use PTE inversion just like the rest of the kernel does. This solves the problem unconditionally, and avoids needing Xen PV specific code. I have a patch that disables KFENCE on Xen PV, but I would much rather see KFENCE fixed, which is why I have not submitted the patch. - - - -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab - - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEdodNnxM2uiJZBxxxsoi1X/+cIsEFAmOWs28ACgkQsoi1X/+c IsEvBQ/+MLAfhKAxmMAto9jII+4SIq6vXHvhNJfC+qyMPCToTI1QLiwGLOAXM7uk nrnFh+eA9Tx1iYJyP6jZpKqWHFLtXNIh+QE+6gag1rMYjCeJyl6Y0bgmxw7EgJ4t uACncw+N72CopWu9Yg2YNH9wahX7EX4/q+3FA2xzsYd/XgXOEVEF9h3vgnzDOVTJ 02/Q4c4P/YH+I0aLkD3lamwdBTeE2f+5h+kDFxib/qu1lHLVbC9Lx45/T2dUoWVa K3uRPAzwwLQcxB1Q8wGHKj7ziEwygqKRoD8QYwMU67OdB0UsTQ+f5hH8JUgevm8V po0T/cQDaAnJi0y9jcjUd4eyeOHZmbzjro+YAqOgkGGhs+TJwhU5VuDHD26z+0g3 dRaunQ7YFWrEFbeAmV0hK39x40nRdR42YRj6Q/uYhZcaORDeG+e5FshyeUesQfDW B9r5Lvl6/V0ldgPHL/AyGFI/fZBUJhju3QyXNLML1xrv19j24Ku+bhKDjxSrHYlJ nvxYo6zFhMkgRxTYNIrZUA70Xn3wDtJwFKGlKNmWRy4Hjfxy2tyIQnp00j+MDseY fftXjlAPxm0am3lYHlp4u3L5hK1aY0l0mCdGjjP7geeEKK9f2Q009uTeywavOkAB bAKQ9VNWrj7SlRhbK86sHi0zYTvNN+tF9/x32jUu1lSz+jyMfLM= =3TnU - - -----END PGP SIGNATURE----- - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEdodNnxM2uiJZBxxxsoi1X/+cIsEFAmOWs/wACgkQsoi1X/+c IsGDew/8DrvkeG5llY9Q9NFXfBPCNeu5WfK2Sbll892izQAl0l+JILKHG7AQqsRf /avO3U5US64acEsL2PqugK1BDDYPK097WNJtV3/nb6IUL+A3UrMtq3a6bqCWMULY FaCTqAe9ESYLS2NA4rqcqsCvGcR0PYM8fALqq+xHUr102rXyo+jGoOxCh6emuImg UittOmEhslRtIJtiDgUHgQkff8xBllztVE1MaDeMIEO2D+uvKWD+7SYli+O3USAj lNKlVPzHAwQnUs9AP++FVz0yVzcoyXcIsi14oFxSHR+EqqacxvtG60iWKcU6I8nr zySMyjlN8rZcq/QpukYFAPkJL63m1zefHBWeLFzNcv5Mrar0L4cWpM+jLZyh/fJE JQ2YuDt8Z5mhrs8KQJBdf96QSgOgkreMQ6IWNnPGiAwIW85wwsU1iJa8AjIEe8PN t4EleqLqsgn9nihBreJZ77f/xKAWKK/VN6FOXGOuFZO/FrvPpP0KAHQpRugMmDZk NOGJKcWfruAZ11HQTFK1qelLg0n2SBSzw5KxKyxntazvx80W+FzwwzJJz2T3z06g 58sCdyXqrzhSv55pfTX94suX+w3pqcwJID/XMjelPtvcVtvosugHmaCEKTHEX5zo QKZRoHELiOymXsy7kSP8NMpiuyfrjAsYFY2NGbTS5Mb6+ApHT2s= =gX1O - -----END PGP SIGNATURE----- -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEdodNnxM2uiJZBxxxsoi1X/+cIsEFAmOWtCMACgkQsoi1X/+c IsGPlQ//QaynWUjFxss7xGDDU3adTawbb5KHgxcaHQKsUCgDMqOYZ6wIm6VeiBgJ OxX14wucGTKVYN0JSMqn1UpJgxVmMtwMTXMuIjz+oTdd3Ab/cQejqGV2ZiiW/KWH Hq3jWqoqXL9R0sMmGmeq2Kyi1+XL78KhWZIkJ4eEKYhRdLIG9/q27EeH3ppdH6Kt AamU0Bq1aatOW3+Y6C+FPjsLrHP16vWZInaoy+UqE0E7B4VcAC2wPcPVbwbF7SJc KP4YaE3W95Zvl7TWxtOWWzZzKP3A6waiyY289+Kf7Xgs2rQOgNnQuR5JEGqxABwZ LfbATY1uT9akgf62IevmGj3694ZPLVfgqr3d7057QfMCZLjAG5ZioIzCe7drCZ+3 91zM0+ykWYIqanab327lpduOkHHSJC0P1Jvzx4yxqo1PvgqhEHhp3jcXS6amCm9e l4RVmAVm+UujZ1vbrTG7PcJgb5jbrtLKInhmYiiXGgS1zhxsty/MUCiy5YgjD5n1 vl+8/8/kiI4el/hjbqUbDjjItDmHn9kVZHfY5G1dT6lHZkNk6NI93IB6EcxZx1af fNoxR904M7Y53yUI1sJpdeOhEsNHUeV5dgqbJxwTxKRuDNu4E89FDvRr3YMSbusk 7nU6+DVJaWRn05lq0lT2HsU401ECx383Pr5/lmvHCRdNuEOTwyo= =jVTg -----END PGP SIGNATURE-----
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |