SighTurtle
[H]ard|Gawd
- Joined
- Jul 29, 2016
- Messages
- 1,410
The blog post you linked to made a update. Apparently we might not have to wait long before the embargo on this ends, January 4 is the suspected public date.
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature currently requires accessing the site using the built-in Safari browser.
I specifically went with this chip because I need the higher single threaded performance for my work, which doesn't care about multiple threads/cores. I put a Ryzen 1700x in my file server where it makes sense, but my main machine is all single thread. If Intel had a 6ghz quad core I would have gotten that instead.That chip doesn't exist.
However what they can do is send you a chip with more cores that will give you 30% more mutlithread performance![]()
This isn't todo with swap, this is todo with how memory is mapped.
Your RAM is part of a larger concept called memory which is divided into pages and easily exceeds the amount of RAM and addressable RAM your systems has or could have
Probably because techheads haven't even figured this out yet to determine the severity LET alone traders.
Probably because techheads haven't even figured this out yet to determine the severity LET alone traders.
The fact the CEO sold a tonne of his stock when aspects of this were 1st tested stinks. The fact the open-source patches were finally made available before windows update all aligns with a co-ordinated patch sequence to mitigate this -> quite bad
The fact the open-source patches were finally made available before windows update all aligns with a co-ordinated patch sequence to mitigate this -> quite bad
This I realize. But I thought to go beyond the number of pages you have, you have to have virtualization on. You can still randomize address loads. I thought that was only activated with the virtual swap file on. (I could be wrong about this as this delves into a layer of x86 programming that is deeper than my x86 assembly programming days)
Where's juanrga? I want to watch him spin like Taz.
This I realize. But I thought to go beyond the number of pages you have, you have to have virtualization on. You can still randomize address loads. I thought virtualization was only activated with the virtual swap file on. (I could be wrong about this as this delves into a layer of x86 programming that is deeper than my x86 assembly programming days)
Virtual memory is on regardless of swap or page file settings. It's how applications get to put data wherever they want in the address space without stepping all over another applications data. The OS and CPU work together to translate the application "virtual" address into a real physical address that is readable in RAM.
The page file comes in when there aren't enough physical addresses to match all of the applications' virtual addresses. The OS will just map that virtual address to a part of the page file and flag it as so that when the application that owns that page accesses it, the OS know it's not in RAM and will swap things around to make it look like it always was.
Well... considering the linux patch is being backported to older kernel speaks volumes, so much so that they are porting it at the expense of virtualization hosts until a better patch exists.Yeah, the fact that the open source community and Microsoft are coordinating (and that that the authors of Linux Kernel commits could be convinced to redact their comments) points to the fact that its a pretty bad security vulnerability.
The question is, is it a bad vulnerability that is fine once patched, or are we guaranteed to see the kind of performance hit that's been talked about. Everything has vulnerabilities that need patching over time. The question is, are there other downsides?
The blog post suggests there might be, but he also proclaims to not be an expert. So lets wait and see.
I guess the severity will need to be determined if means to disable this is exposed to end-users (linux has a new kernel option). Equally how fast the black-hats start dissecting the windows update to determine where the hole is in windowsAttackers: We can inject machine code into the stack and execute it [1].
Developers: Not anymore; stack pages aren't executable [2].
Attackers: We can turn your own code against you by manipulating the stack to "return" to an arbitrary sequence of pre-existing functions with arguments of our choosing [3].
Developers: Not anymore; we randomize the address space every time we load the code, so now you don't know where those functions are. You could guess, but you're going to be wrong and just crash the system almost all of the time [4].
Attackers: For the kernel on x86/amd64 systems, we have a way of reading the page table from an exploited user process, which we can then parse to discover where you located those functions. <---- you are here
1] https://en.wikipedia.org/wiki/Stack_buffer_overflow#Exploiting_stack_buffer_overflows
[2] https://en.wikipedia.org/wiki/NX_bit
[3] https://en.wikipedia.org/wiki/Return-oriented_programming
[4] https://en.wikipedia.org/wiki/Address_space_layout_randomization
Well it says typical workloads, until I know what workloads are those, it is possible we won't even be affected at all. But I feel the problem, as someone who runs processes that run for days.
this flaw appears to be associated with virtual memory, so if your application has to page out alot or uses a lot of virtual paging you are probably going to be affected more... this is a royal PITA... I use matlab daily and 24gig isn't enough for what I simulate ... a quad i7 slowing down to mitigate this flaw could potentially hit my productivity
Yea, I run a lot of simulation stuff (Arena, Simio, and Matlab) and most of my runs take easily half a day sometimes more and if there is a greater than 5% slowdown and close to 30% I am going to lose a lot of productivity.
Check your mailbox, it's probably already there.So will Intel send me a 5.35ghz to 6.63ghz 8700k to offset the 5-30% performance loss on my brand new setup?
That would be awesome, please do.I'm tempted to benchmark a model I have right now (approx 4hours for one operating point) and then cross reference the kB this fix is associated with and run after....
this is HUGE. It's not like AMD is in a position to capitalize on this, though. Such a shame
Wow if I actually see a even 10% slowdown im going to be build a new rig. 5-10% for me means 45mins-1.5 hrs.
Depends... In response to Intel's ME farce, AMD are offering end-users the option to disable their equiv on Ryzen while Intel doubled-down and disabled the ability to downgrade.this is HUGE. It's not like AMD is in a position to capitalize on this, though. Such a shame
AMD shares are up, thread ripper and co got good reviews, mobile CPU's being offered by Dell... A bit of marketing, say benchmarks in a couple of weeks could do wonders
..from ///AMG to AMD I bet![]()
Ok what I'll do is try on my Linux setup. This way I am in control of updating the kernelThat would be awesome, please do.
Ok what I'll do is try on my Linux setup. This way I am in control of updating the kernel
This will run faster than on my work laptop as it is a ryzen 1600 so with the parallel pool enabled it will have 2 more cores to crunch with.
One problem is this path breaks on Gentoo Linux due to the harden options enabled
I'll try to run the Sims tomorrow, just need to get the libraries
(To no one person specifically)
I'd recommend some patience and a little less breathless hysteria for the time being. There have been many errata like this...
Just pagetables. So some applications wont be affected, but others might be.Is this something that affects all instructions, slowing down everything? Or is it, for example, just page table lookups?
Wow Thats nuts.Phoronix have run some benchmarks
https://www.phoronix.com/scan.php?page=article&item=linux-415-x86pti&num=2
Nice hit![]()
Just pagetables. So some applications wont be affected, but others might be.
Phoronix initial tests show a nice drop for compiler based operations
They'll likely just give you a $5 off coupon for the next hardware revision CPU that incorporates the fix![]()
Phoronix initial tests show a nice drop for compiler based operations