Kitz ADSL Broadband Information
adsl spacer  
Support this site
Home Broadband ISPs Tech Routers Wiki Forum
 
     
   Compare ISP   Rate your ISP
   Glossary   Glossary
 
Please login or register.

Login with username, password and session length
Advanced search  

News:

Pages: 1 [2]

Author Topic: "retblead". The Latest CPU Vulnerability.  (Read 5436 times)

burakkucat

  • Respected
  • Senior Kitizen
  • *
  • Posts: 38300
  • Over the Rainbow Bridge
    • The ELRepo Project
Re: "retblead". The Latest CPU Vulnerability.
« Reply #15 on: July 27, 2022, 05:43:13 PM »

If the output that you have shown is from your VPS then I would share your concern.  :o  I see it is RHEL7 or one of the clones . . .

I've just checked a few remote systems that my "paws will reach".

One RHEL7 --

Kernel             -- 3.10.0-1160.71.1.el7.x86_64

itlb_multihit      -- Not affected
l1tf               -- Not affected
mds                -- Not affected
meltdown           -- Not affected
spec_store_bypass  -- Vulnerable
spectre_v1         -- Mitigation: Load fences, usercopy/swapgs barriers and __user pointer sanitization
spectre_v2         -- Mitigation: Full retpoline, IBPB
srbds              -- Not affected
tsx_async_abort    -- Not affected

One RHEL8 --

Kernel             -- 4.18.0-372.16.1.el8_6.x86_64

itlb_multihit      -- Not affected
l1tf               -- Not affected
mds                -- Not affected
meltdown           -- Not affected
spec_store_bypass  -- Vulnerable
spectre_v1         -- Mitigation: usercopy/swapgs barriers and __user pointer sanitization
spectre_v2         -- Mitigation: Retpolines, IBPB: conditional, STIBP: disabled, RSB filling
srbds              -- Not affected
tsx_async_abort    -- Not affected

And one RHEL9 --

Kernel             -- 5.14.0-70.17.1.el9_0.x86_64

itlb_multihit      -- Not affected
l1tf               -- Not affected
mds                -- Not affected
meltdown           -- Not affected
spec_store_bypass  -- Vulnerable
spectre_v1         -- Mitigation: usercopy/swapgs barriers and __user pointer sanitization
spectre_v2         -- Mitigation: Retpolines, IBPB: conditional, STIBP: disabled, RSB filling
srbds              -- Not affected
tsx_async_abort    -- Not affected

There's no mention of "retblead" as RH have not yet released kernels with the necessary code backported.  ::)
Logged
:cat:  100% Linux and, previously, Unix. Co-founder of the ELRepo Project.

Please consider making a donation to support the running of this site.

Alex Atkin UK

  • Addicted Kitizen
  • *****
  • Posts: 5272
    • Thinkbroadband Quality Monitors
Re: "retblead". The Latest CPU Vulnerability.
« Reply #16 on: July 27, 2022, 06:07:52 PM »

My main VPS is stuck on CentOS 7 as its on a legacy contract so ordering a new VPS would cost twice as much.

This is the problem with hosting your own e-mail and not wanting downtime I guess.
Logged
Broadband: Zen Full Fibre 900 + Three 5G Routers: pfSense (Intel N100) + Huawei CPE Pro 2 H122-373 WiFi: Zyxel NWA210AX
Switches: Netgear MS510TXUP, Netgear MS510TXPP, Netgear GS110EMX My Broadband History & Ping Monitors

Chrysalis

  • Content Team
  • Addicted Kitizen
  • *
  • Posts: 7390
  • VM Gig1 - AAISP L2TP
Re: "retblead". The Latest CPU Vulnerability.
« Reply #17 on: July 28, 2022, 04:14:08 PM »

I have mitigations off on pfSense as Netgate staff themselves as I recall concurred that its a completely unnecessary performance hit.

My guess is they include the toggle as it would be necessary when running in a VM and some people are just plain paranoid, even though if someone was able to run code in the first place you're already screwed.

Its one reason I don't understand OPNsense being based on hardened BSD.  The cynic in me suspects its just so they can claim something over pfSense.


OPNSense have parted ways with them now, I dont know when that takes affect but it has actually been announced, bear in mind HBSD is much more than kernel memory exploit mitigations, FreeBSD do seem a bit lax in their approach to security so I can understand why it exists.   I too disable the mitigations on my firewall as its a local access only box, the risk is going to be from running untrusted code which wont be the case on a firewall.

You can still disable the mitigations on OPNSense but has to be done the normal way via boot loader tunables.
Logged

Weaver

  • Senior Kitizen
  • ******
  • Posts: 11459
  • Retd s/w dev; A&A; 4x7km ADSL2 lines; Firebrick
Re: "retblead". The Latest CPU Vulnerability.
« Reply #18 on: July 28, 2022, 05:00:26 PM »

Forgive my ignorance, but how are the mitigation fixes implemented on existing kit, without redesigning the silicon?
Logged

Chrysalis

  • Content Team
  • Addicted Kitizen
  • *
  • Posts: 7390
  • VM Gig1 - AAISP L2TP
Re: "retblead". The Latest CPU Vulnerability.
« Reply #19 on: July 28, 2022, 05:07:14 PM »

Forgive my ignorance, but how are the mitigation fixes implemented on existing kit, without redesigning the silicon?

