From: George Dunlap <george.dunlap@citrix.com>
To: Stefano Stabellini <sstabellini@kernel.org>,
Meng Xu <xumengpanda@gmail.com>
Cc: Lars Kurth <lars.kurth.xen@gmail.com>,
xen-devel <xen-devel@lists.xenproject.org>,
Ian Jackson <ian.jackson@eu.citrix.com>,
committers@xenproject.org
Subject: Re: Impact of HW vulnerabilities & Implications on Security Vulnerability Process
Date: Thu, 8 Sep 2016 10:29:17 +0100 [thread overview]
Message-ID: <e8e7c341-f0bd-9148-efe4-bc3ab724b204@citrix.com> (raw)
In-Reply-To: <alpine.DEB.2.10.1609071339250.2359@sstabellini-ThinkPad-X260>
On 07/09/16 22:02, Stefano Stabellini wrote:
> On Wed, 7 Sep 2016, Meng Xu wrote:
>> On Wed, Sep 7, 2016 at 3:08 PM, Stefano Stabellini
>> <sstabellini@kernel.org> wrote:
>>>
>>> On Wed, 7 Sep 2016, Ian Jackson wrote:
>>>>> Technical
>>>>> =========
>>>>> On the technical front, it would be good to understand whether
>>>>> a) This is a real threat and whether thus, we as a community need to
>>>>> take action
>>>>
>>>> It is unclear what action the Xen upstream community can usefully
>>>> take, other than providing users with information.
>>>>
>>>> But, users with deployments on actual hardware ought to try to find
>>>> out whether they are vulnerable. If they are then they could seek
>>>> replacement non-faulty hardware from their vendor, or take unpleasant
>>>> migitation measures (like switching to HVM, perhaps).
>>>
>>> How difficult is to check for it?
>>>
>>> Is there a simple test, maybe a little executable, that users could use
>>> to find out whether their ram is vulnerable? That would be extremely
>>> valuable.
>>
>> Google does have a github repo to do the rowhammer test:
>> https://github.com/google/rowhammer-test
>
> Nice! It would be good to document this in a Xen Project document
> somewhere.
>
> The code is small enough that we could even consider pulling it in Xen
> and running it at boot time (obviously it would be a kconfig option to
> compile and a xen command line option to run the test). In case of
> failure we could WARN the sysadmin and refuse to continue.
The rowhammer test takes a long time; on the order of an hour or two. I
don't think people would appreciate those kinds of boot times. ;-)
Additionally, the default version in the Google repo randomly corrupts
memory -- potentially including Xen memory. And if you have ECC memory,
the result of an uncorrestable error is often a machine reboot. So
there would be a risk that adding such a test on a vulnerable system
would cause Xen to always reboot; or worse, to boot but after having
corrupted its own data or text segments.
I've been playing around with it, but "unfortunately" both my test
machine and the machine under my desk have ECC RAM. I ran the
double-sided rowhammer test for 3 hours yesterday on the machine under
my desk, and the Linux EDAC driver didn't report any errors corrected.
This could either be because no errors happened, or because the errors
weren't being reported to Linux. If no errors happened, it could be
because I'm not vulnerable, or because the test doesn't work on my hardware.
So unfortunately, there are just too many unknowns at this point to give
useful advice, other than "ECC RAM is probably better than non-ECC RAM".
-George
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
prev parent reply other threads:[~2016-09-08 9:29 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-09-07 15:08 Impact of HW vulnerabilities & Implications on Security Vulnerability Process Lars Kurth
2016-09-07 15:33 ` Ian Jackson
2016-09-07 15:44 ` Jan Beulich
2016-09-07 15:59 ` George Dunlap
2016-09-07 16:05 ` George Dunlap
2016-09-08 11:12 ` Ian Jackson
2016-09-08 11:19 ` Wei Liu
2016-09-08 11:39 ` Lars Kurth
2016-09-07 19:08 ` Stefano Stabellini
2016-09-07 20:33 ` Meng Xu
2016-09-07 21:02 ` Stefano Stabellini
2016-09-07 21:31 ` Andrew Cooper
2016-09-07 22:01 ` Stefano Stabellini
2016-09-08 9:29 ` George Dunlap [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=e8e7c341-f0bd-9148-efe4-bc3ab724b204@citrix.com \
--to=george.dunlap@citrix.com \
--cc=committers@xenproject.org \
--cc=ian.jackson@eu.citrix.com \
--cc=lars.kurth.xen@gmail.com \
--cc=sstabellini@kernel.org \
--cc=xen-devel@lists.xenproject.org \
--cc=xumengpanda@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).