historical-speck.lore.kernel.org archive mirror
 help / color / mirror / Atom feed
* [MODERATED] NX, nested virtualization and arch caps
@ 2019-10-15  9:45 Paolo Bonzini
  2019-10-16  8:15 ` [MODERATED] Re: ***UNCHECKED*** " Joerg Roedel
  0 siblings, 1 reply; 3+ messages in thread
From: Paolo Bonzini @ 2019-10-15  9:45 UTC (permalink / raw)
  To: speck

Right now, the NX patches are not advertising the
ARCH_CAP_PSCHANGE_MC_NO bit to its guests (especially nested
hypervisors).  This is despite KVM's shadow paging will ensure that the
nested hypervisor's EPT pages are 4K in size.

This is because nx_huge_pages is writable.  Therefore, the value of the
parameter could change from Y to N while a guest runs, and then the
nested hypervisor would become vulnerable to the nested guest's bad
behavior.

On the other hand, if the ITLB_MULTIHIT mitigation is disabled, then any
guest is anyway vulnerable to other guests' shenanigans.  Therefore the
nested hypervisor can just ignore ITLB_MULTIHIT altogether, even if it
would then be vulnerable to L2's bad behavior.  And this means we can
unconditionally advertise to nested hypervisors that the processor is
not vulnerable.

Are there any issues with this reasoning?

Thanks,

Paolo

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-10-16  8:45 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-10-15  9:45 [MODERATED] NX, nested virtualization and arch caps Paolo Bonzini
2019-10-16  8:15 ` [MODERATED] Re: ***UNCHECKED*** " Joerg Roedel
2019-10-16  8:45   ` [MODERATED] Re: ***UNCHECKED*** " Joerg Roedel

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).