Go Back   IceInSpace > Equipment > Software and Computers

Reply
 
Thread Tools Rate Thread
  #1  
Old 03-01-2018, 11:42 AM
lazjen's Avatar
lazjen (Chris)
PI cult member

lazjen is offline
 
Join Date: Dec 2012
Location: Flaxton, Qld
Posts: 2,064
Intel CPU Design Flaw

https://www.theregister.co.uk/2018/0...u_design_flaw/

This is pretty significant and could have a negative impact on a number of things we do, e.g. image processing.

If you're looking to build a new system right now, I would pause and/or strongly consider going AMD instead.
Reply With Quote
  #2  
Old 03-01-2018, 11:48 AM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
I just saw that, Chris. I'm feeling very smug about the AMD Threadripper system I ordered a few days ago
Reply With Quote
  #3  
Old 03-01-2018, 12:14 PM
lazjen's Avatar
lazjen (Chris)
PI cult member

lazjen is offline
 
Join Date: Dec 2012
Location: Flaxton, Qld
Posts: 2,064
Cool - spill the beans on the specs, Rick - what are you getting and am I right to assume this will be a PI processing beast?
Reply With Quote
  #4  
Old 03-01-2018, 12:26 PM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Quote:
Originally Posted by lazjen View Post
Cool - spill the beans on the specs, Rick - what are you getting and am I right to assume this will be a PI processing beast?
Yep, it's intended to provide scorching PI performance, Chris. CPU is a Threadripper 1950X 16-Core. 64GB DDR4 3600MHz RAM. 500GB NVMe SSD and 10TB HDD. Quadro P2000 graphics.

I have heard anecdotally that PI runs faster under Linux than Windows, so I'll do some comparative benchmarking and do my processing under Linux if it has a measurable advantage.

My current workstation has lasted me 7 years so I thought it was time for a significant upgrade!

Cheers,
Rick.
Reply With Quote
  #5  
Old 03-01-2018, 12:43 PM
lazjen's Avatar
lazjen (Chris)
PI cult member

lazjen is offline
 
Join Date: Dec 2012
Location: Flaxton, Qld
Posts: 2,064
I have directly compared PI for Linux vs Windows on the same system - dual boot. And it's definitely better under Linux. I didn't have all variables locked down 100%, but I did notice the difference.
Reply With Quote
  #6  
Old 03-01-2018, 12:55 PM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Quote:
Originally Posted by lazjen View Post
I have directly compared PI for Linux vs Windows on the same system - dual boot. And it's definitely better under Linux. I didn't have all variables locked down 100%, but I did notice the difference.
Great, thanks Chris. I'd guess it is mostly down to file system performance. Raw multithreaded processing in user space should be much the same.
Reply With Quote
  #7  
Old 03-01-2018, 02:54 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,926
Hi Chris,

Thanks for the heads-up.

Not a good way for the world to begin 2018.

Sounds like it has the potential for being the biggest computer vulnerability of all-time.

Given perhaps 1.3 billion machines or more might be vulnerable worldwide and given not all
will have their CPU's replaced or get a software patch, the potential for system breaches, information theft or serious
cyber attacks is mind-boggling.

It is not a question of if it has been exploited, it is now a question of how
many systems have been exploited already.
Reply With Quote
  #8  
Old 03-01-2018, 02:55 PM
Camelopardalis's Avatar
Camelopardalis (Dunk)
Drifting from the pole

Camelopardalis is offline
 
Join Date: Feb 2013
Location: Brisbane
Posts: 5,429
Sounds like someone at Intel was a naughty boy...nothing quite like trading off security for performance
Reply With Quote
  #9  
Old 03-01-2018, 03:19 PM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Quote:
Originally Posted by gary View Post
Sounds like it has the potential for being the biggest computer vulnerability of all-time.
At least it's not a remote exploit, Gary, but it could be very ugly. It will certainly be very disruptive.

Quote:
Originally Posted by Camelopardalis View Post
Sounds like someone at Intel was a naughty boy...nothing quite like trading off security for performance
Hard to tell until details are released (or leaked) but it's usually safer to assume incompetence rather than malice

Not thinking through the security implications of speculative execution would be an easy mistake to make.
Reply With Quote
  #10  
Old 03-01-2018, 04:19 PM
lazjen's Avatar
lazjen (Chris)
PI cult member

lazjen is offline
 
Join Date: Dec 2012
Location: Flaxton, Qld
Posts: 2,064
It's probably unlikely to get many exploits as fixes will come through, but it's the impact of the fixes that will be the bigger issue.

If we start seeing stuff performing significantly worse after the fix, there will be some screaming. I've been reading reports of some software that have had up to 63% performance loss due to the change. Obviously it depends on the software and what people do, but if it hits something common like web browsers, media players, etc. then stuff might hit the fan...
Reply With Quote
  #11  
Old 03-01-2018, 05:49 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,926
Quote:
Originally Posted by lazjen View Post
It's probably unlikely to get many exploits as fixes will come through, but it's the impact of the fixes that will be the bigger issue.

If we start seeing stuff performing significantly worse after the fix, there will be some screaming. I've been reading reports of some software that have had up to 63% performance loss due to the change. Obviously it depends on the software and what people do, but if it hits something common like web browsers, media players, etc. then stuff might hit the fan...
Every system call for a start.

Currently in Linux the kernel MMU page tables are mmap'ed so when
you do the context switch, they are just there and its all fast.

But the Linux patches are showing the TLB's are now having to be
flushed on each system call or each interrupt.

So for a start, anything doing lots of I/O will suffer.

