[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] kfence_protect_page() writing L1TF vulnerable PTE
During tests with QubesOS a problem was found which seemed to be related to kfence_protect_page() writing a L1TF vulnerable page table entry [1]. Looking into the function I'm seeing: set_pte(pte, __pte(pte_val(*pte) & ~_PAGE_PRESENT)); I don't think this can be correct, as keeping the PFN unmodified and just removing the _PAGE_PRESENT bit is wrong regarding L1TF. There should be at least the highest PFN bit set in order to be L1TF safe. Juergen [1]: https://github.com/QubesOS/qubes-issues/issues/7935 Attachment:
OpenPGP_0xB0DE9DD628BF132F.asc Attachment:
OpenPGP_signature
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |