Forums

Skip to content

Advanced search
  • Quick links
    • Unanswered topics
    • Active topics
    • Search
  • FAQ
  • Login
  • Register
  • Board index Assistance Kernel & Hardware
  • Search

Meltdown/Spectre: Unauthorized Disclosure of Kernel Memory

Kernel not recognizing your hardware? Problems with power management or PCMCIA? What hardware is compatible with Gentoo? See here. (Only for kernels supported by Gentoo.)
Locked
Advanced search
562 posts
  • Page 3 of 23
    • Jump to page:
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 23
  • Next
Author
Message
EasterParade
l33t
l33t
User avatar
Posts: 938
Joined: Sat Jul 26, 2003 10:48 am

Post by EasterParade » Thu Jan 04, 2018 6:46 pm

Last edited by EasterParade on Fri Jan 05, 2018 10:09 pm, edited 1 time in total.
Top
Jaglover
Watchman
Watchman
User avatar
Posts: 8291
Joined: Sun May 29, 2005 1:57 am
Location: Saint Amant, Acadiana

Post by Jaglover » Thu Jan 04, 2018 6:58 pm

Generally, if a defective product is sold a recall should be done.
My Gentoo installation notes.
Please learn how to denote units correctly!
Top
NightMonkey
Guru
Guru
User avatar
Posts: 360
Joined: Fri Mar 21, 2003 10:07 am
Location: Philadelphia, PA

Mitigation?

Post by NightMonkey » Thu Jan 04, 2018 7:04 pm

Is there any mitigation possible, perhaps in either the kernel config, or via CFLAGs, that removes some feature that is allowing this exploitable path in our chipsets? Pretty ugly stuff - and I wonder who has been exploiting this for years without the public knowing...
:D
Top
PrSo
Tux's lil' helper
Tux's lil' helper
Posts: 136
Joined: Thu Jun 01, 2017 1:02 pm

Post by PrSo » Thu Jan 04, 2018 7:06 pm

Here is part of Spectre patch:

http://lists.llvm.org/pipermail/llvm-co ... 13630.html
Top
Myu
Apprentice
Apprentice
User avatar
Posts: 164
Joined: Wed Oct 22, 2014 7:28 am
Location: Belgium

Post by Myu » Thu Jan 04, 2018 7:07 pm

Is there any mitigation possible, perhaps in either the kernel config, or via CFLAGs, that removes some feature that is allowing this exploitable path in our chipsets? Pretty ugly stuff - and I wonder who has been exploiting this for years without the public knowing...
Kernel 4.14.11 has CONFIG_PAGE_TABLE_ISOLATION=y but that only for Meltdown attack. Spectre is a different beast

(edited)
Last edited by Myu on Thu Jan 04, 2018 7:08 pm, edited 1 time in total.
Gentoo stable with bits of ~amd64 // Xfce 4.13 + Compiz Reloaded.
Top
CPUFan
n00b
n00b
Posts: 58
Joined: Thu May 21, 2015 7:26 am

Post by CPUFan » Thu Jan 04, 2018 7:08 pm

Just FYI: This is "part" of a solution:

Code: Select all

# Meltdown:
=sys-kernel/gentoo-sources-4.14.11-r2 ~amd64
(followed by an update)

There will be 3 GLSAs about the full solution.

Thanks to grknight from #gentoo for confirming.
Last edited by CPUFan on Thu Jan 04, 2018 8:01 pm, edited 1 time in total.
Top
eccerr0r
Watchman
Watchman
Posts: 10239
Joined: Thu Jul 01, 2004 6:51 pm
Location: almost Mile High in the USA
Contact:
Contact eccerr0r
Website

Post by eccerr0r » Thu Jan 04, 2018 7:08 pm

Anyone have the PoC code, and whether disabling L1/L2 caches would mitigate the problem?

Granted, this would kill performance really badly, but it's a stopgap solution? heh heh heh
Intel Core i7 2700K/Radeon Firepro W2100/24GB DDR3/800GB SSD
What am I supposed watching?
Top
Naib
Watchman
Watchman
User avatar
Posts: 6101
Joined: Fri May 21, 2004 9:42 pm
Location: Removed by Neddy
Contact:
Contact Naib
Website

Re: Mitigation?

Post by Naib » Thu Jan 04, 2018 7:09 pm

NightMonkey wrote:Is there any mitigation possible, perhaps in either the kernel config, or via CFLAGs, that removes some feature that is allowing this exploitable path in our chipsets? Pretty ugly stuff - and I wonder who has been exploiting this for years without the public knowing...
yes, buy a ryzen setup
#define HelloWorld int
#define Int main()
#define Return printf
#define Print return
#include <stdio>
HelloWorld Int {
Return("Hello, world!\n");
Print 0;
Top
Myu
Apprentice
Apprentice
User avatar
Posts: 164
Joined: Wed Oct 22, 2014 7:28 am
Location: Belgium

Post by Myu » Thu Jan 04, 2018 7:10 pm

@CPUFan :

Have an Intel CPU and 4.14.11 ? Then run

Code: Select all

cat /proc/cpuinfo | grep -i insecure
If you have something like this, the KPTI patch is enabled :

Code: Select all

bugs		: cpu_insecure
bugs		: cpu_insecure
...
Gentoo stable with bits of ~amd64 // Xfce 4.13 + Compiz Reloaded.
Top
ycUygB1
Apprentice
Apprentice
User avatar
Posts: 276
Joined: Wed Jul 27, 2005 6:35 pm
Location: Portland, Oregon

Post by ycUygB1 » Thu Jan 04, 2018 8:15 pm

CPUFan wrote: There will be 3 GLSAs about the full solution.

