Thanks for clarifying that. Do you have any information on whether AMD is
wrong claiming that their architecture is not vulnerable?

On Thu, Jan 4, 2018 at 11:29 AM, Alex Elsayed <[email protected]> wrote:

>
> On Jan 4, 2018 07:37, "Jeroen "Slim" van Gelderen" <[email protected]>
> wrote:
>
> On Wed, Jan 3, 2018 at 4:37 PM, Alex Elsayed <[email protected]> wrote:
>
>> In addition, Intel has published a press release, claiming that this
>> issue (counter to some claims elsewhere) does in fact affect other
>> vendors and architectures:
>>
>> https://newsroom.intel.com/news/intel-responds-to-security-r
>> esearch-findings/
>
>
> Contrary to the PR, Intel CPUs do indeed have a design flaw aka bug which
> makes them vulnerable to Meltdown. Meltdown has not been reproduced on ARM
> or AMD and AMD thinks Meltdown is not applicable to their chips due to
> architectural differences.
>
> The Spectre attack is the attack that is applicable across the board.
>
> As far as Linux is concerned only Intel machines will be hit with the
> KPI-related slowdown (5%-30%) since KPI will be disabled on AMD CPUs. (And
> I assume this goes for Windows too.) This looks bad for Intel, hence the
> FUD.
>
>
> It's a bit more nuanced than that. First of all, section 6.4 of the
> Meltdown paper is quite clear: non-Intel CPUs _do_ still perform the
> problematic access; it's the particular covert channel they use to extract
> the information from it that does not port over. Many expect this to
> change; the authors themselves see that whether AMD or ARM are affected is
> _unknown-_, not that they are unaffected.
>
> Second, the patch from AMD to disable KPTI has not been accepted AFAIK,
> and AArch64 is adding KPTI.
>
> Third, Meltdown is a _less severe_ attack by far compared to Spectre.
> Meltdown can be addressed by KPTI, but some forms of Spectre use little
> besides the BTB, which is known[1] to be infeasible to flush in software.
>
> Fourth, Intel (and I) posted that link _prior_ to the release of the
> papers, at a time when all that was known to the public was "very serious
> vulnerability in speculative execution" - its claims should be read in that
> context.
>
> [1]: https://arxiv.org/abs/1612.04474
>
>
>


-- 
Jeroen "Slim" van Gelderen
_______________________________________________
Devel mailing list
[email protected]
https://sel4.systems/lists/listinfo/devel

Reply via email to