Hardware & Technical Intel Security BUG (vMem)

Deleted member 110222

D
Hmm. I saw this last night. Not much we can do right now.
 
The story reported on /r/sysadmin/. Also the /r/intel/ and /r/Amd/ are full of discussions about it.

I wonder how this will affect E.D. and FDev's servers.

Probably won't affect clients much at all...it's a bug with kernel memory space, and the patch has a significant performance hit on anything that accesses the kernel heavily, but this is mostly just I/O heavy stuff, not games or most consumer apps.

Servers will probably see a performance hit, and major companies are going to see some downtime as they have to roll out emergency patches.
 
Looks not good, and the upcoming patches may lead to performance hits in the range from "not noticable" to "49%", but currently it's more or less speculation I guess. All benchmarks I saw are from Linux systems with the KPTI patch enabled, Microsoft (and Amazon) are apparently working on a patch, too. From what I get, it's mostly the IO performance that takes a hit, including databases (PostgreSQL ~17% apparently, but well, SELECT 1...), but let's see how this turns out in real life.

https://www.phoronix.com/scan.php?page=article&item=linux-415-x86pti&num=2

The good news seems to be gaming performance is not affected, according to Phoronix' benchmarks at least:

https://www.phoronix.com/scan.php?page=news_item&px=x86-PTI-Initial-Gaming-Tests

FWIW, for German readers, this article seems to be one of the more reasonable ones:

https://www.computerbase.de/2018-01/intel-cpu-pti-sicherheitsluecke/

Apparently, more details will be disclosed tomorrow.

O7,
[noob]
 

Deleted member 110222

D
Looks not good, and the upcoming patches may lead to performance hits in the range from "not noticable" to "49%", but currently it's more or less speculation I guess. All benchmarks I saw are from Linux systems with the KPTI patch enabled, Microsoft (and Amazon) are apparently working on a patch, too. From what I get, it's mostly the IO performance that takes a hit, including databases (PostgreSQL ~17% apparently, but well, SELECT 1...), but let's see how this turns out in real life.

https://www.phoronix.com/scan.php?page=article&item=linux-415-x86pti&num=2

The good news seems to be gaming performance is not affected, according to Phoronix' benchmarks at least:

https://www.phoronix.com/scan.php?page=news_item&px=x86-PTI-Initial-Gaming-Tests

FWIW, for German readers, this article seems to be one of the more reasonable ones:

https://www.computerbase.de/2018-01/intel-cpu-pti-sicherheitsluecke/

Apparently, more details will be disclosed tomorrow.

O7,
[noob]

I hope gaming gets off lightly. Only thing I use my PC for is gaming, writing, and Web browsing.
 
Uh oh, Google disclosed further details about the processor bugs their Project Zero team found :eek:. The first one, "Meltdown" (KAISER | KPTI) only affects Intel CPUs and can be patched in the OS. The second one, "Spectre" affects a much wider range of proessors, including ARM and AMD, and obviously can't be fixed by a simple OS or microcode patch. Reminds me much of "Heartbleed" for hardware. Lets see how this turns out...

Details here:

https://meltdownattack.com/
https://googleprojectzero.blogspot.de/2018/01/reading-privileged-memory-with-side.html

EDIT: Just got a cumulative Windows 10 update (KB4056892) that apparently contains several Kernel security fixes. Seems to be their patch. Note the warning about non-MS antivirus software incompatibilites.

https://support.microsoft.com/en-us...garding-the-windows-security-updates-released

ED servers seem to be safe already:

https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/

O7,
[noob]
 
Last edited:
On the other hand, the second, newer vulnerability is much less serious than the first one (there's no violation of boundary separation), and can be patched without a performance loss.
Intel will still likely use it to try and downplay Meltdown, claiming "it's not just us", but theirs looks to be more serious.
 
Back
Top Bottom