<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="https://purl.org/dc/elements/1.1/" xmlns:content="https://purl.org/rss/1.0/modules/content/" xmlns:foaf="https://xmlns.com/foaf/0.1/" xmlns:og="https://ogp.me/ns#" xmlns:rdfs="https://www.w3.org/2000/01/rdf-schema#" xmlns:schema="https://schema.org/" xmlns:sioc="https://rdfs.org/sioc/ns#" xmlns:sioct="https://rdfs.org/sioc/types#" xmlns:skos="https://www.w3.org/2004/02/skos/core#" xmlns:xsd="https://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/tag/meltdown">
  <channel>
    <title>Meltdown</title>
    <link>https://www.linuxjournal.com/tag/meltdown</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Working around Intel Hardware Flaws</title>
  <link>https://www.linuxjournal.com/content/working-around-intel-hardware-flaws</link>
  <description>  &lt;div data-history-node-id="1339837" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/bigstock-Abstract-background-design-17201444_0.jpg" width="800" height="600" alt="""" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/zack-brown" lang="" about="https://www.linuxjournal.com/users/zack-brown" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Zack Brown&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
Efforts to work around serious hardware flaws in &lt;strong&gt;Intel&lt;/strong&gt; chips are
ongoing. &lt;strong&gt;Nadav
Amit&lt;/strong&gt; posted a patch to improve compatibility mode with respect to Intel's
&lt;strong&gt;Meltdown&lt;/strong&gt;
flaw. Compatibility mode is when the system emulates an older CPU in order to
provide a runtime environment that supports an older piece of software that relies
on the features of that CPU. The thing to be avoided is to emulate massive
security holes created by hardware flaws in that older chip as well.
&lt;/p&gt;

&lt;p&gt;
In this case, Linux is already protected from Meltdown by use of &lt;strong&gt;PTI&lt;/strong&gt; (page table
isolation), a patch that went into Linux 4.15 and that was subsequently backported
all over the place. However, like the &lt;strong&gt;BKL&lt;/strong&gt; (big kernel lock) in the old days, PTI is
a heavy-weight solution, with a big impact on system speed. Any chance to disable
it without reintroducing security holes is a chance worth exploring.
&lt;/p&gt;

&lt;p&gt;
Nadav's patch was an attempt to do this. The goal was "to disable PTI selectively
as long as x86-32 processes are running and to enable global pages throughout this
time."
&lt;/p&gt;

&lt;p&gt;
One problem that Nadav acknowledged was that since so many developers were
actively working on anti-Meltdown and anti-&lt;strong&gt;Spectre&lt;/strong&gt; patches, there was plenty of
opportunity for one patch to step all over what another was trying to do. As a
result, he said, "the patches are marked as an RFC since they (specifically the
last one) do not coexist with Dave Hansen's enabling of global pages, and might
have conflicts with Joerg's work on 32-bit."
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;Andrew Cooper&lt;/strong&gt; remarked, chillingly:
&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;&lt;blockquote&gt;
Being 32bit is itself sufficient protection
against Meltdown (as long as there is nothing interesting of the kernel's mapped below
the 4G boundary). However, a 32bit compatibility process may try to attack with
Spectre/SP2 to redirect speculation back into userspace, at which point (if
successful) the pipeline will be speculating in 64bit mode, and Meltdown is back on
the table.  SMEP will block this attack vector, irrespective of other SP2 defenses
the kernel may employ, but a fully SP2-defended kernel doesn't require SMEP to be
safe in this case.

&lt;/blockquote&gt;

&lt;p&gt;
And Dave, nearby, remarked, "regardless of Meltdown/Spectre, SMEP is valuable.
It's valuable to everything, compatibility-mode or not."
&lt;/p&gt;

&lt;p&gt;
&lt;strong&gt;SMEP&lt;/strong&gt; (Supervisor Mode Execution Protection) is a hardware mode, whereby the OS can
set a register on compatible CPUs to prevent userspace code from running. Only
code that already has root permissions can run when SMEP is activated.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/working-around-intel-hardware-flaws" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Mon, 30 Apr 2018 12:07:07 +0000</pubDate>
    <dc:creator>Zack Brown</dc:creator>
    <guid isPermaLink="false">1339837 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>diff -u: Intel Design Flaw Fallout</title>
  <link>https://www.linuxjournal.com/content/diff-u-intel-design-flaw-fallout</link>
  <description>  &lt;div data-history-node-id="1339782" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/zack-brown" lang="" about="https://www.linuxjournal.com/users/zack-brown" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Zack Brown&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;
For weeks, the world's been talking about severe &lt;strong&gt;Intel&lt;/strong&gt; design flaws
affecting many CPUs and forcing operating systems to look for sometimes
costly workarounds.&lt;/em&gt;
&lt;/p&gt;

&lt;p&gt;
Linux patches for these issues are in a state of ongoing development.
Security is always the first priority, at the expense of any other
feature. Next would probably be the general speed of a running system for
the average user. After that, the developers might begin piecing together
any features that had been pulled as part of the initial security fix.
&lt;/p&gt;