Thanks to grknight from #gentoo for confirming.
Thank you.
Top
Cyker
Veteran
Veteran
Posts: 1746
Joined: Thu Jun 15, 2006 7:43 pm

Post by Cyker » Thu Jan 04, 2018 8:16 pm

Wooo! Time for the C64 to RISE AGAIN!!!!! :lol:
Top
EasterParade
l33t
l33t
User avatar
Posts: 938
Joined: Sat Jul 26, 2003 10:48 am

Post by EasterParade » Thu Jan 04, 2018 8:23 pm

Last edited by EasterParade on Fri Jan 05, 2018 10:09 pm, edited 1 time in total.
Top
Joseph Powers
n00b
n00b
Posts: 41
Joined: Sun Nov 26, 2017 9:50 pm

Post by Joseph Powers » Thu Jan 04, 2018 9:08 pm

Can I patch the Meltdown bug with Gentoo hardened sources?
Top
papas
Tux's lil' helper
Tux's lil' helper
Posts: 141
Joined: Mon Dec 01, 2014 8:55 pm
Location: Athens

Post by papas » Thu Jan 04, 2018 9:20 pm

great news for me 2 days ago I ordered a i7 8700k just to avoid the AMD segfault
Top
1clue
Advocate
Advocate
Posts: 2569
Joined: Sun Feb 05, 2006 3:08 am

Post by 1clue » Thu Jan 04, 2018 9:39 pm

It's going to take awhile before any fixed hardware reaches the market. First the design needs to be fixed, then it needs to be tested and then boards need to be designed around the newer chips. We're all screwed for awhile.
Top
Naib
Watchman
Watchman
User avatar
Posts: 6101
Joined: Fri May 21, 2004 9:42 pm
Location: Removed by Neddy
Contact:
Contact Naib
Website

Post by Naib » Thu Jan 04, 2018 9:45 pm

1clue wrote:It's going to take awhile before any fixed hardware reaches the market. First the design needs to be fixed, then it needs to be tested and then boards need to be designed around the newer chips. We're all screwed for awhile.
You can take the risk with present Ryzen stock & you might be lucky not to pick up with early fab issues OR wait a couple of months an Zen2 is due out
If you want to stick with intel then sure... might take some time *if* they actually fix it (note they never actually fixed the fpu issue) as they have to gut their entire arch rather than building on it
#define HelloWorld int
#define Int main()
#define Return printf
#define Print return
#include <stdio>
HelloWorld Int {
Return("Hello, world!\n");
Print 0;
Top
1clue
Advocate
Advocate
Posts: 2569
Joined: Sun Feb 05, 2006 3:08 am

Post by 1clue » Thu Jan 04, 2018 9:52 pm

Naib wrote:
1clue wrote:It's going to take awhile before any fixed hardware reaches the market. First the design needs to be fixed, then it needs to be tested and then boards need to be designed around the newer chips. We're all screwed for awhile.
You can take the risk with present Ryzen stock & you might be lucky not to pick up with early fab issues OR wait a couple of months an Zen2 is due out
If you want to stick with intel then sure... might take some time *if* they actually fix it (note they never actually fixed the fpu issue) as they have to gut their entire arch rather than building on it
FWIW I'm sticking with Intel.

The idea that they don't fix this is insane. The FPU issue was a minor irritant with an easy software fix. This decimates the security or speed of their entire processor line for the last 15 years.
Top
gengreen
Apprentice
Apprentice
Posts: 150
Joined: Sat Dec 23, 2017 2:49 am
Contact:
Contact gengreen
Website

Post by gengreen » Thu Jan 04, 2018 10:28 pm

Better to directly turn off the javascript in about:config than use some plugins

javascript is a general useflag, I will put it in my make.conf (-javascript)

it's better than nothing...
Top
roki942
Apprentice
Apprentice
User avatar
Posts: 285
Joined: Mon Apr 18, 2005 4:45 am
Location: Seattle

Post by roki942 » Thu Jan 04, 2018 10:30 pm

Came across these:
"We translated Intel's crap attempt to spin its way out of CPU security bug PR nightmare" http://www.theregister.co.uk/2018/01/04 ... notations/
"Azure VMs borked following Meltdown patch, er, meltdown" https://www.theregister.co.uk/2018/01/0 ... own_patch/
Top
luiztux
n00b
n00b
User avatar
Posts: 27
Joined: Mon Aug 31, 2015 12:14 pm
Location: /usr/portage/distfiles

