News Intel processors affected by a Kernel Memory Bug!!!

jtd871

SFF Guru
Jun 22, 2015
1,166
851
You may want to correct the spelling in your title and post to read "Kernel Memory".

While it appears that this could be a reasonably large embarrassment for Intel, CPUs are incredibly complex, and it's not TOO surprising for this to be a thing.
 

GuilleAcoustic

Chief Procrastination Officer
SFFn Staff
LOSIAS
Jun 29, 2015
3,041
4,518
guilleacoustic.wordpress.com
 

EdZ

Virtual Realist
May 11, 2015
1,578
2,108
New Intel CPU have "Kernel Memory Leak" bug, which passes the data, without checking if it is secure and by doing that they are getting more perfromance.
It's a bit more complex than that: Intel CPUs do what is known as 'speculative execution", where operations passed to the CPU are executed as soon as they can be, even if they depend on another operation to have been executed first. For example, if an operation may branch (e.g. "if A, then do B, or if C then do D"), but there may be so much spare CPU time left over in a cycle that while whole the "A or C test" operation is still executing, there is time to also do both B and D operations, and then return just the results of the correct one when the "A or C" operation has completed. The result of the next operation will already be ready to go immediately as it has already been executed.
What appears to be the security hole (and this has not been published, so is based on speculation from the public fixes in the Linux kernel) is that in the event one of those earlier operations was a privilege level check, the operation that check was supposed to be gating may have been executed when it should have been denied. In theory, the 'you weren't allowed to do that' branch operation would just be discarded and all would be well (the return would just be "no", and the actual result purged from the register), but it appears there is also some bug that allows access to the memory that operation would be putting its results into from an area that has lower privileges, between the time it is actually executed and the time it is discarded. The fix is to enforce putting the branched results in memory that is fixed to not allow privileged reads, rather than the current method of dynamically allocating it; or to not do this speculative execution at all for certain operations.
The performance impact of this in practice depends very much on the workload. If you're doing lots of virtualised I/O operations it may be a big impact. If you are gaming, doing video encoding, or pretty much any desktop workload, you're unlikely to even be able to measure the performance impact.
Except he was aware of the issue before selling them as patches were already ongoing..:)
For sure he will be sued for insider trading
It's been a mad scramble to implement fixes for this all around. It's not impossible the share sale was approved quite some time before Intel ever learnt of this flaw, as executive share sales are fairly heavily regulated and approval takes time. It may even be that the sale was actually executed just before the flaw was discovered, or it may be that the flaw was discovered between the approval process being started and the sale occurring, without a procedure to abort the sale mid-process (or post-request aborts being explicitly denied).
 

bledha

Airflow Optimizer
Feb 22, 2017
307
268
And I was thinking of "upgrading" to a Kaby Lake part from an older platform once Coffee Lake drove four core parts down. Stuff like this always makes me re-think my entire build strategy. Hey, maybe all this bad press will crash the prices? Silver lining....?

This affecting anyone else with choices for parts on upcoming or upgrading personal builds? Enterprise has a whole new landscape of potential issues.
 
  • Like
Reactions: AleksandarK

MarcParis

Spatial Philosopher
Apr 1, 2016
3,833
2,995
Video that shows performance impact on 8700k on windows 10.
As expected, no real impact on gaming performance.

However intel cpu are not fully protected from the threat