• Competitor rules

    Please remember that any mention of competitors, hinting at competitors or offering to provide details of competitors will result in an account suspension. The full rules can be found under the 'Terms and Rules' link in the bottom right corner of your screen. Just don't mention competitors in any way, shape or form and you'll be OK.

Intel bug incoming? Meltdown and Spectre exploits

Soldato
Joined
1 Mar 2010
Posts
22,269
Ha ha ha , Intel is ******. They are going to have do complete design aren't they?
as commented the tables is incomplete/inaccurate - missing Arm(Apple+Android phones,rpi,...) if nothing else.

On the plus side that seems to have increased the awareness and number of people posting about how **** Windows update is in 10 on the MS forums.
Indeed, I am surpsrised (non commercial) folks are not postponing the patches untill they are proven - short memories ? what is the rush to install ?

cross posting from Cinema forum - this could potentially be a lucrative exploit
...
( SPECTRE )
Intel seem to have been mute over whether their SGX software guard extension, which is used on Kaby Lake is also compromised by Spectre, such that aacs codes used for 4k uhd movie decode are compromised; or whether this source code was already impregnable. ...
 
Caporegime
Joined
17 Mar 2012
Posts
48,367
Location
ARC-L1, Stanton System
This quote from Linus Torvalds is too funny to let this place pass it by, sorry i can't link it it contains a sweary word that i edited

From Linus Torvalds <>
Date Wed, 3 Jan 2018 15:51:35 -0800
Subject Re: Avoid speculative indirect calls in kernel

On Wed, Jan 3, 2018 at 3:09 PM, Andi Kleen <############> wrote:
> This is a fix for Variant 2 in
> https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
>
> Any speculative indirect calls in the kernel can be tricked
> to execute any kernel code, which may allow side channel
> attacks that can leak arbitrary kernel data.

Why is this all done without any configuration options?

A *competent* CPU engineer would fix this by making sure speculation
doesn't happen across protection domains. Maybe even a L1 I$ that is
keyed by CPL.

I think somebody inside of Intel needs to really take a long hard look
at their CPU's, and actually admit that they have issues instead of
writing PR blurbs that say that everything works as designed.

.. and that really means that all these mitigation patches should be
written with "not all CPU's are crap" in mind.

Or is Intel basically saying "we are committed to selling you ####
forever and ever, and never fixing anything"?


Because if that's the case, maybe we should start looking towards the
ARM64 people more.

Please talk to management. Because I really see exactly two possibibilities:

- Intel never intends to fix anything

OR

- these workarounds should have a way to disable them.

Which of the two is it?

Linus
 
Last edited:
Soldato
Joined
1 Mar 2010
Posts
22,269
I don't understand Linus's point - if he is saying that the numerous Intel/ARM cpu architects involved over many generations should have understoood and avoided the problem, then that seems a very arrogant point of view, if it was so obvious why did he not stand up.
[ARM64 is not immune]
For mitigating the problem in current architectures, Linus does not seem to propose an alternative solution,
we are where we are , and, as written in multiple posts
"Performance at the expense of security is a compromise made daily in every aspect of IT."
 
Associate
Joined
26 May 2017
Posts
363
I don't understand Linus's point - if he is saying that the numerous Intel/ARM cpu architects involved over many generations should have understoood and avoided the problem, then that seems a very arrogant point of view, if it was so obvious why did he not stand up.
[ARM64 is not immune]
For mitigating the problem in current architectures, Linus does not seem to propose an alternative solution,
we are where we are , and, as written in multiple posts
"Performance at the expense of security is a compromise made daily in every aspect of IT."



Performance at the expense of security

Now that's a logo - but would it fit on a Intel box
:p
 
Associate
Joined
7 Aug 2017
Posts
415
Location
location location
I don't understand Linus's point - if he is saying that the numerous Intel/ARM cpu architects involved over many generations should have understoood and avoided the problem, then that seems a very arrogant point of view, if it was so obvious why did he not stand up.
[ARM64 is not immune]

The context is that Intel have repeatedly denied that there is a bug (the failure to check the permission bit when speculatively executing - this causes the Meltdown vulnerability) in their CPUs (see for example their FAQ).

While Arm's Cortex A75 (which is so new it doesn't seem to be in any shipping products yet) is subject to Meltdown, Arm hasn't made the same flat-out denial, though their FAQ is diplomatically woolly on the matter.
 
Associate
Joined
26 May 2017
Posts
363
What next - when will be (fake or otherwise) the first report of a hack through Meltdown.

Absolute panic. More headlines than Trump.

Although maybe that has already happened.
 
Associate
Joined
7 Aug 2017
Posts
415
Location
location location
Google claims they already have a mitigation.

It's not hardware, but some software magic that will lessen the impact of patches.

Ugh the Verge article has gotten some things mixed up as they haven't understood this Google blog post they linked correctly.

KPTI is the mitigation in Linux for Meltdown; this causes a significant perf hit for VMs and I/O intensive loads. Windows has a similar mitigation for Meltdown with similar effects.

In the Google article on Retpoline which they linked to, it says near the beginning: "We wanted to share a binary modification technique that we have developed for protecting against “Branch target injection”, also referred to as “Spectre” ". In other words the Retpoline technique is only relevant to one of the variants of Spectre, and so is not a replacement for the OS level mitigations for Meltdown.

The Google blog post never claimed that Retpoline was a replacement; they in fact say that they deployed KPTI in addition. Google's comment on their observed performance impact of KPTI being fairly benign is simply to state that while certain synthetic benchmarks can show marked performance hits, whether you'll suffer a big hit or not comes down to your workloads, and for their own workloads they got off lightly. Basically - and which has been stated before several times - YMMV.

The Verge somehow thinks KPTI was a fix for branch target injection (Spectre) and would be replaced by Retpoline because Google found it was faster - that's incorrect.
 

V F

V F

Soldato
Joined
13 Aug 2003
Posts
21,184
Location
UK
Indeed, I am surpsrised (non commercial) folks are not postponing the patches untill they are proven - short memories ? what is the rush to install ?

Definitely not me but... On Windows 10 you cannot stop it? At least on Windows 7 it cannot be installed.

 
Last edited:
Associate
Joined
31 Oct 2012
Posts
2,241
Location
Edinburgh
You should read more on this as unfortunately it's not just an Intel issue although at the moment Intel are impacted much more than others.
Meltdown is an intel issue (ok and cortex but they're hardly used), they're just trying to spin it as everyone. Spectre is a different issue which is much less severe but can in some circumstances affect some rivals processors. To be clear this is very much an intel issue.

I write this as their effort at spin is working well as many people in here are repeating the pr line of it being everyone which is effectively wrong.
 
Last edited:
Associate
Joined
13 Sep 2012
Posts
869
Well I've now got KB4056892 installed from WU but sadly no BIOS update for my motherboard since May 2017 :( Guessing Haswell-E won't get one?
 
Soldato
Joined
25 Jun 2009
Posts
3,458
Location
Weston-super-Mare
I wasn't expecting any BIOS update for my asrock z97 board, no new BIOS for 16 months, but then at the bottom I see that a beta BIOS was released less than a month ago, so I think I'm in with a good shot of getting one eventually. If they do, then it would certainly encourage me to go asrock again next time, the boards been great too.
 
Back
Top Bottom