When F00F Bug Hit 20 Years Ago, Intel Reacted the Same Way (itwire.com) 141
troublemaker_23 writes: A little more than 20 years ago, Intel faced a problem with its processors, though it was not as big an issue as compared to the speculative execution bugs that were revealed this week. The 1997 bug, which came to be known as the F00F bug, allowed a malicious person to freeze up Pentium MMX and "classic" Pentium computers. Any Intel Pentium/Pentium MMX could be remotely and anonymously caused to hang, merely by sending it the byte sequence "F0 0F C7 C8". At the time, Intel said it learnt about the bug on 7 November 1997, but a report said that at least two people had indicated on an Intel newsgroup that the company knew about it earlier before. The processor firm confirmed the existence on 10 November. But, says veteran Linux sysadmin Rick Moen, the company's reaction to that bug was quite similar to the way it has reacted to this week's disclosures.
"Intel has a long history of trying to dissemble and misdirect their way out of paying for grave CPU flaws," Moen said in a post to Linux Users of Victoria mailing list. "Remember the 'Pentium Processor Invalid Instruction Erratum' of 1997, exposing all Intel Pentium and Pentium MMX CPUs to remote security attack, stopping them in their tracks if they could be induced to run processory instruction 'F0 0F C7 C8'? "No, of course you don't. That's why Intel gave it the mind-numbingly boring official name 'Pentium Processor Invalid Instruction Erratum', hoping to replace its popular names 'F00F bug' and 'Halt-and-Catch Fire bug'."
"Intel has a long history of trying to dissemble and misdirect their way out of paying for grave CPU flaws," Moen said in a post to Linux Users of Victoria mailing list. "Remember the 'Pentium Processor Invalid Instruction Erratum' of 1997, exposing all Intel Pentium and Pentium MMX CPUs to remote security attack, stopping them in their tracks if they could be induced to run processory instruction 'F0 0F C7 C8'? "No, of course you don't. That's why Intel gave it the mind-numbingly boring official name 'Pentium Processor Invalid Instruction Erratum', hoping to replace its popular names 'F00F bug' and 'Halt-and-Catch Fire bug'."
So you're saying (Score:5, Funny)
This isn't the 0.9998356st time they've done this?
Re: (Score:1)
Re: (Score:1)
Early pentiums had a bug in floating point division that would occasionally return a close-but-wrong answer.
https://en.wikipedia.org/wiki/Pentium_FDIV_bug
Re:So you're saying (Score:5, Insightful)
Exactly... I still own a Pentium 90 with FDIV bug, couldn't manage to get it replaced. As I recall, it took Intel quite a while to acknowledge the seriousness of the FDIV issue, before they caved and opened a rather complicated exchange program. A pre-condition was to give them your credit card number... which, as a youth, I didn't have then. Also, I couldn't exactly wait out a weeks-long procedure (sending back the CPU and getting a fixed version back) without a working PC. When I first went to the shop where I bought that computer, they didn't have an exchange program yet, the next time it supposedly was already past... all BS.
Afterwards, I've been a long-time AMD customer (K6-2 350, Athlon 800, Athlon64 X2), going back to Intel for my more recent acquisitions (laptops, netbook, more recently a low-power server). I guess my next box will be a Ryzen...
Re: (Score:2)
It should be noted that while AMD is safe from Meltdown, they're still vulnerable to Spectre.
Re: So you're saying (Score:1)
Those two are not even remotely equal though. Meltdown is serious and will demand shenanigans in code to mitigate for anlong time to come: A Ryzen or Epyc purchase lets you skip that.
"Why Intel gave it the mind-numbingly boring name" (Score:2)
Continuing:
Moen, who is based in California, said that at the time, Intel's "judo-move response" was to create an information page claiming it dealt with the bug by linking to each of the various x86 OS vendors' bug-fix pages.
Again, what alternative did Intel have? It couldn't patch existing chips so it directed customers to patches provided by OS vendors.
I'm not sure I understand the point of this art
Re: (Score:3)
The "point" is that Intel, Microsoft, and many large 'technical' corporations are apparently more concerned with marketing than technical prowess. Consider that Intel spends more on marketing each year than AMDs entire R&D budget.
Maybe if they spent half the time, energy and money on technical stuff as they do on slimy marketing, this issue wouldn't have happened in the first place.
Re: (Score:2)
Re: (Score:2, Troll)
"Maybe if they spent half the time, energy and money on technical stuff as they do on slimy marketing, this issue wouldn't have happened in the first place"
You apparently have no goddamned clue about technical stuff. One of the flaws itself lies directly in how Out Of Order Execution is SUPPOSED to work.
Try taking hardware design classes before opening your mouth on a subject you clearly do not know!