They mitigated by sacrificing performance, a lot of the vulnerabilities are linked in some way to branch prediction performance enhancing features, so I think they disable those features (partially) to mitigate.  Spectre I think never got fully mitigated as the performance hit would just be way too much, instead the patches just restrict it on kernel code which is deemed the most risky.
Logged

burakkucat

  • Respected
  • Senior Kitizen
  • *
  • Posts: 38300
  • Over the Rainbow Bridge
    • The ELRepo Project
Re: "retblead". The Latest CPU Vulnerability.
« Reply #20 on: July 28, 2022, 05:29:14 PM »

Ideally one hopes to see "Not affected" for each vulnerability. Failing that, "Mitigation: <blah>. If one sees more than one "Vulnerable", one should regard the CPU as junk.  :-X
Logged
:cat:  100% Linux and, previously, Unix. Co-founder of the ELRepo Project.

Please consider making a donation to support the running of this site.

Weaver

  • Senior Kitizen
  • ******
  • Posts: 11459
  • Retd s/w dev; A&A; 4x7km ADSL2 lines; Firebrick
Re: "retblead". The Latest CPU Vulnerability.
« Reply #21 on: July 28, 2022, 06:12:01 PM »

Sorry, no I meant to ask how is the mitigation injected into the CPU ? That would perhaps be a clearer term to use.
Logged

Chrysalis

  • Content Team
  • Addicted Kitizen
  • *
  • Posts: 7390
  • VM Gig1 - AAISP L2TP
Re: "retblead". The Latest CPU Vulnerability.
« Reply #22 on: July 28, 2022, 09:55:30 PM »

Sorry, no I meant to ask how is the mitigation injected into the CPU ? That would perhaps be a clearer term to use.

Microcode updates which can be done either via bios updates or via the OS loading the microcode on boot.  Not all mitigations are put directly into the CPU though some are just done via OS patches, or even just browser patches.
Logged

Alex Atkin UK

  • Addicted Kitizen
  • *****
  • Posts: 5272
    • Thinkbroadband Quality Monitors
Re: "retblead". The Latest CPU Vulnerability.
« Reply #23 on: July 29, 2022, 02:23:19 AM »

They mitigated by sacrificing performance, a lot of the vulnerabilities are linked in some way to branch prediction performance enhancing features, so I think they disable those features (partially) to mitigate.  Spectre I think never got fully mitigated as the performance hit would just be way too much, instead the patches just restrict it on kernel code which is deemed the most risky.

retbleed sounds quite bad if that SMT disabled is what it sounds like.  Halving the number of threads your CPU can execute can leave I think 25% of performance on the table.
Logged
Broadband: Zen Full Fibre 900 + Three 5G Routers: pfSense (Intel N100) + Huawei CPE Pro 2 H122-373 WiFi: Zyxel NWA210AX
Switches: Netgear MS510TXUP, Netgear MS510TXPP, Netgear GS110EMX My Broadband History & Ping Monitors

Weaver

  • Senior Kitizen
  • ******
  • Posts: 11459
  • Retd s/w dev; A&A; 4x7km ADSL2 lines; Firebrick
Re: "retblead". The Latest CPU Vulnerability.
« Reply #24 on: July 29, 2022, 08:42:52 AM »

What is the two hardware threads per core thing called - hyperthreading? In my experience it’s worth about 10 - 30% but it depends on how much contention there is for shared resources - microcode ops that need say mul (made up old example ). Also it depends on the amount of time certain things arise where one thread is stuck waiting on something such as a read from RAM.
« Last Edit: August 01, 2022, 12:46:29 AM by Weaver »
Logged

Alex Atkin UK

  • Addicted Kitizen
  • *****
  • Posts: 5272
    • Thinkbroadband Quality Monitors
Re: "retblead". The Latest CPU Vulnerability.
« Reply #25 on: July 29, 2022, 09:35:06 AM »

Yeah SMT == HT, AMD (the industry in general) calls it the former with Intel branding it the latter.

When the difference between some CPUs is SMT support or not, it would be really frustrating to have it disabled.
« Last Edit: July 29, 2022, 09:39:44 AM by Alex Atkin UK »
Logged
Broadband: Zen Full Fibre 900 + Three 5G Routers: pfSense (Intel N100) + Huawei CPE Pro 2 H122-373 WiFi: Zyxel NWA210AX
Switches: Netgear MS510TXUP, Netgear MS510TXPP, Netgear GS110EMX My Broadband History & Ping Monitors

johnson

  • Reg Member
  • ***
  • Posts: 838
Re: "retblead". The Latest CPU Vulnerability.
« Reply #26 on: August 01, 2022, 12:00:24 AM »

As if by magic:
https://lore.kernel.org/lkml/CAHk-=wgrz5BBk=rCz7W28Fj_o02s0Xi0OEQ3H1uQgOdFvHgx0w@mail.gmail.com/T/#u

Quote from: Linus Torvalds
On a personal note, the most interesting part here is that I did the
release (and am writing this) on an arm64 laptop. It's something I've
been waiting for for a _loong_ time, and it's finally reality, thanks
to the Asahi team. We've had arm64 hardware around running Linux for a
long time, but none of it has really been usable as a development
platform until now.

So you are in good company Alex.
Logged

Alex Atkin UK

  • Addicted Kitizen
  • *****
  • Posts: 5272
    • Thinkbroadband Quality Monitors
Re: "retblead". The Latest CPU Vulnerability.
« Reply #27 on: August 01, 2022, 09:36:22 AM »

Sweet.
Logged
Broadband: Zen Full Fibre 900 + Three 5G Routers: pfSense (Intel N100) + Huawei CPE Pro 2 H122-373 WiFi: Zyxel NWA210AX
Switches: Netgear MS510TXUP, Netgear MS510TXPP, Netgear GS110EMX My Broadband History & Ping Monitors
Pages: 1 [2]