Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 02 Jan 2018 16:56:16 -0800
From:      Cy Schubert <Cy.Schubert@komquats.com>
To:        freebsd-current@freebsd.org, Zaphod Beeblebrox <zbeeble@gmail.com>, Michael Butler <imb@protected-networks.net>
Cc:        FreeBSD Current <freebsd-current@freebsd.org>
Subject:   RE: Intel CPU design flaw - FreeBSD affected?
Message-ID:  <3720C563-77D8-4B9C-BFA7-082B91575506@cschubert.com>
In-Reply-To: <20180103002445.2F9292E8@spqr.komquats.com>
References:  <20180103002445.2F9292E8@spqr.komquats.com>

index | next in thread | previous in thread | raw e-mail

On January 2, 2018 4:24:55 PM PST, Cy Schubert <Cy.Schubert@komquats.com> wrote:
>https://mobile.twitter.com/grsecurity/status/948170302286172160?p=v
>
>---
>Sent using a tiny phone keyboard.
>Apologies for any typos and autocorrect.
>Also, this old phone only supports top post. Apologies.
>
>Cy Schubert
><Cy.Schubert@cschubert.com> or <cy@freebsd.org>
>The need of the many outweighs the greed of the few.
>---
>
>-----Original Message-----
>From: Zaphod Beeblebrox
>Sent: 02/01/2018 15:50
>To: Michael Butler
>Cc: FreeBSD Current
>Subject: Re: Intel CPU design flaw - FreeBSD affected?
>
>>From the information that was leaked by AMD claiming that their
>processors
>didn't have the flaws, it would seem any OS in which the kernel
>occupies
>the same address space as the userland would be vulnerable.  The AMD
>post
>implied that Intel's speculative execution of code did not check the
>validity of the operands before speculatively executing the code.  I
>suppose the implication is that the security check "catches up" with
>the
>speculative execution at some point ... and that their (AMD's)
>microcode
>did check.
>
>Anyways... for those keeping score at home, this is a privilege
>escalation
>bug... so it's only really useful in concert with other bugs ... but
>still
>pretty huge.
>
>Some estimate that between 5% and 30% performance degradation may be
>unavoidable.  Some say it's worse or can't be fully fixed.
>
>Certainly, the sunk cost of current CPUs is a huge issue for server
>farm
>vendors like Amazon and/or google.
>
>On Tue, Jan 2, 2018 at 6:13 PM, Michael Butler
><imb@protected-networks.net>
>wrote:
>
>> Has any impact assessment been made as to FreeBSD's exposure or
>> mitigation strategies?
>>
>> 'Kernel memory leaking' Intel processor design flaw forces Linux,
>> Windows redesign - The Register
>>
>> https://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/
>>
>>
>_______________________________________________
>freebsd-current@freebsd.org mailing list
>https://lists.freebsd.org/mailman/listinfo/freebsd-current
>To unsubscribe, send any mail to
>"freebsd-current-unsubscribe@freebsd.org"
>
>_______________________________________________
>freebsd-current@freebsd.org mailing list
>https://lists.freebsd.org/mailman/listinfo/freebsd-current
>To unsubscribe, send any mail to
>"freebsd-current-unsubscribe@freebsd.org"

No need for invpcid, https://patchwork.kernel.org/patch/10081791/.
---
Cy Schubert
<Cy.Schubert@cschubeet.com> or <cy@freebsd.org>
-- small keyboard in use, apologies for typos and autocorrect --


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3720C563-77D8-4B9C-BFA7-082B91575506>