Date: Fri, 05 Jan 2018 18:30:14 -0500 From: Eric McCorkle <eric@metricspace.net> To: Warner Losh <imp@bsdimp.com> Cc: "freebsd-hackers@freebsd.org" <freebsd-hackers@freebsd.org>, "freebsd-arch@freebsd.org" <freebsd-arch@freebsd.org> Subject: Re: A more general possible meltdown/spectre countermeasure Message-ID: <9268C1F8-AD68-4B20-94D7-96B5FD6589B5@metricspace.net> In-Reply-To: <CANCZdfq8UZWXdd9fc3yDTETPrCOYYojKyAzyjywrkG=d8OA6Jg@mail.gmail.com> References: <c98b7ac3-26f0-81ee-2769-432697f876e5@metricspace.net> <33bcd281-4018-7075-1775-4dfcd58e5a48@metricspace.net> <CANCZdfq2iHErm-pPU1cQ35zrvfdVFPBi1sKYshOyyWUgm3VHBA@mail.gmail.com> <4ec1f3b1-f4b0-80ab-0e68-0dd679dd9e37@metricspace.net> <CANCZdfo2MPbYxrOyuwSO82FAx9ur_kxgwUijoZCaRL2MDxFxFQ@mail.gmail.com> <72f6097e-c71e-b53f-6885-cfe5a5a56586@metricspace.net> <CANCZdfoYY5ACwbT0gUW-u=%2BHyG-Y2McoN%2B%2BNZZvqED=wU5MEUA@mail.gmail.com> <b4f8b84c-88f4-0b03-40c8-7fa07a496e26@metricspace.net> <CANCZdfq8UZWXdd9fc3yDTETPrCOYYojKyAzyjywrkG=d8OA6Jg@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Ah, superpages=2E I wouldn't think so=2E The cpu still has to do a page tab= le walk (just stopping at the top level page table), and would discover tha= t it's not accessible=2E On January 5, 2018 6:24:14 PM EST, Warner Losh <imp@bsdimp=2Ecom> wrote: >I mean the mappings we have in the kernel that map all of memory to a >specific page using 512GB pages in >sys/amd64/amd64/pmap=2Ec:create_pagetables=2E This allows us to map any P= A >to a >VA with simple math rather than a page table walk=2E > >Warner > >On Fri, Jan 5, 2018 at 4:10 PM, Eric McCorkle <eric@metricspace=2Enet> >wrote: > >> I'm not sure what you mean by direct map=2E Do you mean TLB? >> >> On 01/05/2018 18:08, Warner Losh wrote: >> > Wouldn't you have to also unmap it from the direct map for this to >be >> > effective? >> > >> > Warner >> > >> > >> > On Fri, Jan 5, 2018 at 3:31 PM, Eric McCorkle <eric@metricspace=2Enet >> > <mailto:eric@metricspace=2Enet>> wrote: >> > >> > Well, the only way to find out would be to try it out=2E >> > >> > However, unless I'm missing something, if you're trying to pull >a >> > meltdown attack, you try and fetch from the kernel=2E If that >location >> > isn't cached (or if your cache is physically indexed), you need >the >> > physical address (otherwise you don't know where to look), and >thus >> have >> > to go through address translation, at which point you detect >that the >> > page isn't accessible and fault=2E In the mean time, you can't >> > speculatively execute any of the operations that load up the >> > side-channels, because you don't have the sensitive data=2E >> > >> > The reason you can pull off a meltdown attack at all is that a >> > virtually-indexed cache lets you get the data in parallel with >> address >> > translation (breaking the dependency between address >translation and >> > fetching data), which takes 1000s of cycles for a TLB miss, >during >> which >> > you have the data and can launch a whole bunch of transient >ops=2E >> > >> > Again, these are uncharted waters we're in; so it's entirely >possible >> > I'm missing something here=2E >> > >> > On 01/05/2018 17:22, Warner Losh wrote: >> > > While you might be right, I've seen no indication that a >cache miss >> > > would defeat these attacks in the public and non-public data >I've >> looked >> > > at, even though a large number of alternatives to the >published >> > > workarounds have been discussed=2E I'm therefore somewhat >skeptical >> this >> > > would be effective=2E I'm open, however, to data that changes >that >> > > skepticism=2E=2E=2E >> > > >> > > Warner >> > > >> > > On Fri, Jan 5, 2018 at 3:15 PM, Eric McCorkle < >> eric@metricspace=2Enet <mailto:eric@metricspace=2Enet> >> > > <mailto:eric@metricspace=2Enet <mailto:eric@metricspace=2Enet>>= > >> wrote: >> > > >> > > Right, but you have to get the value "foo" into the >pipeline >> in order >> > > for it to affect the side-channels=2E This technique >attempts >> to stop >> > > that from happening=2E >> > > >> > > Unless I made a mistake, non-cached memory reads force >address >> > > translation to happen first, which detects faults and >blocks >> the >> > > meltdown attack=2E >> > > >> > > It also stops spectre with very high probability, as it's >very >> unlikely >> > > that an uncached load will arrive before the speculative >> thread gets >> > > squashed=2E >> > > >> > > On 01/05/2018 17:10, Warner Losh wrote: >> > > > I think this is fatally flawed=2E >> > > > >> > > > The side channel is the cache=2E Not the data at risk=2E >> > > > >> > > > Any mapped memory, cached or not, can be used to >influence >> the cache=2E >> > > > Storing stuff in uncached memory won't affect the side >> channel one bit=2E >> > > > >> > > > Basically, all attacks boil down to tricking the >processor, >> at elevated >> > > > privs, to doing something like >> > > > >> > > > a =3D foo[offset]; >> > > > >> > > > where foo + offset are designed to communicate >information >> by populating >> > > > a cache line=2E offset need not be cached itself and can >be >> the result of >> > > > simple computations that depend on anything accessible >at >> all in the kernel=2E >> > > > >> > > > Warner >> > > > >> > > > On Fri, Jan 5, 2018 at 3:02 PM, Eric McCorkle < >> eric@metricspace=2Enet <mailto:eric@metricspace=2Enet> >> > <mailto:eric@metricspace=2Enet <mailto:eric@metricspace=2Enet>> >> > > > <mailto:eric@metricspace=2Enet ><mailto:eric@metricspace=2Enet> >> > <mailto:eric@metricspace=2Enet <mailto:eric@metricspace=2Enet>>>> >wrote: >> > > > >> > > > Re-posting to -hackers and -arch=2E I'm going to >start >> working on >> > > > something like this over the weekend=2E >> > > > >> > > > -------- Forwarded Message -------- >> > > > Subject: A more general possible meltdown/spectre >> countermeasure >> > > > Date: Thu, 4 Jan 2018 23:05:40 -0500 >> > > > From: Eric McCorkle <eric@metricspace=2Enet <mailto: >> eric@metricspace=2Enet> >> > > <mailto:eric@metricspace=2Enet ><mailto:eric@metricspace=2Enet>> >> > <mailto:eric@metricspace=2Enet <mailto:eric@metricspace=2Enet> >> > > <mailto:eric@metricspace=2Enet ><mailto:eric@metricspace=2Enet>>>> >> > > > To: freebsd-security@freebsd=2Eorg <mailto: >> freebsd-security@freebsd=2Eorg> >> > > <mailto:freebsd-security@freebsd=2Eorg ><mailto:freebsd-security@ >> freebsd=2Eorg>> >> > > > <mailto:freebsd-security@freebsd=2Eorg <mailto: >> freebsd-security@freebsd=2Eorg> >> > > <mailto:freebsd-security@freebsd=2Eorg ><mailto:freebsd-security@ >> freebsd=2Eorg>>> >> > <freebsd-security@freebsd=2Eorg ><mailto:freebsd-security@freebsd=2Eorg> >> > > <mailto:freebsd-security@freebsd=2Eorg ><mailto:freebsd-security@ >> freebsd=2Eorg>> >> > > > <mailto:freebsd-security@freebsd=2Eorg >> > <mailto:freebsd-security@freebsd=2Eorg> >> > > <mailto:freebsd-security@freebsd=2Eorg >> > <mailto:freebsd-security@freebsd=2Eorg>>>> >> > > > >> > > > I've thought more about how to deal with >> > meltdown/spectre, and >> > > I have an >> > > > idea I'd like to put forward=2E However, I'm still >in >> > something >> > > of a >> > > > panic mode, so I'm not certain as to its >effectiveness=2E >> > > Needless to >> > > > say, I welcome any feedback on this, and I may be >> completely >> > > off-base=2E >> > > > >> > > > I'm calling this a "countermeasure" as opposed to a >> > > "mitigation", as >> > > > it's something that requires modification of code >as >> > opposed to a >> > > > drop-in patch=2E >> > > > >> > > > =3D=3D Summary =3D=3D >> > > > >> > > > Provide a kernel and userland API by which memory >> allocation >> > > can be done >> > > > with extended attributes=2E In userland, this could >be >> > > accomplished by >> > > > extending MMAP flags, and I could imagine a >> > > malloc-with-attributes flag=2E >> > > > In kernel space, this must already exist, as >drivers >> > need to >> > > allocate >> > > > memory with various MTRR-type attributes set=2E >> > > > >> > > > The immediate aim here is to store sensitive >information >> > that must >> > > > remain memory-resident in non-cacheable memory >locations >> > (or, >> > > if more >> > > > effective attribute combinations exist, using those >> > instead)=2E >> > > See the >> > > > rationale for the argument why this should work=2E >> > > > >> > > > Assuming the rationale holds, then the attack >surface >> should >> > > be greatly >> > > > reduced=2E Attackers would need to grab sensitive >data >> > out of stack >> > > > frames or similar locations if/when it gets copied >there >> for >> > > faster use=2E >> > > > Moreover, if this is done right, it could dovetail >> > nicely into a >> > > > framework for storing and processing sensitive >assets in >> > more >> > > secure >> > > > hardware[0] (like smart cards, the FPGAs I posted >> > earlier, or >> > > other >> > > > options)=2E >> > > > >> > > > The obvious downside is that you take a performance >hit >> > > storing things >> > > > in non-cacheable locations, especially if you plan >on >> > doing heavy >> > > > computation in that memory (say, >encryption/decryption)=2E >> > > However, this >> > > > is almost certainly going to be less than the >projected >> > 30-50% >> > > > performance hit from other mitigations=2E Also, this >> > technique >> > > should >> > > > work against spectre as well as meltdown (assuming >the >> > > rationale holds)=2E >> > > > >> > > > The second downside is that you have to modify code >for >> this >> > > to work, >> > > > and you have to be careful not to keep copies of >> sensitive >> > > information >> > > > around too long (this gets tricky in userland, >where you >> > might get >> > > > interrupted and switched out)=2E >> > > > >> > > > >> > > > [0]: Full disclosure, enabling open hardware >> implementations >> > > of this >> > > > kind of thing is something of an agenda of mine=2E >> > > > >> > > > =3D=3D Rationale =3D=3D >> > > > >> > > > (Again, I'm tired, rushed, and somewhat panicked so >my >> logic >> > > could