Post by luiztux » Thu Jan 04, 2018 11:17 pm

Who knows now is the chance of Open Source Hardware gaining momentum? Or live like Stallman ... :roll:
Top
The Main Man
Veteran
Veteran
Posts: 1173
Joined: Thu Nov 27, 2014 11:25 pm
Location: /run/user/1000

Post by The Main Man » Thu Jan 04, 2018 11:29 pm

eccerr0r wrote:Anyone have the PoC code, and whether disabling L1/L2 caches would mitigate the problem?
PoC code :
http://cxsecurity.com/issue/WLB-2018010039
Top
Naib
Watchman
Watchman
User avatar
Posts: 6101
Joined: Fri May 21, 2004 9:42 pm
Location: Removed by Neddy
Contact:
Contact Naib
Website

Post by Naib » Thu Jan 04, 2018 11:35 pm

https://www.bleepingcomputer.com/news/s ... e-attacks/
#define HelloWorld int
#define Int main()
#define Return printf
#define Print return
#include <stdio>
HelloWorld Int {
Return("Hello, world!\n");
Print 0;
Top
The Main Man
Veteran
Veteran
Posts: 1173
Joined: Thu Nov 27, 2014 11:25 pm
Location: /run/user/1000

Post by The Main Man » Thu Jan 04, 2018 11:52 pm

It's easier to copy the PoC code from here instead of the link I posted above:
https://github.com/Eugnis/spectre-attack

Anyway, I've executed this code on 4.14.11-gentoo-r2 with cpu_insecure and got this :

Code: Select all

$ ./a.out                                                                                                                                                                          
Putting 'The Magic Words are Squeamish Ossifrage.' in memory
Reading 40 bytes:
zsh: illegal hardware instruction  ./a.out
Would be interesting to see the result on non-patched system but I can't do it atm.
Top
gengreen
Apprentice
Apprentice
Posts: 150
Joined: Sat Dec 23, 2017 2:49 am
Contact:
Contact gengreen
Website

Post by gengreen » Fri Jan 05, 2018 12:37 am

https://paste.pound-python.org/show/X9O ... CgOKMTwTc/
Top
The Main Man
Veteran
Veteran
Posts: 1173
Joined: Thu Nov 27, 2014 11:25 pm
Location: /run/user/1000

Post by The Main Man » Fri Jan 05, 2018 12:46 am

gengreen wrote:https://paste.pound-python.org/show/X9O ... CgOKMTwTc/
Interesting, so the code actually works. On patched or non-patched system?
I just had to try it and on the same machine I have another gentoo installation that hasn't been updated in awhile (couple of months) , and I get the same result (zsh: illegal hardware instruction ./a.out), thought maybe it's zsh so I tried to execute in bash but I got the same thing. Maybe I'm doing something wrong, I've compiled the source with "gcc Source.c"
Top
Locked

562 posts
  • Page 3 of 23
    • Jump to page:
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 23
  • Next

Return to “Kernel & Hardware”

Jump to
  • Assistance
  • ↳   News & Announcements
  • ↳   Frequently Asked Questions
  • ↳   Installing Gentoo
  • ↳   Multimedia
  • ↳   Desktop Environments
  • ↳   Networking & Security
  • ↳   Kernel & Hardware
  • ↳   Portage & Programming
  • ↳   Gamers & Players
  • ↳   Other Things Gentoo
  • ↳   Unsupported Software
  • Discussion & Documentation
  • ↳   Documentation, Tips & Tricks
  • ↳   Gentoo Chat
  • ↳   Gentoo Forums Feedback
  • ↳   Duplicate Threads
  • International Gentoo Users
  • ↳   中文 (Chinese)
  • ↳   Dutch
  • ↳   Finnish
  • ↳   French
  • ↳   Deutsches Forum (German)
  • ↳   Diskussionsforum
  • ↳   Deutsche Dokumentation
  • ↳   Greek
  • ↳   Forum italiano (Italian)
  • ↳   Forum di discussione italiano
  • ↳   Risorse italiane (documentazione e tools)
  • ↳   Polskie forum (Polish)
  • ↳   Instalacja i sprzęt
  • ↳   Polish OTW
  • ↳   Portuguese
  • ↳   Documentação, Ferramentas e Dicas
  • ↳   Russian
  • ↳   Scandinavian
  • ↳   Spanish
  • ↳   Other Languages
  • Architectures & Platforms
  • ↳   Gentoo on ARM
  • ↳   Gentoo on PPC
  • ↳   Gentoo on Sparc
  • ↳   Gentoo on Alternative Architectures
  • ↳   Gentoo on AMD64
  • ↳   Gentoo for Mac OS X (Portage for Mac OS X)
  • Board index
  • All times are UTC
  • Delete cookies

© 2001–2026 Gentoo Foundation, Inc.

Powered by phpBB® Forum Software © phpBB Limited

Privacy Policy

 

 

magic