Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3404750imm; Mon, 4 Jun 2018 03:05:06 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKE+sWNBsL8mFTM1GviKV0bwKCp9sha9NU6LcsL7jP0PuAX5hbqMYyJfDBKcPE9Ncjifowy X-Received: by 2002:a65:654a:: with SMTP id a10-v6mr16566861pgw.107.1528106706751; Mon, 04 Jun 2018 03:05:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528106706; cv=none; d=google.com; s=arc-20160816; b=k3rSGBvCqpZ8UIVe5ziYvFm4M90eM0GzWA2S91VcGpd0y+C3Af8HJv72dRM3zOC461 zcGBPdys67YQGhgbz0bm5ytMDqRz88MlBJEDyJ+lSPuoE7D9zd2lQkFB+wG9fpjWZ9QE Mc+IarSskmT0wGyJRBHFnqs6kF6VmjGGdb0nDoOceL2sP2MxWCQrAcz+HWHO5Uu8a11N vDZi9EqmsqjKETiq7SOLr/wEze5Q7rHtds525wZbV485WBpiJc68HPK6R3SbzxIMEcG+ cbg+3i0CF9TMEoOuENYY8nmAEidNhg7Rj5CieAUDkcdTDwz83fDMoRY9ZO9qWZJu/mCq KxJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:openpgp:from:references:cc:to:subject :arc-authentication-results; bh=W8pHeWf/4eFJVXbpkXWUUdXu13EQQkl8If3zIkMkU9s=; b=ukEH31D8/caKAPc5H9y1iS4DskdaPECm2uCpQWDkvIX1IuG82KKA0iTmmXsgeM6wKn 8btgFmz/g2lv91IorugDPOHyW1EzCaeUjGxS8fEGnYykO/SgDbNlaekPGJEWh0LuuWs1 HXfoCpUVEM+4ZAHkxUTzuVJbDrFO2q4ZBw1BMasQtKUZswR1w0IJiZULyZJ2vlGXPquk 0fj8HrBkSB5QIEShKxxJDD/TpMpYWs/VWPLoLBIdgmOiK661h+K6eZNxzo9xG7EPTW16 TNlt5BGa0MPrdD9XvZy5bU7e1RpYYuGlGFOOY2cQLn5r78MUdsfYRxTKlcmVlDkOgIi/ UeHw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l192-v6si15841941pge.286.2018.06.04.03.04.52; Mon, 04 Jun 2018 03:05:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753056AbeFDKCo (ORCPT + 99 others); Mon, 4 Jun 2018 06:02:44 -0400 Received: from mout1.freenet.de ([195.4.92.91]:39524 "EHLO mout1.freenet.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753041AbeFDKCl (ORCPT ); Mon, 4 Jun 2018 06:02:41 -0400 Received: from [195.4.92.140] (helo=mjail0.freenet.de) by mout1.freenet.de with esmtpa (ID andihartmann@freenet.de) (port 25) (Exim 4.90_1 #2) id 1fPmJy-00025u-Uy; Mon, 04 Jun 2018 12:02:38 +0200 Received: from [::1] (port=51910 helo=mjail0.freenet.de) by mjail0.freenet.de with esmtpa (ID andihartmann@freenet.de) (Exim 4.90_1 #2) id 1fPmJy-0005ip-Qy; Mon, 04 Jun 2018 12:02:38 +0200 Received: from mx5.freenet.de ([195.4.92.15]:33720) by mjail0.freenet.de with esmtpa (ID andihartmann@freenet.de) (Exim 4.90_1 #2) id 1fPmHw-0001N5-2j; Mon, 04 Jun 2018 12:00:32 +0200 Received: from p200300de53d71800505400fffe15ac42.dip0.t-ipconnect.de ([2003:de:53d7:1800:5054:ff:fe15:ac42]:47940 helo=mail.maya.org) by mx5.freenet.de with esmtpsa (ID andihartmann@freenet.de) (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (port 465) (Exim 4.90_1 #2) id 1fPmHv-0002ij-Ut; Mon, 04 Jun 2018 12:00:32 +0200 Received: internal info suppressed