be >> > > > faulty at any point, so please point it out if it >is) >> > > > >> > > > The rationale for why this should work relies on >> > assumptions about >> > > > out-of-order pipelines that cannot be guaranteed to >> > hold, but are >> > > > extremely likely to be true=2E >> > > > >> > > > As background, these attacks depend on out-of-order >> > execution >> > > performing >> > > > operations that end up affecting cache and >> branch-prediction >> > > state, >> > > > ultimately storing information about sensitive data >in >> these >> > > > side-channels before the fault conditions are >detected >> and >> > > acted upon=2E >> > > > I'll borrow terminology from the paper, using >"transient >> > > instructions" >> > > > to refer to speculatively executed instructions >that will >> > > eventually be >> > > > cancelled by a fault=2E >> > > > >> > > > These attacks depend entirely on transient >instructions >> > being >> > > able to >> > > > get sensitive information into the processor core >and >> then >> > > perform some >> > > > kind of instruction on them before the fault >condition >> > cancels >> > > them=2E >> > > > Therefore, anything that prevents them from doing >this >> > > *should* counter >> > > > the attack=2E If the actual sensitive data never >makes it >> to >> > > the core >> > > > before the fault is detected, the dependent memory >> > > accesses/branches >> > > > never get executed and the data never makes it to >the >> > > side-channels=2E >> > > > >> > > > Another assumption here is that CPU architects are >going >> to >> > > want to >> > > > squash faulted instructions ASAP and stop issuing >along >> > those >> > > > speculative branches, so as to reclaim execution >units=2E >> So >> > > I'm assuming >> > > > once a fault comes back from address translation, >then >> > transient >> > > > execution stops dead=2E >> > > > >> > > > Now, break down the cases for whether the address >> containing >> > > sensitive >> > > > data is in cache and TLB or not=2E (I'm assuming >here that >> > > caches are >> > > > virtually-indexed, which enables cache lookups to >bypass >> > address >> > > > translation=2E) >> > > > >> > > > * In cache, in TLB: You end up basically racing >between >> the >> > > cache and >> > > > TLB, which will very likely end up detecting the >fault >> > before >> > > the data >> > > > arrives, but at the very worst, you get one or two >> cycles of >> > > transient >> > > > instruction execution before the fault=2E >> > > > >> > > > * In cache, not in TLB: Virtually-indexed tagged >means >> > you get >> > > a cache >> > > > lookup racing a page-table walk=2E The cache lookup >beats >> the >> > > page table >> > > > walk by potentially hundreds (maybe thousands) of >cycles, >> > > giving you a >> > > > bunch of transient instructions before a fault gets >> > > triggered=2E This is >> > > > the main attack case=2E >> > > > >> > > > * Not in cache, in TLB: Memory access requires >address >> > > translation, >> > > > which comes back almost immediately as a fault=2E >> > > > >> > > > * Not in cache, not in TLB: You have to do a page >table >> walk >> > > before you >> > > > can fetch the location, as you have to go out to >physical >> > > memory (and >> > > > therefore need a physical address)=2E The page table >walk >> > will >> > > come back >> > > > with a fault, stopping the attack=2E >> > > > >> > > > So, unless I'm missing something here, both >non-cached >> cases >> > > defeat the >> > > > meltdown attack, as you *cannot* get the data >unless you >> do >> > > address >> > > > translation first (and therefore detect faults)=2E >> > > > >> > > > As for why this defeats the spectre attack, the >logic is >> > > similar: you've >> > > > jumped into someone else's executable code, hoping >to >> > scoop up >> > > enough >> > > > information into your branch predictor before the >fault >> > kicks >> > > you out=2E >> > > > However, to capture anything about sensitive >information >> > in your >> > > > side-channels, the transient instructions need to >> > actually get >> > > it into >> > > > the core before a fault gets detected=2E The same >case >> > analysis >> > > as above >> > > > applies, so you never actually get the sensitive >info >> > into the >> > > core >> > > > before a fault comes back and you get squashed=2E >> > > > >> > > > >> > > > [1]: A physically-indexed cache would be largely >immune >> to >> > > this attack, >> > > > as you'd have to do address translation before >doing a >> cache >> > > lookup=2E >> > > > >> > > > >> > > > I have some ideas that can build on this, but I'd >like >> > to get some >> > > > feedback first=2E >> > > > _______________________________________________ >> > > > freebsd-security@freebsd=2Eorg >> > <mailto:freebsd-security@freebsd=2Eorg> >> > > <mailto:freebsd-security@freebsd=2Eorg >> > <mailto:freebsd-security@freebsd=2Eorg>> >> > > <mailto:freebsd-security@freebsd=2Eorg >> > <mailto:freebsd-security@freebsd=2Eorg> >> > > <mailto:freebsd-security@freebsd=2Eorg ><mailto:freebsd-security@ >> freebsd=2Eorg>>> >> > > > mailing list >> > > > https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebs= d- >> security >> > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-security> >> > > =20 ><https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-security >> > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-security>= > >> > > > =20 ><https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd- >> security >> > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-security> >> > > =20 ><https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-security >> > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-security>= >> >> > > > To unsubscribe, send any mail to >> > > > "freebsd-security-unsubscribe@freebsd=2Eorg >> > <mailto:freebsd-security-unsubscribe@freebsd=2Eorg> >> > > <mailto:freebsd-security-unsubscribe@freebsd=2Eorg >> > <mailto:freebsd-security-unsubscribe@freebsd=2Eorg>> >> > > > <mailto:freebsd-security-unsubscribe@freebsd=2Eorg >> > <mailto:freebsd-security-unsubscribe@freebsd=2Eorg> >> > > <mailto:freebsd-security-unsubscribe@freebsd=2Eorg >> > <mailto:freebsd-security-unsubscribe@freebsd=2Eorg>>>" >> > > > _______________________________________________ >> > > > freebsd-arch@freebsd=2Eorg ><mailto:freebsd-arch@freebsd=2E >> org> >> > <mailto:freebsd-arch@freebsd=2Eorg ><mailto:freebsd-arch@freebsd=2Eorg>> >> > > <mailto:freebsd-arch@freebsd=2Eorg >> > <mailto:freebsd-arch@freebsd=2Eorg> ><mailto:freebsd-arch@freebsd=2Eorg >> > <mailto:freebsd-arch@freebsd=2Eorg>>> >> > > mailing list >> > > > =20 >https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-arch >> > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-arch> >> > > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-arc= h >> > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-arch>> >> > > > =20 ><https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-arch >> > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-arch> >> > > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-arc= h >> > <https://lists=2Efreebsd=2Eorg/mailman/listinfo/freebsd-arch>>> >> > > > To unsubscribe, send any mail to >> > > > "freebsd-arch-unsubscribe@freebsd=2Eorg >> > <mailto:freebsd-arch-unsubscribe@freebsd=2Eorg> >> > > <mailto:freebsd-arch-unsubscribe@freebsd=2Eorg >> > <mailto:freebsd-arch-unsubscribe@freebsd=2Eorg>> >> > > > <mailto:freebsd-arch-unsubscribe@freebsd=2Eorg >> > <mailto:freebsd-arch-unsubscribe@freebsd=2Eorg> >> > > <mailto:freebsd-arch-unsubscribe@freebsd=2Eorg >> > <mailto:freebsd-arch-unsubscribe@freebsd=2Eorg>>>" >> > > > >> > > > >> > > >> > > >> > >> > >> --=20 Sent from my Android device with K-9 Mail=2E Please excuse my brevity=2E From owner-freebsd-arch@freebsd.org Sat Jan 6 04:33:28 2018 Return-Path: <owner-freebsd-arch@freebsd.org> Delivered-To: freebsd-arch@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5A4E7EB86CB for <freebsd-arch@mailman.ysv.freebsd.org>; Sat, 6 Jan 2018 04:33:28 +0000 (UTC) (envelope-from ndd@cis.upenn.edu) Received: from fox.seas.upenn.edu (fox.seas.upenn.edu [IPv6:2607:f470:8:64:5ea5::2c]) by mx1.freebsd.org (Postfix) with ESMTP id BB1B57214B for <freebsd-arch@freebsd.org>; Sat, 6 Jan 2018 04:33:27 +0000 (UTC) (envelope-from ndd@cis.upenn.edu) Received: from mail-it0-f48.google.com (mail-it0-f48.google.com [209.85.214.48]) (authenticated bits=0) by fox.seas.upenn.edu (8.15.2/8.14.5) with ESMTPSA id w064XPRr009136 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for <freebsd-arch@freebsd.org>; Fri, 5 Jan 2018 23:33:26 -0500 Received: by mail-it0-f48.google.com with SMTP id b5so3728849itc.3 for <freebsd-arch@freebsd.org>; Fri, 05 Jan 2018 20:33:26 -0800 (PST) X-Gm-Message-State: AKGB3mJlM+Coj92jyotFWIVyk+aCk3Q+UtUHA0dSh/5ifT4IiZ912Lxn 3Z8lINj/QV8vSWGloE/XEJRq2XL49mZDFFJaws5sog== X-Google-Smtp-Source: ACJfBos7DP42kbJk6US/uImtsQr1opuq3pic7I8T0mUJbgDwzX3/S/gQr4UePcKMqgsi5o02rRsCZHue0E3K9UxOKoA= X-Received: by 10.36.40.141 with SMTP id h135mr5120760ith.77.1515213200310; Fri, 05 Jan 2018 20:33:20 -0800 (PST) MIME-Version: 1.0 Received: by 10.2.132.76 with HTTP; Fri, 5 Jan 2018 20:32:59 -0800 (PST) In-Reply-To: <9268C1F8-AD68-4B20-94D7-96B5FD6589B5@metricspace.net> References: <c98b7ac3-26f0-81ee-2769-432697f876e5@metricspace.net> <33bcd281-4018-7075-1775-4dfcd58e5a48@metricspace.net> <CANCZdfq2iHErm-pPU1cQ35zrvfdVFPBi1sKYshOyyWUgm3VHBA@mail.gmail.com> <4ec1f3b1-f4b0-80ab-0e68-0dd679dd9e37@metricspace.net> <CANCZdfo2MPbYxrOyuwSO82FAx9ur_kxgwUijoZCaRL2MDxFxFQ@mail.gmail.com> <72f6097e-c71e-b53f-6885-cfe5a5a56586@metricspace.net> <CANCZdfoYY5ACwbT0gUW-u=+HyG-Y2McoN++NZZvqED=wU5MEUA@mail.gmail.com> <b4f8b84c-88f4-0b03-40c8-7fa07a496e26@metricspace.net> <CANCZdfq8UZWXdd9fc3yDTETPrCOYYojKyAzyjywrkG=d8OA6Jg@mail.gmail.com> <9268C1F8-AD68-4B20-94D7-96B5FD6589B5@metricspace.net> From: Nathan Dautenhahn <ndd@cis.upenn.edu> Date: Fri, 5 Jan 2018 23:32:59 -0500 X-Gmail-Original-Message-ID: <CAPzS-cK0A4EmQR18cCje+S8jppNFBC-FAvTQE6LC_prYvKjAyw@mail.gmail.com> Message-ID: <CAPzS-cK0A4EmQR18cCje+S8jppNFBC-FAvTQE6LC_prYvKjAyw@mail.gmail.com> Subject: Re: A more general possible meltdown/spectre countermeasure To: Eric McCorkle <eric@metricspace.net> Cc: Warner Losh <imp@bsdimp.com>, "freebsd-hackers@freebsd.org" <freebsd-hackers@freebsd.org>, "freebsd-arch@freebsd.org" <freebsd-arch@freebsd.org> Content-Type: text/plain; charset="UTF-8" X-Proofpoint-Virus-Version: vendor=nai engine=5600 definitions=5800 signatures=585085 X-PP-Spam-Details: rule=add_spam_details policy=default score=0 spamscore=0 suspectscore=7 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1410280000 definitions=main-1703040151 X-BeenThere: freebsd-arch@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: Discussion related to FreeBSD architecture <freebsd-arch.freebsd.org> List-Unsubscribe: <https://lists.freebsd.org/mailman/options/freebsd-arch>, <mailto:freebsd-arch-request@freebsd.org?subject=unsubscribe> List-Archive: <http://lists.freebsd.org/pipermail/freebsd-arch/> List-Post: <mailto:freebsd-arch@freebsd.org> List-Help: <mailto:freebsd-arch-request@freebsd.org?subject=help> List-Subscribe: <https://lists.freebsd.org/mailman/listinfo/freebsd-arch>, <mailto:freebsd-arch-request@freebsd.org?subject=subscribe> X-List-Received-Date: Sat, 06 Jan 2018 04:33:28 -0000 No this isn't quite superpages. There is a data structure that is a direct map (DMAP) that deterministically maps all physical pages in the system so that all physical pages are accessible through virtual memory. The DMAP has some simple offset calculations allowing it to find the right virtual address mapping (in the DMAP) for the physical address. The more important observation that Warner makes is that to mitigate the problem you have to make sure you get all aliases to each secret. How many exist for each one? How do you know you get them all? Can a attacker create bogus mappings (like ret2dir attack) and then use the new attacks? Another solution, which would handle the more complex attack above, (I know I'm piggybacking, not sure if that's bad) could be to partition a subset of the kernel address space for secrets, and then map those in only when needed, and flush out when done. I did some work a while back on page table isolation and protection from potentially malicious OSs called the nested kernel. I haven't reviewed these new side-channel attacks in great detail yet, but I'm currently working on pushing fine grained intra-address space isolation that might be a nice solution for easily managing and subsets of kernel data. The paper and associated code etc. is all linked on nestedkernel.org. I think these attacks really motivate the nested kernel approach, although we didn't consider secret protection from side-channels. Cheers, -- :: Nathan Dautenhahn :: -- On Fri, Jan 5, 2018 at 6:30 PM, Eric McCorkle <eric@metricspace.net> wrote: > Ah, superpages. I wouldn't think so. The cpu still has to do a page table walk (just stopping at the top level page table), and would discover that it's not accessible. > > On January 5, 2018 6:24:14 PM EST, Warner Losh <imp@bsdimp.com> wrote: >>I mean the mappings we have in the kernel that map all of memory to a >>specific page using 512GB pages in >>sys/amd64/amd64/pmap.c:create_pagetables. This allows us to map any PA >>to a >>VA with simple math rather than a page table walk. >> >>Warner >> >>On Fri, Jan 5, 2018 at 4:10 PM, Eric McCorkle <eric@metricspace.net> >>wrote: >> >>> I'm not sure what you mean by direct map. Do you mean TLB? >>> >>> On 01/05/2018 18:08, Warner Losh wrote: >>> > Wouldn't you have to also unmap it from the direct map for this to >>be >>> > effective? >>> > >>> > Warner >>> > >>> > >>> > On Fri, Jan 5, 2018 at 3:31 PM, Eric McCorkle <eric@metricspace.net >>> > <mailto:eric@metricspace.net>> wrote: >>> > >>> > Well, the only way to find out would be to try it out. >>> > >>> > However, unless I'm missing something, if you're trying to pull >>a >>> > meltdown attack, you try and fetch from the kernel. If that >>location >>> > isn't cached (or if your cache is physically indexed), you need >>the >>> > physical address (otherwise you don't know where to look), and >>thus >>> have >>> > to go through address translation, at which point you detect >>that the >>> > page isn't accessible and fault. In the mean time, you can't >>> > speculatively execute any of the operations that load up the >>> > side-channels, because you don't have the sensitive data. >>> > >>> > The reason you can pull off a meltdown attack at all is that a >>> > virtually-indexed cache lets you get the data in parallel with >>> address >>> > translation (breaking the dependency between address >>translation and >>> > fetching data), which takes 1000s of cycles for a TLB miss, >>during >>> which >>> > you have the data and can launch a whole bunch of transient >>ops. >>> > >>> > Again, these are uncharted waters we're in; so it's entirely >>possible >>> > I'm missing something here. >>> > >>> > On 01/05/2018 17:22, Warner Losh wrote: >>> > > While you might be right, I've seen no indication that a >>cache miss >>> > > would defeat these attacks in the public and non-public data >>I've >>> looked >>> > > at, even though a large number of alternatives to the >>published >>> > > workarounds have been discussed. I'm therefore somewhat >>skeptical >>> this >>> > > would be effective. I'm open, however, to data that changes >>that >>> > > skepticism... >>> > > >>> > > Warner >>> > > >>> > > On Fri, Jan 5, 2018 at 3:15 PM, Eric McCorkle < >>> eric@metricspace.net <mailto:eric@metricspace.net> >>> > > <mailto:eric@metricspace.net <mailto:eric@metricspace.net>>> >>> wrote: >>> > > >>> > > Right, but you have to get the value "foo" into the >>pipeline >>> in order >>> > > for it to affect the side-channels. This technique >>attempts >>> to stop >>> > > that from happening. >>> > > >>> > > Unless I made a mistake, non-cached memory reads force >>address >>> > > translation to happen first, which detects faults and >>blocks >>> the >>> > > meltdown attack. >>> > > >>> > > It also stops spectre with very high probability, as it's >>very >>> unlikely >>> > > that an uncached load will arrive before the speculative >>> thread gets >>> > > squashed. >>> > > >>> > > On 01/05/2018 17:10, Warner Losh wrote: >>> > > > I think this is fatally flawed. >>> > > > >>> > > > The side channel is the cache. Not the data at risk. >>> > > > >>> > > > Any mapped memory, cached or not, can be used to >>influence >>> the cache. >>> > > > Storing stuff in uncached memory won't affect the side >>> channel one bit. >>> > > > >>> > > > Basically, all attacks boil down to tricking the >>processor, >>> at elevated >>> > > > privs, to doing something like >>> > > > >>> > > > a = foo[offset]; >>> > > > >>> > > > where foo + offset are designed to communicate >>information >>> by populating >>> > > > a cache line. offset need not be cached itself and can >>be >>> the result of >>> > > > simple computations that depend on anything accessible >>at >>> all in the kernel. >>> > > > >>> > > > Warner >>> > > > >>> > > > On Fri, Jan 5, 2018 at 3:02 PM, Eric McCorkle < >>> eric@metricspace.net <mailto:eric@metricspace.net> >>> > <mailto:eric@metricspace.net <mailto:eric@metricspace.net>> >>> > > > <mailto:eric@metricspace.net >><mailto:eric@metricspace.net> >>> > <mailto:eric@metricspace.net <mailto:eric@metricspace.net>>>> >>wrote: >>> > > > >>> > > > Re-posting to -hackers and -arch. I'm going to >>start >>> working on >>> > > > something like this over the weekend. >>> > > > >>> > > > -------- Forwarded Message -------- >>> > > > Subject: A more general possible meltdown/spectre >>> countermeasure >>> > > > Date: Thu, 4 Jan 2018 23:05:40 -0500 >>> > > > From: Eric McCorkle <eric@metricspace.net <mailto: >>> eric@metricspace.net> >>> > > <mailto:eric@metricspace.net >><mailto:eric@metricspace.net>> >>> > <mailto:eric@metricspace.net <mailto:eric@metricspace.net> >>> > > <mailto:eric@metricspace.net >><mailto:eric@metricspace.net>>>> >>> > > > To: freebsd-security@freebsd.org <mailto: >>> freebsd-security@freebsd.org> >>> > > <mailto:freebsd-security@freebsd.org >><mailto:freebsd-security@ >>> freebsd.org>> >>> > > > <mailto:freebsd-security@freebsd.org <mailto: >>> freebsd-security@freebsd.org> >>> > > <mailto:freebsd-security@freebsd.org >><mailto:freebsd-security@ >>> freebsd.org>>> >>> > <freebsd-security@freebsd.org >><mailto:freebsd-security@freebsd.org> >>> > > <mailto:freebsd-security@freebsd.org >><mailto:freebsd-security@ >>> freebsd.org>> >>> > > > <mailto:freebsd-security@freebsd.org >>> > <mailto:freebsd-security@freebsd.org> >>> > > <mailto:freebsd-security@freebsd.org >>> > <mailto:freebsd-security@freebsd.org>>>> >>> > > > >>> > > > I've thought more about how to deal with >>> > meltdown/spectre, and >>> > > I have an >>> > > > idea I'd like to put forward. However, I'm still >>in >>> > something >>> > > of a >>> > > > panic mode, so I'm not certain as to its >>effectiveness. >>> > > Needless to >>> > > > say, I welcome any feedback on this, and I may be >>> completely >>> > > off-base. >>> > > > >>> > > > I'm calling this a "countermeasure" as opposed to a >>> > > "mitigation", as >>> > > > it's something that requires modification of code >>as >>> > opposed to a >>> > > > drop-in patch. >>> > > > >>> > > > == Summary == >>> > > > >>> > > > Provide a kernel and userland API by which memory >>> allocation >>> > > can be done >>> > > > with extended attributes. In userland, this could >>be >>> > > accomplished by >>> > > > extending MMAP flags, and I could imagine a >>> > > malloc-with-attributes flag. >>> > > > In kernel space, this must already exist, as >>drivers >>> > need to >>> > > allocate >>> > > > memory with various MTRR-type attributes set. >>> > > > >>> > > > The immediate aim here is to store sensitive >>information >>> > that must >>> > > > remain memory-resident