Re: "Why Intel gave it the mind-numbingly boring n (Score:3)
I'm worried about this 'AMD is safe' bullshit that's been floating around. No, the Meltdown paper specifically says AMD has the same problem - out of order execution of instructions accessing protected memory - they just couldn't get the side channel to work and suggest it may just need some optimization. That doesn't mean
Re: (Score:1)
For real. This has shown that these code monkeys know zero about computer architecture. This isn't a flaw in an implementation, this is a flaw in a fundamental principle of CPU design.
I would like to issue you two challenges.
1) design a CPU from scratch that is even 1/100th as powerful as a current gen CPU.
2) Starting with x86 PIII (where this issue first existed IIRC) design a multicore part even half as good as a modern CPU.
Re: (Score:1)
I don't know if I can do those things. I do know that I can tell the truth about something I did and I offer to fix problems that I cause without trying to BS my way around the problem. It isn't about building a CPU - it''s about honesty and morals.
Re: "Why Intel gave it the mind-numbingly boring n (Score:5, Informative)
For real. This has shown that these code monkeys know zero about computer architecture. This isn't a flaw in an implementation, this is a flaw in a fundamental principle of CPU design.
You are absolutely correct here and I completely agree.
I'm worried about this 'AMD is safe' bullshit that's been floating around. No, the Meltdown paper specifically says AMD has the same problem - out of order execution of instructions accessing protected memory - they just couldn't get the side channel to work and suggest it may just need some optimization. That doesn't mean AMD is immune, it just means they haven't gotten it working - yet.
You come close here, but still miss the mark. With Meltdown, there are two components at play: out-of-order execution and observable side-effects in cache. Both Intel and AMD implement out-of-order execution. As you point out, it is a fundamental concept in modern CPU design. The problem is not that out-of-order execution takes place. The problem is that some implementations (namely Intel, and one ARM design) fail to properly protect against access to the discarded data. This could be protected against in the CPU by properly clearing the cache of results from instructions that end up being invalidated or by delaying access to those areas until authorization has been verified. I believe that AMD does the latter. The patches that have been discussed on LKML (the kernel page table isolation, or KPTI) sort of forces the CPU to do the first thing (because putting the kernel memory in a different process/address space forces a context switch, which will wipe caches, registers, etc.). So, AMD's claim that their design is immune to Meltdown is completely believable based on the facts to date. That does not mean that another vulnerability will not be found. It just means that Meltdown specifically exploits a design implementation flaw.
In fact, an AMD engineer submitted a patch to the KPTI patch set that disables KPTI for AMD CPUs. I find it extremely doubtful that, given all the publicity and scrutiny with these vulnerabilities, that AMD would come out on LKML and make a public statement of "nah, this does not apply to us" unless that were actually the case. If they are making that up, then they are committing PR suicide.
Meltdown and Spectre depend on the CPU working as intended, and that's the problem. As the papers point out, everyone has long been focused on CPU performance but we may need to accept giving up some of that performance for more security.
This absolutely correct insofar as Spectre is concerned, but not so much for Metldown.
Re: (Score:2)
You may very well be correct that Meltdown doesn't apply to AMD, but my concern is everyone's level of certainty about that isn't grounded in anything concrete at this point, at least nothing I've been able to find. The actual Meltdown research paper said it may still be possible with more effort and I don't recall anything saying they were immune, so it seems to me the certainty behind this claim is based entirely on trust in AMD's word. They may have a very good reason for their claim, but unless I see
Costs (Score:3)
Consider that Intel spends more on marketing each year than AMDs entire R&D budget.
That's because Intel is a FAR larger company than AMD. Intel spends more money on marketing than AMDs entire REVENUE. AMD had revenues last year around $4.27 billion and Intel revenues were around $59.4 billion. The companies aren't even close to being peers. AMD spends a similar percentage of revenues on marketing but they simply aren't anywhere near as big. That doesn't mean AMD cares less about marketing - it just means they don't have as much cash to spend.
The "point" is that Intel, Microsoft, and many large 'technical' corporations are apparently more concerned with marketing than technical prowess
Software companies are different animals t
Re: (Score:2)
How many CPU architectures did Intel release in the past 20 years WITHOUT security defects?
How many did you release?
Give me a break and come back when you run a 5000+ headcount development and engineering organization for two decades.
Re: (Score:1)
Re: (Score:2)
GP goes in a valid direction. But it's not exactly marketing that's been put ahead of security, it's performance. Marketing knows customers care much more about performance than safety. And are the customers wrong? Idiots, for not taking security more seriously?
Think about the security vulnerability inherent in the C library function, malloc. It can give its process access to discarded but unerased data from whatever process last used whatever region of memory the OS hands it, unless steps are taken.
Re:"Why Intel gave it the mind-numbingly boring na (Score:5, Informative)
I'm not sure I understand the point of this article.
I agree. This article is not news. Not because it is about something that happened 20 years ago, but because it is a rehash of standard PR spin and maneuvering:
This is what companies, organizations, political parties, and countries do.