Subject: Re: Spectre mitigation doesn't seem to work at all?! To: Mark Rutland Cc: Peter Zijlstra , LKML References: <141672d1-8dcb-9a84-7f8f-60c7a2c58b07@01019freenet.de> <20180604081502.GE12258@hirez.programming.kicks-ass.net> <20180604091931.sziimdeei54jgwzn@salmiak> From: Andreas Hartmann Openpgp: preference=signencrypt Autocrypt: addr=andihartmann@01019freenet.de; keydata= xsDiBDz/vtQRBAC+OSpes1p57fA8ENLYy3Nl/CpEvtRoDdhy7DPyc1+adE57vpK52naRfaZB f0RSMvIZwJYggMio+emiN5Du7kL9y2IEjmHBvp/1x68dEwswHP9X4hJmHmyOJL3IB2WsvEdh QF97913bWX34MYCeuOoSJ1OWvBLGfNs0zv70HOTfJwCgricyy8N1itEryLwoeu5HWz0SmDED /2IiuDhPZ332i0Ylp40RQb2Wb0xBvpscVeRZDItsYYbJ/Sgmso1sn93sFFWmmrvGUyg3MNCt +u+7P8Wg3VXte8cHbNwdzNtXHTfYyTcgZXC4xJN2akZt4pdR531mXyP2kFxmKtAEmW6bNpvV oNnkgZVWvoT4BHLloLzA62JUEgFJA/9dHilAVS3Ezv5ECB02Lt2vNNzMvPlyNbxBhWnrb6VC mFMCRg9bOK2io1zYb8C4gEpJ33wl8hEBxOWfCOEEKesAUCjViosNvxqGNtGWjk5p1O2QBWE2 D6u5+itACQRqhmmgNl+dK6Of2yGG9GxOYWozIELEfL9ZB4xQ7A2tDFR0Zs1HQW5kcmVhcyBI YXJ0bWFubiAod2VpbCBkZXIgUmVjaG5lciBuZXUgaGVpc3N0KSA8YW5kcmVhc0BkdWFsYy5t YXlhLm9yZz7CYAQTEQIAIAUCTMsY3gIbAwYLCQgHAwIEFQIIAwQWAgMBAh4BAheAAAoJEBhU mcTgYeNVT1QAoJ4cJ2jl6Jgmi+PmWCXPk4m8lgAGAKCjkxgK/PjE3+cNsLa/xEpReqYwRs7A TQQ8/77WEAQAqBBex8oxPC1srpaSFbq8NCM/Gy7SKucKsQPqG/De46WQESbmnMElVft2xCBC rOJ7E02k10h/twe0yQnNdXMJDMDM0w0EEyX9ljekIr3SFbXpU2S4wUl3C6CW2hizUgOyLsg0 chpfGMB9+wiVycyjZahafoc14wuuDj5BqWEOCccAAwcD/14lh1PTPKx4hs7ITtFZh5TI6+5f xAWIBBUeQL+GEt+CKwyNc/hWp8YTPJ3SAedmDrEMX+2yPO95KeIfg6bnnIVvI/aTR/vJFsWK GKMx+KaKx+IEwuhCpNIMUASpJWRvVlo3lMIvqAMJIBj79uKq/X9fppblcJst29QVO6aWf3Gh wkYEGBECAAYFAjz/vtYACgkQGFSZxOBh41VBAgCfZRiPCQ+jNvdT5iR2fEblqTtBrF0An0nb M8B1Lpkm44214BbtIQKneVrY Message-ID: <9a977dda-c6c8-1193-58f8-d51d135e0d8a@01019freenet.de> Date: Mon, 4 Jun 2018 12:00:28 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.8.0 MIME-Version: 1.0 In-Reply-To: <20180604091931.sziimdeei54jgwzn@salmiak> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.7 required=5.0 tests=ALL_TRUSTED,PLING_QUERY autolearn=no autolearn_force=no version=3.4.0 X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on mail.maya.org X-Spam-score: -3.1 X-Spamreport: Action: no action Symbol: MIME_GOOD(-0.10) Symbol: MID_RHS_MATCH_FROM(0.00) Symbol: FROM_EQ_ENVFROM(0.00) Symbol: RCVD_VIA_SMTP_AUTH(0.00) Symbol: NEURAL_HAM(-3.00) Symbol: FROM_HAS_DN(0.00) Symbol: RCPT_COUNT_THREE(0.00) Symbol: SUBJECT_ENDS_EXCLAIM(0.00) Symbol: RCVD_COUNT_TWO(0.00) Symbol: RCVD_TLS_ALL(0.00) Symbol: TO_DN_ALL(0.00) Symbol: TO_MATCH_ENVRCPT_ALL(0.00) Symbol: SUBJECT_HAS_QUESTION(0.00) Symbol: ASN(0.00) Message-ID: 9a977dda-c6c8-1193-58f8-d51d135e0d8a@01019freenet.de X-FN-Spambar: X-Originated-At: 