in non-cacheable memory >>locations >>> > (or, >>> > > if more >>> > > > effective attribute combinations exist, using those >>> > instead). >>> > > See the >>> > > > rationale for the argument why this should work. >>> > > > >>> > > > Assuming the rationale holds, then the attack >>surface >>> should >>> > > be greatly >>> > > > reduced. Attackers would need to grab sensitive >>data >>> > out of stack >>> > > > frames or similar locations if/when it gets copied >>there >>> for >>> > > faster use. >>> > > > Moreover, if this is done right, it could dovetail >>> > nicely into a >>> > > > framework for storing and processing sensitive >>assets in >>> > more >>> > > secure >>> > > > hardware[0] (like smart cards, the FPGAs I posted >>> > earlier, or >>> > > other >>> > > > options). >>> > > > >>> > > > The obvious downside is that you take a performance >>hit >>> > > storing things >>> > > > in non-cacheable locations, especially if you plan >>on >>> > doing heavy >>> > > > computation in that memory (say, >>encryption/decryption). >>> > > However, this >>> > > > is almost certainly going to be less than the >>projected >>> > 30-50% >>> > > > performance hit from other mitigations. Also, this >>> > technique >>> > > should >>> > > > work against spectre as well as meltdown (assuming >>the >>> > > rationale holds). >>> > > > >>> > > > The second downside is that you have to modify code >>for >>> this >>> > > to work, >>> > > > and you have to be careful not to keep copies of >>> sensitive >>> > > information >>> > > > around too long (this gets tricky in userland, >>where you >>> > might get >>> > > > interrupted and switched out). >>> > > > >>> > > > >>> > > > [0]: Full disclosure, enabling open hardware >>> implementations >>> > > of this >>> > > > kind of thing is something of an agenda of mine. >>> > > > >>> > > > == Rationale == >>> > > > >>> > > > (Again, I'm tired, rushed, and somewhat panicked so >>my >>> logic >>> > > could be >>> > > > faulty at any point, so please point it out if it >>is) >>> > > > >>> > > > The rationale for why this should work relies on >>> > assumptions about >>> > > > out-of-order pipelines that cannot be guaranteed to >>> > hold, but are >>> > > > extremely likely to be true. >>> > > > >>> > > > As background, these attacks depend on out-of-order >>> > execution >>> > > performing >>> > > > operations that end up affecting cache and >>> branch-prediction >>> > > state, >>> > > > ultimately storing information about sensitive data >>in >>> these >>> > > > side-channels before the fault conditions are >>detected >>> and >>> > > acted upon. >>> > > > I'll borrow terminology from the paper, using >>"transient >>> > > instructions" >>> > > > to refer to speculatively executed instructions >>that will >>> > > eventually be >>> > > > cancelled by a fault. >>> > > > >>> > > > These attacks depend entirely on transient >>instructions >>> > being >>> > > able to >>> > > > get sensitive information into the processor core >>and >>> then >>> > > perform some >>> > > > kind of instruction on them before the fault >>condition >>> > cancels >>> > > them. >>> > > > Therefore, anything that prevents them from doing >>this >>> > > *should* counter >>> > > > the attack. If the actual sensitive data never >>makes it >>> to >>> > > the core >>> > > > before the fault is detected, the dependent memory >>> > > accesses/branches >>> > > > never get executed and the data never makes it to >>the >>> > > side-channels. >>> > > > >>> > > > Another assumption here is that CPU architects are >>going >>> to >>> > > want to >>> > > > squash faulted instructions ASAP and stop issuing >>along >>> > those >>> > > > speculative branches, so as to reclaim execution >>units. >>> So >>> > > I'm assuming >>> > > > once a fault comes back from address translation, >>then >>> > transient >>> > > > execution stops dead. >>> > > > >>> > > > Now, break down the cases for whether the address >>> containing >>> > > sensitive >>> > > > data is in cache and TLB or not. (I'm assuming >>here that >>> > > caches are >>> > > > virtually-indexed, which enables cache lookups to >>bypass >>> > address >>> > > > translation.) >>> > > > >>> > > > * In cache, in TLB: You end up basically racing >>between >>> the >>> > > cache and >>> > > > TLB, which will very likely end up detecting the >>fault >>> > before >>> > > the data >>> > > > arrives, but at the very worst, you get one or two >>> cycles of >>> > > transient >>> > > > instruction execution before the fault. >>> > > > >>> > > > * In cache, not in TLB: Virtually-indexed tagged >>means >>> > you get >>> > > a cache >>> > > > lookup racing a page-table walk. The cache lookup >>beats >>> the >>> > > page table >>> > > > walk by potentially hundreds (maybe thousands) of >>cycles, >>> > > giving you a >>> > > > bunch of transient instructions before a fault gets >>> > > triggered. This is >>> > > > the main attack case. >>> > > > >>> > > > * Not in cache, in TLB: Memory