&lt;p&gt;
But while this effort goes on, the kernel developers seem fairly angry at
Intel, especially when they feel that Intel is not doing enough to fix
the problems in future processors.
&lt;/p&gt;

&lt;p&gt;
In response to one set of patches, for example, &lt;strong&gt;Linus
Torvalds&lt;/strong&gt; burst out
with, "All of this is pure garbage. Is Intel really planning on making
this shit architectural? Has anybody talked to them and told them they
are f*cking insane?" He went on, "the IBRS garbage implies that Intel is
_not_ planning on doing the right thing for the indirect branch
speculation. Honestly, that's completely unacceptable." And then he said:
&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;
The
whole IBRS_ALL feature to me very clearly says "Intel is not serious
about this, we'll have an ugly hack that will be so expensive that we
don't want to enable it by default, because that would look bad in
benchmarks". So instead they try to push the garbage down to us. And they
are doing it entirely wrong.
&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;
He went on, even more disturbingly, to say:
&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;
The patches do things like add the garbage MSR writes to the kernel
entry/exit points. That's insane. That says "we're trying to protect the
kernel".  We already have retpoline there, with less overhead.
&lt;/p&gt;

&lt;p&gt;
So somebody isn't telling the truth here. Somebody is pushing complete
garbage for unclear reasons. Sorry for having to point that out....As
it is, the patches  are COMPLETE AND UTTER GARBAGE....WHAT THE F*CK
IS GOING ON?
&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;
At one point, &lt;strong&gt;David Woodhouse&lt;/strong&gt; offered a helpful technical summary of the
whole situation for those of us on the edge of our seats:
&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;
This is all about Spectre variant 2, where the CPU can be tricked into
mispredicting the target of an indirect branch. And I'm specifically
looking at what we can do on *current* hardware, where we're limited to
the hacks they can manage to add in the microcode.
&lt;/p&gt;

&lt;p&gt;
The new microcode from Intel and AMD adds three new features.
&lt;/p&gt;

&lt;p&gt;
One new feature (IBPB) is a complete barrier for branch prediction. After
frobbing this, no branch targets learned earlier are going to be used.
It's kind of expensive (order of magnitude ~4000 cycles).
&lt;/p&gt;&lt;/blockquote&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/diff-u-intel-design-flaw-fallout" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Mon, 19 Mar 2018 14:41:06 +0000</pubDate>
    <dc:creator>Zack Brown</dc:creator>
    <guid isPermaLink="false">1339782 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Oracle Patches Spectre for Red Hat</title>
  <link>https://www.linuxjournal.com/content/oracle-patches-spectre-red-hat</link>
  <description>  &lt;div data-history-node-id="1339787" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/bigstock--221757898_1.jpg" width="800" height="600" alt="Spectre" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/charles-fisher" lang="" about="https://www.linuxjournal.com/users/charles-fisher" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Charles Fisher&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;Red Hat's Spectre remediation currently requires new microcode for a complete fix, which leaves most x86 processors vulnerable as they lack this update. Oracle has released new retpoline kernels that completely remediate Meltdown and Spectre on all compatible CPUs, which I show how to install and test on CentOS here.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
The Red Hat community has patiently awaited a retpoline kernel
implementation that remediates CVE-2017-5715 (Spectre v2) and closes all
Meltdown and Spectre vulnerabilities that have captured headlines this
year.
&lt;/p&gt;

&lt;p&gt;
Red Hat's initial fixes rely upon microcode updates for v2 remediation, a
decision that leaves the vast majority of AMD64-capable processors in an
exploitable state. Intel's new microcode has proven especially
problematic; it performs badly and the January 2018 versions were plagued with
stability issues that crashed many systems. It is a poor solution to a
pressing problem.
&lt;/p&gt;

&lt;p&gt;
Google's retpolines—an &lt;a href="https://security.googleblog.com/2018/01/more-details-about-mitigations-for-cpu_4.html"&gt;ingenious&lt;/a&gt;
approach to v2—essentially play out
the exploit within the Linux kernel in any and all vulnerable code. This
method allows the kernel to retain complete control over speculative
execution hardware in all architectures upon which it runs. It is faster
and more generic than Intel's microcode and seems in every way a
superior solution.
&lt;/p&gt;

&lt;p&gt;
Oracle appears to be the first major member of the Red Hat community that
has delivered a Linux kernel with retpoline support. The latest version
of the Unbreakable Enterprise Kernel preview release 5 (UEKr5) now offers
complete remediation for Meltdown and Spectre regardless of CPU microcode
status. The UEKr5 is based on the mainline Linux kernel's long-term
support branch v4.14 release. &lt;strong&gt;&lt;em&gt;In late-breaking news, Oracle has issued a
production release of the UEKr4 that also includes retpolines, details
below.&lt;em&gt;&lt;/em&gt;&lt;/em&gt;&lt;/strong&gt; For corporate users and others with mandated patch schedules over
a large number of servers, the UEK now seems to be the only solution for
complete Spectre coverage on all CPUs. The UEK brings a number of other
advantages over the "Red Hat-Compatible Kernel" (RHCK), but this patch
response is likely to drive Oracle deeply into the Red Hat community
should they remain the single source.
&lt;/p&gt;

