[Progress Communities] [Progress OpenEdge ABL] Forum Post: RE: This will be interesting -- from slashdot

  • Thread starter Thread starter gus bjorklund
  • Start date Start date
Status
Not open for further replies.
G

gus bjorklund

Guest
james, you mean you want me to do actual work? we will have to see how this pans out. there are two separate issues (Meltdown and Spectre) that are not related. and the effects of the patches will vary depending on the specific X86 processor type and model. In case you are interested, the meltdown issue can be summarized as follows: suppose you have code that does the following: if (some boolean expression) then some stuff else other stuff end. There are two possible outcomes, depending on the result of the boolean expression. Modern intel processors do what is called “speculative execution”. Simply put, this means they can execute both branches of the if at the same time as the expression is being evaluated and then throw away the result that is not needed. A modern Intel chip can have as many as 150 instructions (or maybe more) in flight in the instruction pipeline. The defect is that full privilege checks are not always executed on all the memory references. This makes it possible for one process (or thread) to access memory locations that should not be visible. While this has been known for some years amongst cpu designers, it was thought that the rate at which wrong memory could be accessed was so low that it was not practical to exploit. They were very wrong. AMD processors are not susceptible to Meltdown because Intel patented their particular speculative execution technique and security flaw and would not license it to AMD because it gave Intel a performance advantage. So AMD has to do full privilege checks on all branches.

Continue reading...
 
Status
Not open for further replies.
Back
Top