qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Chenyi Qiang <chenyi.qiang@intel.com>
To: Eduardo Habkost <ehabkost@redhat.com>, Xiaoyao Li <xiaoyao.li@intel.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>,
	Marcelo Tosatti <mtosatti@redhat.com>,
	Richard Henderson <richard.henderson@linaro.org>,
	qemu-devel@nongnu.org
Subject: Re: [PATCH v2] i386: Add ratelimit for bus locks acquired in guest
Date: Fri, 23 Apr 2021 09:48:23 +0800	[thread overview]
Message-ID: <6cb71de2-5191-c845-a046-1e17c7291bdd@intel.com> (raw)
In-Reply-To: <20210421151818.3svsnpmch5gswtpe@habkost.net>



On 4/21/2021 11:18 PM, Eduardo Habkost wrote:
> On Wed, Apr 21, 2021 at 10:50:10PM +0800, Xiaoyao Li wrote:
>> On 4/21/2021 10:12 PM, Eduardo Habkost wrote:
>>> On Wed, Apr 21, 2021 at 02:26:42PM +0800, Chenyi Qiang wrote:
>>>> Hi, Eduardo, thanks for your comments!
>>>>
>>>>
>>>> On 4/21/2021 12:34 AM, Eduardo Habkost wrote:
>>>>> Hello,
>>>>>
>>>>> Thanks for the patch.  Comments below:
>>>>>
>>>>> On Tue, Apr 20, 2021 at 05:37:36PM +0800, Chenyi Qiang wrote:
>>>>>> Virtual Machines can exploit bus locks to degrade the performance of
>>>>>> system. To address this kind of performance DOS attack, bus lock VM exit
>>>>>> is introduced in KVM and it will report the bus locks detected in guest,
>>>>>> which can help userspace to enforce throttling policies.
>>>>>>
>>>>>
>>>>> Is there anything today that would protect the system from
>>>>> similar attacks from userspace with access to /dev/kvm?
>>>>>
>>>>
>>>> I can't fully understand your meaning for "similar attack with access to
>>>> /dev/kvm". But there are some similar associated detection features on bare
>>>> metal.
>>>
>>> What I mean is: you say guests can make a performance DoS attack
>>> on the host, and your patch mitigates that.
>>>
>>> What would be the available methods to prevent untrusted
>>> userspace running on the host with access to /dev/kvm from making
>>> a similar DoS attack on the host?
> 
> Thanks for all the clarifications below.  Considering them,
> what's the answer to the question above?
> 

Hi Eduardo,

Just make it more clear.

Bus lock detection contains two sub-features. One is bus lock debug 
exception, and the other is bus lock VM exit.

Bus lock #DB exception can help detect the bus locks acquired in user 
space and bus lock VM exit detects the bus locks insides VMs. To address 
the attacks from non-VM userspace attackers against VM, Bus lock #DB 
exception can help.

The Bus lock #DB exception support 
(https://lore.kernel.org/lkml/20210322135325.682257-3-fenghua.yu@intel.com/) 
extends the  existing kernel command line parameter "split_lock_detect=" 
also applying to non-wb bus lock.
For example, split_lock_detect=fatal will send SIGBUS to the attackers 
once this kind of #DB is detected.

>>>
>>>>
>>>> 1. Split lock detection:https://lore.kernel.org/lkml/158031147976.396.8941798847364718785.tip-bot2@tip-bot2/
>>>> Some CPUs can raise an #AC trap when a split lock is attempted.
>>>
>>> Would split_lock_detect=fatal be enough to prevent the above attacks?
>>
>> NO.
>>
>> There are two types bus lock:
>> 1. split lock - lock on cacheable memory while the memory across two cache
>> lines.
>> 2. non-wb lock - lock on non-writableback memory (you can find it on Intel
>> ISE chapter 8, https://software.intel.com/content/www/us/en/develop/download/intel-architecture-instruction-set-extensions-programming-reference.html)
>>
>> split lock detection can only prevent 1)
>>
>>> Is split_lock_detect=fatal the only available way to prevent them?
>>
>> as above, 2) non-wb lock can be prevented by "non-wb lock disable" feature
> 
> Bus lock VM exit applies to both 1 and 2, correct?
> 
>>
>>>
>>>>
>>>> 2. Bus lock Debug Exception:
>>>> https://lore.kernel.org/lkml/20210322135325.682257-1-fenghua.yu@intel.com/
>>>> The kernel can be notified by an #DB trap after a user instruction acquires
>>>> a bus lock and is executed.
>>>
>>> I see a rate limit option mentioned at the above URL.  Would a
>>> host kernel bus lock rate limit option make this QEMU patch
>>> redundant?
>>>
>>
>> No. Bus lock Debug exception cannot be used to detect the bus lock happens
>> in guest (vmx non-root mode).
>>
>> We have patch to virtualize this feature for guest
>> https://lore.kernel.org/kvm/20210202090433.13441-1-chenyi.qiang@intel.com/
>>
>> that guest will have its own setting of bus lock debug exception on or off.
>>
>> What's more important is that, even we force set the
>> MSR_DEBUGCTL.BUS_LOCK_DETECT for guest, guest still can escape from it.
>> Because bus lock #DB is a trap which is delivered after the instruction
>> completes. If the instruction acquires bus lock subsequently faults e.g.,
>> #PF, then no bus lock #DB generated. But the bus lock does happen.
>>
>> But with bus lock VM exit, even the instruction faults, it will cause a BUS
>> LOCK VM exit.
>>
>>
> 


      parent reply	other threads:[~2021-04-23  1:49 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-04-20  9:37 [PATCH v2] i386: Add ratelimit for bus locks acquired in guest Chenyi Qiang
2021-04-20 16:34 ` Eduardo Habkost
2021-04-21  6:26   ` Chenyi Qiang
2021-04-21 14:12     ` Eduardo Habkost
2021-04-21 14:50       ` Xiaoyao Li
2021-04-21 15:18         ` Eduardo Habkost
2021-04-21 15:33           ` Xiaoyao Li
2021-04-23  1:48           ` Chenyi Qiang [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=6cb71de2-5191-c845-a046-1e17c7291bdd@intel.com \
    --to=chenyi.qiang@intel.com \
    --cc=ehabkost@redhat.com \
    --cc=mtosatti@redhat.com \
    --cc=pbonzini@redhat.com \
    --cc=qemu-devel@nongnu.org \
    --cc=richard.henderson@linaro.org \
    --cc=xiaoyao.li@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).