{"id":25301,"date":"2019-05-17T16:39:05","date_gmt":"2019-05-17T20:39:05","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=25301"},"modified":"2019-06-09T08:49:21","modified_gmt":"2019-06-09T12:49:21","slug":"microarchitectural-data-sampling-mds-mitigation","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2019\/05\/17\/microarchitectural-data-sampling-mds-mitigation\/","title":{"rendered":"Microarchitectural Data Sampling (MDS) Mitigation"},"content":{"rendered":"<p><a href=\"https:\/\/arxiv.org\/abs\/1902.05178\">Ross Mcilroy et al.<\/a> (via <a href=\"https:\/\/news.ycombinator.com\/item?id=19237068\">Hacker<\/a> <a href=\"https:\/\/news.ycombinator.com\/item?id=19170396\">News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/arxiv.org\/abs\/1902.05178\">\n<p>This paper explores speculative side-channel attacks and their implications for programming languages. These attacks leak information through micro-architectural side-channels which we show are not mere bugs, but in fact lie at the foundation of optimization. [&#8230;] As a result of our work, we now believe that speculative vulnerabilities on today&rsquo;s hardware defeat all language-enforced confidentiality with no known comprehensive software mitigations, as we have discovered that untrusted code can construct a universal read gadget to read all memory in the same address space through side-channels. In the face of this reality, we have shifted the security model of the Chrome web browser and V8 to process isolation.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/linus-torvalds-after-big-linux-performance-hit-spectre-v2-patch-needs-curbs\/\">Liam Tung<\/a> (via <a href=\"https:\/\/www.reddit.com\/r\/programming\/comments\/9z7ci6\/linus_torvalds_after_big_linux_performance_hit\/\">Reddit<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.zdnet.com\/article\/linus-torvalds-after-big-linux-performance-hit-spectre-v2-patch-needs-curbs\/\">\n<p>Major slowdowns caused by the new Linux 4.20 kernel have been traced to a mitigation for Spectre variant 2 that Linux founder Linus Torvalds now wants restricted.<\/p>\n<\/blockquote>\n\n<p><a href=\"http:\/\/wanderingcoder.net\/2019\/04\/10\/long-term-solutions-meltdown-spectre\/\">Pierre Lebeaupin<\/a>:<\/p>\n<blockquote cite=\"http:\/\/wanderingcoder.net\/2019\/04\/10\/long-term-solutions-meltdown-spectre\/\"><p>It&rsquo;s hard to believe it has now been more than one year since the disclosure of Meltdown and Spectre. There was so much frenzy in the first days and weeks that it has perhaps obscured the fact any solutions we currently have are temporary, barely secure, spackle-everywhere stopgap mitigations, and now that the dust has settled on that, I thought I&rsquo;d look at what researchers and other contributors have come up with in the last year to provide secure processors &#x2013; without of course requiring all of us to rewrite all our software from scratch.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/support.apple.com\/en-gb\/HT210108\">Apple<\/a> (via <a href=\"https:\/\/9to5mac.com\/2019\/05\/15\/full-mitigation-intel-cpu-mac\/\">Benjamin Mayo<\/a>):<\/p>\n<blockquote cite=\"https:\/\/support.apple.com\/en-gb\/HT210108\">\n<p>Intel has disclosed <a href=\"https:\/\/support.apple.com\/kb\/HT210107\">vulnerabilities called Microarchitectural Data Sampling (MDS)<\/a> that apply to desktop and notebook computers with Intel CPUs, including all modern Mac computers.<\/p>\n<p>Although there are no known exploits affecting customers at the time of this writing, customers who believe their computer is at heightened risk of attack can use the Terminal app to enable an additional CPU instruction and disable hyper-threading processing technology, which provides full protection from these security issues.<\/p>\n<p>[&#8230;]<\/p>\n<p>Testing conducted by Apple in May 2019 showed as much as a 40 percent reduction in performance with tests that include multithreaded workloads and public benchmarks.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/daringfireball.net\/linked\/2019\/05\/15\/apple-mds-mitigation\">John Gruber<\/a>:<\/p>\n<blockquote cite=\"https:\/\/daringfireball.net\/linked\/2019\/05\/15\/apple-mds-mitigation\">\n<p>It&rsquo;s good that there are no known exploits using these techniques, but even if there were, the overwhelming majority of Mac users &mdash; almost everyone &mdash; would not need to enable this mitigation. These MDS vulnerabilities enable malware on your computer to do bad things. But these vulnerabilities are not ways for malware to get onto your computer.<\/p>\n<\/blockquote>\n\n<p>However, it sounds like the fix is finally a way to work around the hyper-threading bug that can lead to data corruption on my iMac, amongst other Macs.<\/p>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2018\/07\/16\/mitigating-spectre-with-site-isolation-in-chrome\/\">Mitigating Spectre With Site Isolation in Chrome<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2018\/01\/03\/intel-cpu-design-flaw-necessitates-kernel-page-table-isolation\/\">Intel CPU Design Flaw Necessitates Kernel Page Table Isolation<\/a><\/li>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2017\/06\/27\/bug-in-skylake-and-kaby-lake-hyper-threading\/\">Bug in Skylake and Kaby Lake Hyper-threading<\/a><\/li>\n<\/ul>\n\n<p id=\"microarchitectural-data-sampling-mds-mitigation-update-2019-05-31\">Update (2019-05-31): <a href=\"https:\/\/twitter.com\/waxzce\/status\/1128711501206913028\">Quentin Adam<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/waxzce\/status\/1128711501206913028\">\n<p>FYI, as cloud provider we rawly loss around 25% of CPU performances the lasts 18 months due to different CVE and issues on CPU and mitigation limiting capacity using microcode, so we stuff more CPUs, but prices didn&rsquo;t go down at all... That&rsquo;s a kind of upselling. #IntelFail<\/p>\n<\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Ross Mcilroy et al. (via Hacker News): This paper explores speculative side-channel attacks and their implications for programming languages. These attacks leak information through micro-architectural side-channels which we show are not mere bugs, but in fact lie at the foundation of optimization. [&#8230;] As a result of our work, we now believe that speculative vulnerabilities [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2019-05-17T20:39:08Z","apple_news_api_id":"78709bec-65ad-4ab6-8e6e-3e3b549f983e","apple_news_api_modified_at":"2019-06-09T12:49:25Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAg==","apple_news_api_share_url":"https:\/\/apple.news\/AeHCb7GWtSraObj47VJ-YPg","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[412,1297,261,448,30,1609,504,260],"class_list":["post-25301","post","type-post","status-publish","format-standard","hentry","category-technology","tag-chromium","tag-imac","tag-intel","tag-linux","tag-mac","tag-macos-10-14","tag-malware","tag-processors"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/25301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=25301"}],"version-history":[{"count":3,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/25301\/revisions"}],"predecessor-version":[{"id":25596,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/25301\/revisions\/25596"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=25301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=25301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=25301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}