
Thank you, if you can quickly dig this up, can you point me to the workaround?eccerr0r wrote:There's a workaround for 64-bit amd64 for Intel CPUs problem with meltdown, but none for 32-bit at the moment, which is what the commotion is about.

Several days ago, pjp put it in the first post of the thread. Does that count?eccerr0r wrote:I guess this should be stickied somewhere but oh well, not a problem to keep posting it...
https://wiki.gentoo.org/wiki/Project:Se ... nd_Spectre (oh wait, it's on the first post!)
Loved it.IMPORTANT:
A false sense of security is worse than no security at all.

I'm just glad someone finally fixed the title correctly so that this bug didn't imply a denial of service vector versus a memory disclosure issue :pHu wrote:Several days ago, pjp put it in the first post of the thread. Does that count?
It does not matter if C_P_T_I is set YES or disabled.pjp wrote: That sounds to me like CONFIG_PAGE_TABLE_ISOLATION should be enabled for AMD processors. Or at least not setting it with the knowledge of leaving the vulnerability exposed.
the default PTI state during boot is set to "auto", and inDocumentation/x86/pti.txt wrote:It can be enabled by setting CONFIG_PAGE_TABLE_ISOLATION=y
Code: Select all
arch/x86/mm/ptic.cCode: Select all
autosel:
if (!boot_cpu_has_bug(X86_BUG_CPU_MELTDOWN))
return;
enable:
setup_force_cpu_cap(X86_FEATURE_PTI);
}Same here:Ant P. wrote:I wonder if that's a side effect of Gentoo kernels not compiling in thousands of useless drivers. Maybe we're fine there.PrSo wrote:This is another 3 in 1 meltdown-spectre mitigation checker:
CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Kernel compiled with LFENCE opcode inserted at the proper places: NO (only 23 opcodes found, should be >= 70)
> STATUS: VULNERABLE [/code]
A shell script checking kernel config is exactly that, a false sense of security. This project is the only PoC/test I found that's not garbage.gengreen wrote:I don't know how reliable is it, but I found it pratical to be informed about the meltdown/spectre security for my system :
https://github.com/speed47/spectre-meltdown-checker
The script note :
Loved it.IMPORTANT:
A false sense of security is worse than no security at all.
Exactly...blopsalot wrote:A shell script checking kernel config is exactly that, a false sense of security. This project is the only PoC/test I found that's not garbage.gengreen wrote:I don't know how reliable is it, but I found it pratical to be informed about the meltdown/spectre security for my system :
https://github.com/speed47/spectre-meltdown-checker
The script note :
Loved it.IMPORTANT:
A false sense of security is worse than no security at all.
https://github.com/IAIK/meltdown
100% agreed with that.Naib wrote:Exactly...
Part of me groaned when that "checker" was being used around this place... it just checks the main mitigations are in-place. This in itself is a good check BUT if you really want to be sure you need to run the PoC code
gives me false-positive.blopsalot wrote:https://github.com/IAIK/meltdown
Part of me groaned when that "checker" was being used around this place
I like this checker script - and I'm glad it exists! Of course, it cannot prove that your computer is secure. But it can show which patches have been installed and what's left to be done. What's wrong with that?A shell script checking kernel config is exactly that, a false sense of security.
I've tested it thoroughly. It's working code. You are just used to the false-negatives at this point.PrSo wrote:100% agreed with that.Naib wrote:Exactly...
Part of me groaned when that "checker" was being used around this place... it just checks the main mitigations are in-place. This in itself is a good check BUT if you really want to be sure you need to run the PoC code
I have posted this only for reason to check if you have all AVAILIBLE mitigation applied in your kernel that are currently publicized (that are available in kernels provided by gentoo).
Same states the Disclamer.
To be sure that you are protected you have to test your system with proper PoC . There are many PoC's that doesnt work, or are giving false-positive. i.e.:gives me false-positive.blopsalot wrote:https://github.com/IAIK/meltdown
If that would be true the author of this script should get contacted with AMD or make a public statement about AMD's vulnerability to Meltdown (if this program test Meltdown case of course tough).
Post Sciptum:
I am not the author of this checker.

Maybe not exact false-positive.blopsalot wrote: I've tested it thoroughly. It's working code. You are just used to the false-negatives at this point.
edit: I guess I'll add, that it does not do it for you. running ./test is not verification.
Code: Select all
sudo taskset 0x1 ./kaslrCode: Select all
sudo taskset 0x1 ./reliability ....

But there already are PoC's that work without root access, I can only imagine what is out there in the wild, so I'm pretty sure they can get that easily.blopsalot wrote:u can't just give it away to the scriptkidzkajzer wrote:PoC that needs root privileges to work, I don't get that
had u actually read the documentation, it is explained. they chose not to include a mechanism to defeat KASLR without root. physical_reader and memdump run from userspace.kajzer wrote:But there already are PoC's that work without root access, I can only imagine what is out there in the wild, so I'm pretty sure they can get that easily.blopsalot wrote:u can't just give it away to the scriptkidzkajzer wrote:PoC that needs root privileges to work, I don't get that
But to write a PoC and need that.... maybe I got things wrong but I thought the whole point of this exploits/bugs is that you can read kernel memory from userland, reading it from root ... I don't see a point.
But the underlying issue is still whether or not AMD should have it enabled. From the prior information, the answer appears to be yes.PrSo wrote:So it seems that even if you compile kernel with CONFIG_PAGE_TABLE_ISOLATION=Y PTI is auto-disabled on AMD cpu anyway.pjp wrote: That sounds to me like CONFIG_PAGE_TABLE_ISOLATION should be enabled for AMD processors. Or at least not setting it with the knowledge of leaving the vulnerability exposed.
Code: Select all
dmesg |grep -i isol
[ 0.000000] Kernel/User page tables isolation: force enabled on command line.
[ 0.000000] Kernel/User page tables isolation: enabledWhat makes random C code on github which requires root access trustworthy?Naib wrote:Exactly...blopsalot wrote:This project is the only PoC/test I found that's not garbage.
https://github.com/IAIK/meltdown
Part of me groaned when that "checker" was being used around this place... it just checks the main mitigations are in-place. This in itself is a good check BUT if you really want to be sure you need to run the PoC code
Well, isn't one of the primary warnings to not run untrustworthy code?kajzer wrote:But to write a PoC and need that.... maybe I got things wrong but I thought the whole point of this exploits/bugs is that you can read kernel memory from userland, reading it from root ... I don't see a point.