access requires >>address >>> > > translation, >>> > > > which comes back almost immediately as a fault. >>> > > > >>> > > > * Not in cache, not in TLB: You have to do a page >>table >>> walk >>> > > before you >>> > > > can fetch the location, as you have to go out to >>physical >>> > > memory (and >>> > > > therefore need a physical address). The page table >>walk >>> > will >>> > > come back >>> > > > with a fault, stopping the attack. >>> > > > >>> > > > So, unless I'm missing something here, both >>non-cached >>> cases >>> > > defeat the >>> > > > meltdown attack, as you *cannot* get the data >>unless you >>> do >>> > > address >>> > > > translation first (and therefore detect faults). >>> > > > >>> > > > As for why this defeats the spectre attack, the >>logic is >>> > > similar: you've >>> > > > jumped into someone else's executable code, hoping >>to >>> > scoop up >>> > > enough >>> > > > information into your branch predictor before the >>fault >>> > kicks >>> > > you out. >>> > > > However, to capture anything about sensitive >>information >>> > in your >>> > > > side-channels, the transient instructions need to >>> > actually get >>> > > it into >>> > > > the core before a fault gets detected. The same >>case >>> > analysis >>> > > as above >>> > > > applies, so you never actually get the sensitive >>info >>> > into the >>> > > core >>> > > > before a fault comes back and you get squashed. >>> > > > >>> > > > >>> > > > [1]: A physically-indexed cache would be largely >>immune >>> to >>> > > this attack, >>> > > > as you'd have to do address translation before >>doing a >>> cache >>> > > lookup. >>> > > > >>> > > > >>> > > > I have some ideas that can build on this, but I'd >>like >>> > to get some >>> > > > feedback first. >>> > > > _______________________________________________ >>> > > > freebsd-security@freebsd.org >>> > <mailto:freebsd-security@freebsd.org> >>> > > <mailto:freebsd-security@freebsd.org >>> > <mailto:freebsd-security@freebsd.org>> >>> > > <mailto:freebsd-security@freebsd.org >>> > <mailto:freebsd-security@freebsd.org> >>> > > <mailto:freebsd-security@freebsd.org >><mailto:freebsd-security@ >>> freebsd.org>>> >>> > > > mailing list >>> > > > https://lists.freebsd.org/mailman/listinfo/freebsd- >>> security >>> > <https://lists.freebsd.org/mailman/listinfo/freebsd-security> >>> > > >><https://lists.freebsd.org/mailman/listinfo/freebsd-security >>> > <https://lists.freebsd.org/mailman/listinfo/freebsd-security>> >>> > > > >><https://lists.freebsd.org/mailman/listinfo/freebsd- >>> security >>> > <https://lists.freebsd.org/mailman/listinfo/freebsd-security> >>> > > >><https://lists.freebsd.org/mailman/listinfo/freebsd-security >>> > <https://lists.freebsd.org/mailman/listinfo/freebsd-security>>> >>> > > > To unsubscribe, send any mail to >>> > > > "freebsd-security-unsubscribe@freebsd.org >>> > <mailto:freebsd-security-unsubscribe@freebsd.org> >>> > > <mailto:freebsd-security-unsubscribe@freebsd.org >>> > <mailto:freebsd-security-unsubscribe@freebsd.org>> >>> > > > <mailto:freebsd-security-unsubscribe@freebsd.org >>> > <mailto:freebsd-security-unsubscribe@freebsd.org> >>> > > <mailto:freebsd-security-unsubscribe@freebsd.org >>> > <mailto:freebsd-security-unsubscribe@freebsd.org>>>" >>> > > > _______________________________________________ >>> > > > freebsd-arch@freebsd.org >><mailto:freebsd-arch@freebsd. >>> org> >>> > <mailto:freebsd-arch@freebsd.org >><mailto:freebsd-arch@freebsd.org>> >>> > > <mailto:freebsd-arch@freebsd.org >>> > <mailto:freebsd-arch@freebsd.org> >><mailto:freebsd-arch@freebsd.org >>> > <mailto:freebsd-arch@freebsd.org>>> >>> > > mailing list >>> > > > >>https://lists.freebsd.org/mailman/listinfo/freebsd-arch >>> > <https://lists.freebsd.org/mailman/listinfo/freebsd-arch> >>> > > <https://lists.freebsd.org/mailman/listinfo/freebsd-arch >>> > <https://lists.freebsd.org/mailman/listinfo/freebsd-arch>> >>> > > > >><https://lists.freebsd.org/mailman/listinfo/freebsd-arch >>> > <https://lists.freebsd.org/mailman/listinfo/freebsd-arch> >>> > > <https://lists.freebsd.org/mailman/listinfo/freebsd-arch >>> > <https://lists.freebsd.org/mailman/listinfo/freebsd-arch>>> >>> > > > To unsubscribe, send any mail to >>> > > > "freebsd-arch-unsubscribe@freebsd.org >>> > <mailto:freebsd-arch-unsubscribe@freebsd.org> >>> > > <mailto:freebsd-arch-unsubscribe@freebsd.org >>> > <mailto:freebsd-arch-unsubscribe@freebsd.org>> >>> > > > <mailto:freebsd-arch-unsubscribe@freebsd.org >>> > <mailto:freebsd-arch-unsubscribe@freebsd.org> >>> > > <mailto:freebsd-arch-unsubscribe@freebsd.org >>> > <mailto:freebsd-arch-unsubscribe@freebsd.org>>>" >>> > > > >>> > > > >>> > > >>> > > >>> > >>> > >>> > > -- > Sent from my Android device with K-9 Mail. Please excuse my brevity. > _______________________________________________ > freebsd-hackers@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-hackers > To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9268C1F8-AD68-4B20-94D7-96B5FD6589B5>