Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. clacke (clacke@social.heldscal.la)'s status on Wednesday, 03-Jan-2018 22:00:00 EST clacke clacke
    Heres some speculation on what that Intel and possibly also ARM flaw might be: MMU stuff not checked properly during speculative execution.

    > Now combine these two things - when the Intel processors do speculative execution they don’t properly check the permissions so you can look at kernel memory by doing ‘if x then y else naughty_thing’ and check the page fault side effects.

    http://gizmodo.com/1821729263
    In conversation Wednesday, 03-Jan-2018 22:00:00 EST from social.heldscal.la permalink

    Attachments

    1. Invalid filename.
      Report: All Intel Processors Made in the Last Decade Might Have a Massive Security Flaw [Updated]
      from Gizmodo
      There’s small screwups and big screwups. Here is tremendously huge screwup: Virtually all Intel processors produced in the last decade have a major security hole that could allow “normal user programs—from database applications to JavaScript in web browsers—to discern to some extent the layout or contents of protected kernel memory areas,” the Register reported on Tuesday.
    1. Vertigo (vertigo@mastodon.social)'s status on Wednesday, 03-Jan-2018 22:03:15 EST Vertigo Vertigo
      in reply to

      @clacke A hardware-level fix for this would double the burden on the MMU, which would slow the instruction execution rate appreciably. This is the problem with super-long pipelines, and why you should never have a CPU with a pipeline longer than, say, 10 stages. And that's being generous; I *actually* can't see any reason for anything longer than 6.

      In conversation Wednesday, 03-Jan-2018 22:03:15 EST from mastodon.social permalink
      1. clacke (clacke@social.heldscal.la)'s status on Wednesday, 03-Jan-2018 22:19:36 EST clacke clacke
        in reply to
        @vertigo I've never even considered what a speculative branch should do on a page fault. It's not reasonable to go out and run an interrupt to page in memory for something that might not even happen (or even to just ask the MMU about access rights), so I guess it just needs to stall at that point. And maybe that's what they got wrong somehow. Maybe they just go "or if we assume we do have access, what would happen then" and then ask the MMU later ... and something can be observed from that.
        In conversation Wednesday, 03-Jan-2018 22:19:36 EST from social.heldscal.la permalink
        1. clacke (clacke@social.heldscal.la)'s status on Wednesday, 03-Jan-2018 22:21:43 EST clacke clacke
          in reply to
          @vertigo I guess #riscv, being RISC, doesn't have much of a pipeline and probably didnt have to do this kind of optimization.

          Lets just drop legacy and all move over to the future.
          In conversation Wednesday, 03-Jan-2018 22:21:43 EST from social.heldscal.la permalink
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.