Quote:
Originally Posted by Rick
At least it's not a remote exploit, Gary, but it could be very ugly. It will certainly be very disruptive.
Happy New Year Rick. Hope all is well.

True. But from what I can see is if there is some other buffer overrun
exploit in a web browser, you might use this flaw in combination with
that as part of a side-channel attack through some JavaScript.
See https://www.youtube.com/watch?v=ewe3-mUku94

The NSA, the Russians, the Chinese and the North Koreans will be busy.

Last edited by gary; 03-01-2018 at 06:26 PM.
Reply With Quote
  #12  
Old 03-01-2018, 06:02 PM
luka's Avatar
luka
Unregistered User

luka is offline
 
Join Date: Apr 2007
Location: Perth, Australia
Posts: 1,164
Quote:
Originally Posted by gary View Post
The NSA, the Russians, the Chinese and the North Koreans will be busy.
I would not be surprised if they knew about the flaw for years and have been exploiting it.
Reply With Quote
  #13  
Old 03-01-2018, 06:25 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,926
Quote:
Originally Posted by luka View Post
I would not be surprised if they knew about the flaw for years and have been exploiting it.
Absolutely.
Reply With Quote
  #14  
Old 03-01-2018, 09:49 PM
lazjen's Avatar
lazjen (Chris)
PI cult member

lazjen is offline
 
Join Date: Dec 2012
Location: Flaxton, Qld
Posts: 2,064
This issue has been publicly known since sometime in 2016. It's implications weren't fully understood at the time. So, I also won't be surprised if it's been known for a lot longer than that.
Reply With Quote
  #15  
Old 03-01-2018, 11:08 PM
luka's Avatar
luka
Unregistered User

luka is offline
 
Join Date: Apr 2007
Location: Perth, Australia
Posts: 1,164
By the way, ARM64 is also affected (not AMD64).
Reply With Quote
  #16  
Old 04-01-2018, 07:52 AM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Quote:
Originally Posted by luka View Post
By the way, ARM64 is also affected (not AMD64).
Do you have a link?
Reply With Quote
  #17  
Old 04-01-2018, 08:02 AM
RickS's Avatar
RickS (Rick)
PI cult recruiter

RickS is offline
 
Join Date: Apr 2010
Location: Brisbane
Posts: 10,584
Quote:
Originally Posted by RickS View Post
Do you have a link?
Found a recent arm64 patch that unmaps the kernel while running in user space: https://lwn.net/Articles/740393/

It is based on the paper here: https://gruss.cc/files/kaiser.pdf

It looks like this is a general response to the problem of kernel bugs, Rowhammer attacks, etc. and not a reaction to a specific vulnerability. But I could be wrong. The details of the x86 problem have been kept very much under wraps.

Update: here's a 2016 paper that appears to describe the vulnerability: https://gruss.cc/files/prefetch.pdf

Last edited by RickS; 04-01-2018 at 08:13 AM.
Reply With Quote
  #18  
Old 04-01-2018, 11:21 AM
lazjen's Avatar
lazjen (Chris)
PI cult member

lazjen is offline
 
Join Date: Dec 2012
Location: Flaxton, Qld
Posts: 2,064
More gory details: https://spectreattack.com/

I haven't gone through it all, a brief skim is enough to know it's bad...
Reply With Quote
  #19  
Old 04-01-2018, 12:26 PM
gary
Registered User

gary is offline
 
Join Date: Apr 2005
Location: Mt. Kuring-Gai
Posts: 5,926
Rick, Chris,

Thanks for the links to the papers and other references.

One certainly gets the impression that there is a scramble to implement
Linux Kernel Page Table Isolation (was KAISER) and one can only assume
kernel programmers at Microsoft and Apple have been hard at it as well.

Probably no Christmas holiday break for some.

The urgency gives some merit to the prospect that exploits are already in the
wild today, not just on paper.

Specifically the vulnerability surrounding speculative execution to avoid
pipeline stalls may have been knowingly actively exploited (i.e. implementations
of Meltdown and Spectre) leading to the rush.

Let's face it. If the likes of the NSA had not done it years ago, they would have
poured enormous resources into implementing exploits during the past year.

As one of the papers cited tests on smartphones as well as servers, that
represents billions of devices.

The additional clock cycles that will be required for interrupt service routines
is unfortunate. You really just want to get in and out of those handlers as fast
as possible whilst doing the minimum you have to do.

Certainly the performance counters have unwittingly become tools for
exploiting other hardware and software security mechanisms.

Last edited by gary; 04-01-2018 at 12:42 PM.
Reply With Quote
  #20  
Old 04-01-2018, 12:38 PM
Camelopardalis's Avatar
Camelopardalis (Dunk)
Drifting from the pole

Camelopardalis is offline
 
Join Date: Feb 2013
Location: Brisbane
Posts: 5,429
Quote:
Originally Posted by RickS View Post
Hard to tell until details are released (or leaked) but it's usually safer to assume incompetence rather than malice

Not thinking through the security implications of speculative execution would be an easy mistake to make.
That’s more charitable than my cynic’s view, Rick

I struggle to believe that, in some meeting back in the depths of time, that some engineer didn’t pipe up with why not ring fencing the lookahead tables, etc, was a bad idea. And I hate sentences with so many negatives. I’m giving Intel the benefit of the doubt that there are more smart people working there than stupid people.

Considering Intel’s history when it comes to competition just makes it sound all the more unlikely. OK, conspiracy mode off...
Reply With Quote
Reply

Bookmarks

Thread Tools
Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump


All times are GMT +10. The time is now 03:34 PM.

Powered by vBulletin Version 3.8.7 | Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Advertisement
Bintel
Advertisement
Testar
Advertisement