2003:de:53d7:1800:5054:ff:fe15:ac42!47940 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello Mark, On 06/04/2018 at 11:19 AM Mark Rutland wrote: > On Mon, Jun 04, 2018 at 10:50:07AM +0200, Andreas Hartmann wrote: >> Hello Peter, >> >> thanks for your answer! I appreciate it! >> >> On 06/04/2018 at 10:15 AM Peter Zijlstra wrote: >>> On Fri, Jun 01, 2018 at 02:19:38PM +0200, Andreas Hartmann wrote: >>> >>>> I tested the spectre mitigation of different machines and kernels with >>>> https://github.com/crozone/SpectrePoC >>>> >>>> You can see the results below. >>> >>>> My question: Did I miss something? >>> >>> Yes. >>> >>>> Build: ... INTEL_MITIGATION_DISABLED LINUX_KERNEL_MITIGATION_DISABLED >>>> Build: ... INTEL_MITIGATION_DISABLED LINUX_KERNEL_MITIGATION_DISABLED >>>> Build: ... INTEL_MITIGATION_DISABLED LINUX_KERNEL_MITIGATION_DISABLED >>> >>> ^^^^^^^^ ^^^^^^^^ >>> >>> The POC is a v1 on itself. V1 needs to be fixed for every individual >>> executable (worse, for every individual location in the code, and we're >>> still finding them). The kernel mitigation status for v1 only indicates >>> the kernel itself has mitigations (for some locations). >>> >>> The POC is meant to test effectiveness of these mitigations, either the >>> original LFENCE or the dependent instruction thing, but you have to >>> enable one or the other. >> >> Ok, this means every program running on the machine has to care itself >> to be spectre v1 - safe. > > Correct. Primiarily this matters for things like JITs, where untrusted code may > be run in the same address space as sensitive data. > >> A malicious program most probably won't care about that. Therefore, my >> next question is: which memory regions can be exploited by a malicious >> program? The complete physical memory or only the memory provided to the >> malicious program? Should be the latter if this approach should have any >> impact. > > Assuming you have a CPU which is not vulnerable to meltdown / variant-3, or you > have mitigated this, (e.g. with KPTI), a malicious program can only access data > within its own address space. > > Spectre variant-1 alone only gives access to memory in the address space of the > program itself. Thanks Mark! Now I've a better understanding about the effects the different vulnerabilities around Spectre and Meltdown do have and I'm now hopefully able to better estimate them. As I'm mostly using AMD-CPUs (like Ryzen 1 e.g.) for virtualization, I should be secure by default regarding unwanted global memory access from the VM to the host memory, because the Ryzen 1 CPU is not affected by Meltdown at all. Regards, Andreas