On Mon, Jan 25, 2021 at 04:08:22PM +0800, Like Xu wrote:
Hi Peter,Right, but given there is no atomicity between writing the DS area and
On 2021/1/22 17:56, Peter Zijlstra wrote:
On Fri, Jan 15, 2021 at 10:51:38AM -0800, Sean Christopherson wrote:A weird (malicious) guest would read unmodified PEBS records in the
On Fri, Jan 15, 2021, Andi Kleen wrote:Guest could do a hypercall to fix up the DS area before it tries to read
So there's still a window where the guest could observe the bad counter index,I'm asking about ucode/hardare. Is the "guest pebs buffer write -> PEBS PMI"Of course not.
guaranteed to be atomic?
correct?
it I suppose. Or the HV could expose the index mapping and have the
guest fix up it.
guest PEBS buffer from other vCPUs without the need for hypercall or
index mapping from HV.
Do you see any security issues on this host index leak window?
Adding a little virt crud on top shouldn't be too hard.The patches 13-17 in this version has modified the guest PEBS buffer
to correct the index mapping information in the guest PEBS records.
triggering the PMI (as already established earlier in this thread), a
malicious guest can already access this information, no?