Meltdown / Spectre Discussion

Status
Not open for further replies.

Jailer

Not strong, but bad
Joined
Sep 12, 2014
Messages
4,977
Intel posts an arse-covering press release a few moments ago...
Of course they did, their stock is taking a hit.....
 
Last edited by a moderator:
Joined
Jan 18, 2017
Messages
525
won't kernel rebuilds still affect AMD hardware even though they are not actually vulnerable to this flaw?

Edit:apparently people are looking to address that as well https://lkml.org/lkml/2017/12/27/2
 
Last edited:

Nick2253

Wizard
Joined
Apr 21, 2014
Messages
1,633

Nick2253

Wizard
Joined
Apr 21, 2014
Messages
1,633

jgreco

Resident Grinch
Joined
May 29, 2011
Messages
18,680
AMD responded to Intel's not-so-subtle nudge that AMD's processors were also susceptible: https://www.barrons.com/articles/amd-says-near-zero-risk-to-its-chips-1515016135

Yeah, well, there's just other undiscovered bugs hanging around out there in the silicon. This effing thing has apparently been around since the days of the Pentium Pro, or 'round about two damn decades, and we're just finding out about it now. Betcha other silicon has similar undiscovered issues.
 
Joined
Apr 9, 2015
Messages
1,258
Which systems are affected by Meltdown?
Desktop, Laptop, and Cloud computers may be affected by Meltdown. More technically, every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). We successfully tested Meltdown on Intel processor generations released as early as 2011. Currently, we have only verified Meltdown on Intel processors. At the moment, it is unclear whether ARM and AMD processors are also affected by Meltdown.

Which systems are affected by Spectre?
Almost every system is affected by Spectre: Desktops, Laptops, Cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, we have verified Spectre on Intel, AMD, and ARM processors.

Looks like everyone is affected in some way. But Intel trying to pass everything off is bad juju.
 

Nick2253

Wizard
Joined
Apr 21, 2014
Messages
1,633
Well spin my nipple nuts and send me to Alaska.
upload_2018-1-3_17-18-3.png

upload_2018-1-3_17-19-34.png
 

Ericloewe

Server Wrangler
Moderator
Joined
Feb 15, 2014
Messages
20,194
Small sigh of relief: Meltdown does not compromise the hypervisor in VMs.

Big gasp of fear: Spectre affects any viable modern CPU and doesn't have obvious solutions.
 

Ericloewe

Server Wrangler
Moderator
Joined
Feb 15, 2014
Messages
20,194

rs225

Guru
Joined
Jun 28, 2014
Messages
878
My read of the Xen advisory says Meltdown does compromise the memory of the hypervisor and other guests without their patch. They were mapping the entire physical memory into the VM(under 5TiB), and relying on the paging protections.

Good news: the Windows patch hasn't turned my desktop to molasses.
 

Ericloewe

Server Wrangler
Moderator
Joined
Feb 15, 2014
Messages
20,194
Apparently, Intel can patch the hard part - Spectre - in microcode, to some extent*. Which makes it that much more confusing that they're not capable of issuing patches for Meltdown.

*Well, they're not fixing it. They're setting things up so that software can avoid some of the behavior, almost certainly with performance costs.
 

rs225

Guru
Joined
Jun 28, 2014
Messages
878
It sounds like Meltdown is OS-patch only(or new chips), while Spectre has partial microcode fix and some recompiling to use special instructions to protect areas of code vulnerable to branch prediction analysis.

I think the difference between the two is that meltdown is stealing data at rest, while Spectre is analyzing the more fluid behavior of instructions in another process. So, change the instructions.
 

JoshDW19

Community Hall of Fame
Joined
May 16, 2016
Messages
1,077
For anyone that's interested, Kris posted a comment on the FreeNAS subreddit in regards to these exploits.

"Rest assured we are all just as eager for a fix as you. We are working with our FreeBSD folks now and will hopefully have a release with the fixes in the near future. One of the bugs in particular is a particularly non-trivial problem and we want to avoid any major performance penalty, so we are trying to make sure it is fixed "right". We'll post more updated information as we have it. Thanks!"

https://www.reddit.com/r/freenas/comments/7o21us/meltdown_and_spectre_concerns/ds7bwui/
 

jgreco

Resident Grinch
Joined
May 29, 2011
Messages
18,680
I wonder who's going to be the first to leave a flaming bag of poop in the doorway at the Intel Museum.
 

jgreco

Resident Grinch
Joined
May 29, 2011
Messages
18,680
For anyone that's interested, Kris posted a comment on the FreeNAS subreddit in regards to these exploits.

Well it isn't really relevant to FreeNAS, except insofar as people will end up paying a performance penalty. FreeNAS systems generally don't have random untrusted code running on them, except perhaps in jails. Unfortunately, the problem still needs to be fixed upstream, where that isn't true, and the upstream fixes will impact FreeNAS downstream.
 

Ericloewe

Server Wrangler
Moderator
Joined
Feb 15, 2014
Messages
20,194
One interesting possibility is to effectively trust non-jailed processes while treating jailed processes to their own, sanitized page tables.

It sounds like Meltdown is OS-patch only(or new chips), while Spectre has partial microcode fix and some recompiling to use special instructions to protect areas of code vulnerable to branch prediction analysis.

I think the difference between the two is that meltdown is stealing data at rest, while Spectre is analyzing the more fluid behavior of instructions in another process. So, change the instructions.
Well, Meltdown is a straightforward "hey, load the address given by whatever's at this other address" scheme that results in many non-AMD CPUs actually going far enough to load it into cache, regardless of whether it's meant to be accessible. It's then leaked from the cache by a timing attack.

Spectre seems to mostly focus (for now) on branch prediction, poisoning the branch predictor to take (or not) branches into regions that are to be leaked, causing interesting regions of memory to be loaded into cache - but with some elbow grease, this can be done by a process that does have the right to read said region. Again, the leak then happens through a cache timing attack.

Now that I think about it, the reason Meltdown probably doesn't get a microcode patch is likely to be a lack of internal registers to keep track of prefetches that haven't been validated yet. Lacking that information, large sections of the cache would probably need to be invalidated, causing significant slowdown in memory accesses.
 
Status
Not open for further replies.
Top