From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-pf1-f200.google.com (mail-pf1-f200.google.com [209.85.210.200]) by kanga.kvack.org (Postfix) with ESMTP id DB3CA6B6899 for ; Mon, 3 Sep 2018 11:36:50 -0400 (EDT) Received: by mail-pf1-f200.google.com with SMTP id a23-v6so378685pfo.23 for ; Mon, 03 Sep 2018 08:36:50 -0700 (PDT) Received: from mga09.intel.com (mga09.intel.com. [134.134.136.24]) by mx.google.com with ESMTPS id d9-v6si18538439pfk.166.2018.09.03.08.36.49 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 03 Sep 2018 08:36:49 -0700 (PDT) Date: Mon, 3 Sep 2018 08:36:41 -0700 From: Andi Kleen Subject: Re: Redoing eXclusive Page Frame Ownership (XPFO) with isolated CPUs in mind (for KVM to isolate its guests per CPU) Message-ID: <20180903153641.GF27886@tassilo.jf.intel.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: owner-linux-mm@kvack.org List-ID: To: Wes Turner Cc: Linus Torvalds , "jsteckli@amazon.de" , David Woodhouse , Konrad Rzeszutek Wilk , "juerg.haefliger@hpe.com" , "deepa.srinivasan@oracle.com" , Jim Mattson , Andrew Cooper , Linux Kernel Mailing List , Boris Ostrovsky , linux-mm , Thomas Gleixner , "joao.m.martins@oracle.com" , "pradeep.vincent@oracle.com" , Khalid Aziz , "kanth.ghatraju@oracle.com" , Liran Alon , Kees Cook , Kernel Hardening , "chris.hyser@oracle.com" , Tyler Hicks , John Haxby , Jon Masters On Sat, Sep 01, 2018 at 06:33:22PM -0400, Wes Turner wrote: > Speaking of pages and slowdowns, > is there a better place to ask this question: > From "'Turning Tables' shared page tables vuln": > """ > 'New "Turning Tables" Technique Bypasses All Windows Kernel Mitigations' > https://www.bleepingcomputer.com/news/security/new-turning-tables-technique-bypasses-all-windows-kernel-mitigations/ > > Furthermore, since the concept of page tables is also used by Apple and > the Linux project, macOS and Linux are, in theory, also vulnerable to this > technique, albeit the researchers have not verified such attacks, as of > yet. > Slides: > https://cdn2.hubspot.net/hubfs/487909/Turning%20(Page)%20Tables_Slides.pdf > Naturally, I took notice and decided to forward the latest scary headline > to this list to see if this is already being addressed? This essentially just says that if you can change page tables you can subvert kernels. That's always been the case, always will be, I'm sure has been used forever by root kits, and I don't know why anybody would pass it off as a "new attack". -Andi