Deutsch   English   Français   Italiano  
<20240727213309.0000773e@yahoo.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!2.eu.feeder.erje.net!feeder.erje.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Michael S <already5chosen@yahoo.com>
Newsgroups: comp.arch
Subject: Re: YASV (Yet Another Security Vulnearability)
Date: Sat, 27 Jul 2024 21:33:09 +0300
Organization: A noiseless patient Spider
Lines: 43
Message-ID: <20240727213309.0000773e@yahoo.com>
References: <v7rqbf$1ta84$1@dont-email.me>
	<20240725104113.000006e8@yahoo.com>
	<tJtoO.87238$BYv6.980@fx09.iad>
	<2024Jul26.181750@mips.complang.tuwien.ac.at>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 27 Jul 2024 20:33:17 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="ea3bb3b7965445001b26321ce138ef4c";
	logging-data="3683030"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+GNgA7Ro5jTC4xnjs6/ln8Iz2yUdQMJi0="
Cancel-Lock: sha1:g3+r+FDzLv2M/cp7Aed+dPAj5jM=
X-Newsreader: Claws Mail 4.1.1 (GTK 3.24.34; x86_64-w64-mingw32)
Bytes: 3036

On Fri, 26 Jul 2024 16:17:50 GMT
anton@mips.complang.tuwien.ac.at (Anton Ertl) wrote:

> EricP <ThatWouldBeTelling@thevillage.com> writes:
> >One thing they mention is Intel and AMD incorporating privilege level
> >tagging into the BTB, as I suggested when this all started.
> >Combine that with purging the user mode entries from the predictor
> >tables on thread switch and I would think that would shut this all
> >down.  
> 
> 1) The attacker can still attack the context (even if the notion of
>    context includes the privilege level) from within itself.  E.g.,
>    the kernel can be attacked by training the kernel-level branch
>    prediction by performing appropriate system calls, and then
>    performing a system call that reveals data through a
>    mis-speculation side channel.  IIRC such Spectre attacks have
>    already been demonstrated years ago.
> 
> 2) Users are supposedly not prepared to pay the cost of invisible
>    speculation (-5-20%, depending on which paper you read) , are they
>    prepared to pay the cost of purging the user-mode entries of branch
>    predictors on thread switches?
>    
>    My guess is that the stuff plays out as usual: The hardware
>    manufacturers don't want to implement a proper fix like invisible
>    speculation, and they suggest software mitigations like purging
>    user-mode entries on thread switch.  The software people then
>    usually consider the mitigation too expensive in performance or in
>    development effort, so only a miniscule amount of software contains
>    Spectre mitigations.
> 
> - anton

That's how it should be.
Not really attacks -> not really mitigations.
I am not willing to pay even 0.001% in performance to mitigate
non-threats. And as far as I am concerned, anything that requires
running arbitrary binary code on my computer, even on least privileged
account, is a non-threat.