08 January 2018, 09:32 | #1 |
Registered User
Join Date: Feb 2016
Location: London
Posts: 335
|
Meltdown and Spectre
Hi Toni,
Lots of news recently regarding the CPU design flaws which can be exploited through Meltdown and Spectre. Do you expect the Windows patches for these issues to have any impact on WinUAE performance? I have read the CPU impact can vary greatly depending on the nature of the workload. |
08 January 2018, 10:50 | #2 |
Registered User
Join Date: Jun 2012
Location: Worksop/UK
Age: 59
Posts: 1,328
|
Only way to find out is to try it and see. Benchmarks are throwing out different results for different use cases currently so it's a case of carry on and see what happens.
Intel CPU's are hit the worse because of Meltdown, that causes the worst slowdowns. |
08 January 2018, 12:13 | #3 |
Registered User
Join Date: Dec 2007
Location: Szczecin/Poland
Posts: 424
|
FS-UAE, no JIT used, 64-bit Linux - after anti-Meltdown patch AIBB benchmark results went down by 2-4% for me.
|
08 January 2018, 12:41 | #4 | |
Registered User
Join Date: Jun 2012
Location: Worksop/UK
Age: 59
Posts: 1,328
|
Quote:
It seems to effect I/O processes the most so servers are hit particularly hard, it's also having a pretty high detrimental effect on VM's according to some reports. EDIT: Phoronix have done some testing with VM's and Wine on Linux as well as Docker, Database performance and Compilation tasks. It can be found here. It's worth keeping up with as new information is coming to light daily. Last edited by ptyerman; 08 January 2018 at 12:50. |
|
08 January 2018, 12:56 | #5 |
WinUAE developer
Join Date: Aug 2001
Location: Hämeenlinna/Finland
Age: 49
Posts: 26,505
|
It shouldn't cause anything major, core emulation does not do any OS/kernel calls (except some timing queries), I/O stuff should be similar to games.
|
08 January 2018, 13:06 | #6 |
Registered User
Join Date: Jun 2012
Location: Worksop/UK
Age: 59
Posts: 1,328
|
From all the results I've read up on, gaming is about the least effected, in some cases with no noticeable differences between KPTI enabled or disabled.
I/O is the worst effected on heavy loads such as databases and such. Basically servers and cloud computing are the hardest hit but not as much as first envisaged. |
08 January 2018, 15:00 | #7 |
son of 68k
Join Date: Nov 2007
Location: Lyon / France
Age: 51
Posts: 5,323
|
These attacks require the execution of code on the target machine, so they're not that important for the prudent enough end user...
|
08 January 2018, 15:06 | #8 |
Registered User
Join Date: Jun 2012
Location: Worksop/UK
Age: 59
Posts: 1,328
|
No, they'll probably have little effect on the normal user at all, just a minor slowdown with some software.
The biggest headaches are for the likes of Google, Microsoft, Facebook, Amazon and such, big server racks with big I/O and databases. |
08 January 2018, 15:35 | #9 |
Registered User
Join Date: Mar 2012
Location: Norfolk, UK
Posts: 1,153
|
|
08 January 2018, 15:38 | #10 |
son of 68k
Join Date: Nov 2007
Location: Lyon / France
Age: 51
Posts: 5,323
|
|
08 January 2018, 15:39 | #11 |
Registered User
Join Date: Jun 2012
Location: Worksop/UK
Age: 59
Posts: 1,328
|
Yeah, Spectre is the real monster in the room. A browser can be affected by it or anything else that uses javascript. Also there's no known way currently of fully protecting against it.
|
08 January 2018, 19:42 | #12 |
Amigan
Join Date: Feb 2012
Location: London
Posts: 1,309
|
I was reading a blog post about Meltdown and Spectre today and had a thought.
Is the 68060 susceptible to Meltdown or Spectre? After all, it does branch prediction. I would hate for someone to hack my A4000 |
08 January 2018, 19:54 | #13 | |
son of 68k
Join Date: Nov 2007
Location: Lyon / France
Age: 51
Posts: 5,323
|
Quote:
Nevertheless it's not needed on an Amiga to access system parts, just about every program can do it without any trick But nobody will hack your A4k. Because nobody is interested in hacking an Amiga anymore, you probably don't run programs from untrusted sources, and there is no sensitive data to grab from here anyway... |
|
08 January 2018, 22:33 | #14 | ||
Amigan
Join Date: Feb 2012
Location: London
Posts: 1,309
|
Quote:
Quote:
|
||
09 January 2018, 01:00 | #15 |
Registered User
Join Date: Mar 2012
Location: Norfolk, UK
Posts: 1,153
|
The 68060 preloads the instruction cache with code that might be executed, but doesn't actually execute it. Current CPUs do actually execute the code speculatively - discarding and rolling back the results if they turn out not to be needed. The problem which Meltdown and Spectre exploit is that even after discarding the results, the speculatively executed code leaves footprints in the data cache which can be detected.
|
09 January 2018, 06:17 | #16 |
Registered User
Join Date: Sep 2017
Location: Kansas, USA
Posts: 324
|
It seems to me to be a terrible idea to allow external memory reads to occur speculatively. What happens when it speculatively reads a memory mapped I/O register that is changed by reads, like the DSKBYTR register on the Amiga, which has a bit that is cleared when the register is read from?
|
09 January 2018, 09:01 | #17 |
son of 68k
Join Date: Nov 2007
Location: Lyon / France
Age: 51
Posts: 5,323
|
While a 68060 can probably prefetch data for filling its DCache, it doesn't do speculative memory accesses ('xcept maybe for fetching code).
And even if it did, I/O areas are marked by the MMU as non-cacheable (or at least they should !). x86 are immune to this - they have IN/OUT instructions for I/O. For ARM, I don't know. The tricks are : - Current operating systems map the supervisor area, or at least part of it, in the user's memory (for the sake of quick OS calling). - Current cpus (again for the sake of speed) do the memory access in the cache before checking the access rights (which takes more time). Now wondering if this kind of attack can be done from within WinUAE in JIT mode... |
09 January 2018, 09:07 | #18 | |
Registered User
Join Date: Jul 2014
Location: Finland
Posts: 1,176
|
Quote:
|
|
09 January 2018, 16:53 | #19 | |||
Registered User
Join Date: May 2014
Location: inside the emulator
Posts: 377
|
Quote:
I could do some hw hacking faster with a Pentium than with my current system. So a 90MHz in-order processor can push out more bytes than a modern 2.5+GHz 4 core out of order processor. Slow! Quote:
Quote:
Meltdown I think not as the "68k" should only be able to access the memory of the emulated Amiga anyway. Or? |
|||
09 January 2018, 17:27 | #20 | ||
son of 68k
Join Date: Nov 2007
Location: Lyon / France
Age: 51
Posts: 5,323
|
Quote:
But if they are no longer used, or declared obsolete in some way, then x86 is even worse than i supposed From what i've read AMD is vulnerable too, but only with Spectre - not Meltdown. But who knows. I don't know, it's purely academic question. Quote:
Whether it can work or not, depends on how the memory accesses are checked for validity. If it's just adding some offset then relying on the normal memory protection, then the memory outside can be accessed. |
||
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
Thread Tools | |
Similar Threads | ||||
Thread | Thread Starter | Forum | Replies | Last Post |
Spectre party demo/Phenomena | DonutKing | support.Demos | 12 | 12 December 2011 09:42 |
|
|