&lt;h3&gt;
CentOS Installation&lt;/h3&gt;

&lt;p&gt;
&lt;a href="https://www.centos.org"&gt;CentOS&lt;/a&gt;, &lt;a href="https://www.scientificlinux.org"&gt;Scientific&lt;/a&gt; and &lt;a href="https://linux.oracle.com/pls/apex/f?p=101:101:2470398880366:::::"&gt;Oracle&lt;/a&gt; Linux are all based off the upstream
provider Red Hat. CentOS is a popular variant and is likely the best
demonstration for loading the UEK on a peer distro.
&lt;/p&gt;

&lt;p&gt;
It appears that Red Hat itself has been laying groundwork for a retpoline
kernel. A January 2018 gcc compiler update implies a successful backport:

&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/oracle-patches-spectre-red-hat" hreflang="en"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Thu, 15 Mar 2018 14:52:25 +0000</pubDate>
    <dc:creator>Charles Fisher</dc:creator>
    <guid isPermaLink="false">1339787 at https://www.linuxjournal.com</guid>
    </item>
<item>
  <title>Meltdown/Spectre Status for Red Hat and Oracle</title>
  <link>https://www.linuxjournal.com/content/meltdownspectre-status-red-hat-and-oracle</link>
  <description>  &lt;div data-history-node-id="1339648" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/bigstock--221757898.jpg" width="800" height="600" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/charles-fisher" lang="" about="https://www.linuxjournal.com/users/charles-fisher" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Charles Fisher&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;&lt;em&gt;
The Red Hat family of operating systems addressed Meltdown and Spectre in
its v3.10 kernel quickly, but relied too much upon Intel's flawed
microcode and was forced to revert from a complete solution. Oracle
implemented alternate approaches more suited to its v4.1 UEK, but both
kernels continue to lack full Spectre coverage while they wait for Intel.
Conspicuously absent from either Linux branch is Google's retpoline,
which offers far greater and more efficient coverage for all CPUs. Auditing
this status is a challenge. This article presents the latest tools for vulnerability
assessments.
&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;
A frenzy of patch activity has surrounded this year's Meltdown and Spectre
CPU vulnerability disclosures. Normally quiet microcode packages for Intel
chips have seen &lt;a href="https://oss.oracle.com/ol7/SRPMS-updates"&gt;four&lt;/a&gt; updates in the month of January, one of which was
finally to roll back flawed code that triggers random reboots. For
enterprise-grade hardware, Intel's quality control has left much to be
desired.
&lt;/p&gt;

&lt;p&gt;
It is likely premature to deploy new monitoring and compliance tools, and a
final solution for this set of vulnerabilities will wait until correct
microcode is obtained. Still, it may be important for many organizations to
evaluate the patch status of servers running Linux kernels packaged by Oracle
and/or Red Hat.
&lt;/p&gt;

&lt;p&gt;
Meltdown patches exist now and should be deployed immediately on vulnerable
servers. Remediating all Spectre vulnerabilities requires not only the latest
kernels, but also a patched GCC to compile the kernel that is capable of
implementing "retpolines", or compatible microcode from your CPU vendor.
&lt;/p&gt;

&lt;h3&gt;
RHCK&lt;/h3&gt;

&lt;p&gt;
Red Hat was one of the first Linux distributions to publish &lt;a href="https://access.redhat.com/articles/3311301"&gt;guidance on
Meltdown and Spectre&lt;/a&gt;. It established three files as "kernel tunables" in
the /sys/kernel/debug/x86 directory to monitor and control these patches:
&lt;code&gt;pti_enabled&lt;/code&gt; for Meltdown, &lt;code&gt;ibpb_enabled&lt;/code&gt; for Spectre
v1 and &lt;code&gt;ibrs_enabled&lt;/code&gt; for
Spectre v2. Only the root user can access these files.
&lt;/p&gt;

&lt;p&gt;
When these files contain a numerical zero, the patches are not active. If
allowed for the CPU, a numerical one may be written to the file to enable the
relevant remediation, and a zero may be written later to disable it. This is
not always allowed—AMD processors are not vulnerable to Meltdown, and the
value in the &lt;code&gt;pti_enabled&lt;/code&gt; file is locked to zero and cannot be changed. If the
fixes are active and show 1, the performance of the CPU may be reduced.
Compatible microcode is required to enable all patches on vulnerable CPUs,
which adds new assembler/machine language op codes that erase vulnerable
kernel data from CPU pipelines and caches to close the exploit.
&lt;/p&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/meltdownspectre-status-red-hat-and-oracle" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Mon, 05 Feb 2018 20:34:57 +0000</pubDate>
    <dc:creator>Charles Fisher</dc:creator>
    <guid isPermaLink="false">1339648 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
