Massive security hole in CPU's incoming?Official Meltdown/Spectre Discussion Thread

Page 6 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Stuka87

Diamond Member
Dec 10, 2010
6,240
2,559
136
It all seems to be about accessing page tables which happen through the mmu and the translation look aside buffer and page tables in main memory.
This is about that.
https://lwn.net/Articles/569635/
Do you have detailed information about this Intel bug ?
It seems i have missed something when reading your post.

The one mentioned in the OP is on NDA until tomorrow, so we don't have exact details. The issue seems to be with Intel CPUs speculatively processing code before doing a permissions check which allows user level code to potentially have access to kernel level code.

The issue mentioned in the video is an attack on the MMU which can give access to memory addresses. This can allow an attacker to circumvent ASLR and read in memory contiguously that otherwise would have been randomized.
 

Despoiler

Golden Member
Nov 10, 2007
1,966
770
136

PottedMeat

Lifer
Apr 17, 2002
12,365
475
126
lol

https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1553070.html

2) Namespace

Several people including Linus requested to change the KAISER name.

We came up with a list of technically correct acronyms:

User Address Space Separation, prefix uass_

Forcefully Unmap Complete Kernel With Interrupt Trampolines, prefix
fuckwit_

but we are politically correct people so we settled for

Kernel Page Table Isolation, prefix kpti_

Linus, your call :)
 

realibrad

Lifer
Oct 18, 2013
12,337
898
126
So if it's correct what I saw in this? thread, that this very same flaw was publicly demonstrated at some conference in 2016, and would likely therefore be known by large hacker groups for perhaps sometime before that and certainly after, could this be tied to some of the more recent data hacks, like Equifax and others?

I'm not too familiar with how those breaches occurred, but was wondering if some these $$billion screw-ups lead back to a *potentially known* flaw in Intel's architecture, if these companies will start going after Intel for compensation.

...I'm also concerned that this design was an active decision to introduce false performance metrics to remain competitive against their more secure rival, for a decade and more. That would be extremely troubling.

I doubt it was known, partly for the reason you gave, but also because the performance gap was so large between AMD and Intel that only a fool would leave it out after Core launched. What I imagine is that someone messed up, but nobody realized how and saw that it was faster so they ran with it.

I just have a hard time imagining that they knew for this long and did nothing.
 

Schmide

Diamond Member
Mar 7, 2002
5,587
719
126
IMO games will be effected. In 2005 or so MS moved graphics out of the kernel and that was a good thing. However the implication of this is for an isolated process to execute anything over local housekeeping the kernel and another process must be involved. nVidia has a very optimized multi-threaded software driver that resides adjacent to both the kernel and the game. The data to call ratio is most likely low enough to keep the performance hit small, but I think it will be noticeable.
 
  • Like
Reactions: Kuosimodo

Topweasel

Diamond Member
Oct 19, 2000
5,436
1,654
136
Will this slow down my i3-530 and i5-5200u?
Quick answer is yes. If today you are able to use a system with a Intel Processor and are using Windows 7 or later, when this patch comes out, whatever affect it is going to have on any given application, your system will receive that performance penalty. The question now is what the actual application impact we will see.
 
May 11, 2008
19,586
1,197
126
The one mentioned in the OP is on NDA until tomorrow, so we don't have exact details. The issue seems to be with Intel CPUs speculatively processing code before doing a permissions check which allows user level code to potentially have access to kernel level code.

The issue mentioned in the video is an attack on the MMU which can give access to memory addresses. This can allow an attacker to circumvent ASLR and read in memory contiguously that otherwise would have been randomized.

Thank you. :)
I noticed that one link i posted is from 2013. That gives an explanation of how and why but it also confirms what was written there cannot be it.
The computerbase.de article is revealing.
I have been reading more about it form these articles to understand what is going on (In chronological order) :
https://lwn.net/Articles/738975/
https://lwn.net/SubscriberLink/741878/78d70a9fed62f496/
 

Roger Wilco

Diamond Member
Mar 20, 2017
3,875
5,727
136
What's the probability of a class action lawsuit? Everyone and their mother has an Intel CPU in something.
 

R0H1T

Platinum Member
Jan 12, 2013
2,582
162
106
Get your tinfoils & seat belts ready :D https://twitter.com/statuses/948561799875502080

DSn30-UW4AEV13B.jpg
 

PingSpike

Lifer
Feb 25, 2004
21,732
561
126
What's the probability of a class action lawsuit? Everyone and their mother has an Intel CPU in something.

The class action lawsuit will be irrelevant next to what they'll have to deal with from their huge data center customers. Those guys bought a lot of cpus, use them for things where the performance impact is worse and are large companies that have actual legal teams. Whether you and I see a $2.27 check 9 years from now or not, those guys are going to make real demands.
 

zinfamous

No Lifer
Jul 12, 2006
110,597
29,231
146
I doubt it was known, partly for the reason you gave, but also because the performance gap was so large between AMD and Intel that only a fool would leave it out after Core launched. What I imagine is that someone messed up, but nobody realized how and saw that it was faster so they ran with it.

I just have a hard time imagining that they knew for this long and did nothing.

Um, isn't that actual "very large performance gap" encompassed by the "performance increase" that this bug introduces to the architecture at the expense of security? That is the actual claim: has nothing to do with ignoring it because of inherent performance, but that the security compromise was designed in to create that performance.

I admit that this is the razor's edge of wacko conspiracy, but it really would be nothing new in the proven shadiness of how Intel does things.
 

realibrad

Lifer
Oct 18, 2013
12,337
898
126
Um, isn't that actual "very large performance gap" encompassed by the "performance increase" that this bug introduces to the architecture at the expense of security? That is the actual claim: has nothing to do with ignoring it because of inherent performance, but that the security compromise was designed in to create that performance.

I admit that this is the razor's edge of wacko conspiracy, but it really would be nothing new in the proven shadiness of how Intel does things.

But only a small part in reality. If AMD were within 5% or so then I could see this, but the gap was huge a few times and it would have been better to fix it then. Leaving it open for 10+ years is a bit much even for Intel, because of how it exposes them.

Unless the person that knew of this left the company and it was forgotten.
 

naukkis

Senior member
Jun 5, 2002
706
578
136
So it seems that little behaviour exploit whole kernel memory to usermode programs, cpu_unsecure well earned. But big question to ask is whether that fuckwit_ can be made full secure for cpu with such a serious errata?
 

Atari2600

Golden Member
Nov 22, 2016
1,409
1,655
136
Stuka87 said:
Core CPU's are just as effected as Xeons.

I know Core iSomethings are affected.

My point is - the majority of those running cores will never hear of this, not to mention grasp how important it could be.

Those running Xeons however, or rather, the IT departments that are responsible for them, aren't so ignorant.
 
  • Like
Reactions: DarthKyrie