Re: (Score:2)
REALLY?
Not all companies automatically do the worst thing possible. The fact that intel has a history of twisting and shouting to avoid accepting responsibility for a problem (including trying to minimize it), and avoid replacing faulty products, is a problem. It's news worthy.
Even if it's just for consumers to look at and say "well hey, maybe I should give AMD a chance". But all the better if this is fuel for a class action lawsuit, or larger market force
Re: (Score:1)
A Narcissist's Prayer
That didn't happen.
And if it did, it wasn't that bad.
And if it was, that's not a big deal.
And if it is, that's not my fault.
And if it was, I didn't mean it.
And if I did...
You deserved it.
Re: "Why Intel gave it the mind-numbingly boring n (Score:1)
Re: (Score:2)
If you make a living selling really complex stuff, then saying "aw shucks, we did not understand the technology we are producing" is not the way to enhance your sales. Meltdown and Spectre are the result a pile of very basic design errors all joined up.
Sure it can take a team of people with expensive, specialised equipment to debug a CPU, but have a look at Intel's turnover befo
Re: (Score:2)
This is what's is objectionable about Intel's behavior
"He ended up having to "prove" to Intel that he was doing things correctly and that their chip was doing math wrong, and before he got a replacement CPU he had to sign an NDA. After doing all of that over the course of weeks/months he finally got a new chip--and then a week or two after that Intel publicly admitted to the fuck up and replaced everyone's chip for free"
Having to prove he was doing things right is perfectly fine but making a customer who ha
Re: (Score:2)
Assholery and "how things work" are not mutually exclusive. Ask any of the #MeToo complainants.
Re: "Why Intel gave it the mind-numbingly boring (Score:1)
Re: (Score:2)
Keep crying. I'm sure businesses will start taking risks that could cost them billions if you whine loud enough.
Businesses depend to some extent on the goodwill of their customers.
And not only do they frequently make the wrong decision in handling product flaws, they stubbornly refuse to learn that the coverup usually has a worse outcome than the crime.
Re: "Why Intel gave it the mind-numbingly borin (Score:1)
Re: "Why Intel gave it the mind-numbingly boring (Score:1)
I'm way more upset about the Intel ME. That is a far greater and easily exploited vulnerability. Fixing this is just putting lipstick on a pig
Re: (Score:2)
Re: (Score:2)
I'm not sure I understand the point of this article.
Condolences. But if you ponder long and hard, you might spot the pattern [tomshardware.com]
Rick Moen
rick@linuxmafia.com
How will they react... (Score:1)
Re: How will they react... (Score:2, Funny)
Despite the constant negative PR
0xC0FEFE
Random guy on internet angry at Intel (Score:1)
I'm pissed at them too - where is my slashdot article?
Execute, not send (Score:5, Insightful)
Re: (Score:3)
Re: (Score:2)
not a huge deal 20 years ago, when computers with Intel CPUs were almost always single-user machines
20 years ago we'd had Windows 95 OSR 2 and Windows 98 was close to shipping. People were already hooked up to the Internet and all that shoddy code with its buffer overflows and use-after-free bugs was pristine and untroubled by fuzzers and static analysis. It wasn't a huge deal because writing remote exploits hadn't yet become popular, not because such exploits were impossible. And, of course, there was a hacky sort of OS mitigation.
Re: (Score:2)
'merely by sending it the byte sequence "F0 0F C7 C8".'
à am pretty sure that it wasn't enough to "send" the byte sequence. That assumes that you could trigger the bug remotely. Instead you would need to execute that code sequence, so you need permissions to install software. Still bad, but not a huge deal 20 years ago, when computers with Intel CPUs were almost always single-user machines.
There were many ways to remotely kill or compromise machines back then. A friend who worked tech support would get pesky customers off the phone by WinNuke'ing them
Seriously? (Score:2)
"Still bad, but not a huge deal 20 years ago, when computers with Intel CPUs were almost always single-user machines."
20 years ago was 1998, not 1968, and Linux and WinNT were both online as servers back then so your comment is nonsense. Are you a Millenial by any chance? If you are then an FYI - the modern world didn't start when you were born.
Re: (Score:2)
Multiple users not logged in at the same time? Maybe not on NT, but on Linux I assume you've heard of telnet logins?
Re: (Score:3)
Otherwise NSA wouldn't have allowed this bug to go public.
Re: (Score:2)
Re: (Score:2)
It's true that AMD isn't affected by Meltdown
According to the AC. AMD, on the other hand, says they are indeed affected. [amd.com]
Re: (Score:2)
That's Spectre, not Meltdown. Meltdown is far more egregious, and carries the huge performance penalty.
Re: (Score:2)
That's Spectre, not Meltdown. Meltdown is far more egregious, and carries the huge performance penalty.
If you say so. I'm no expert on this stuff. The writeup on Hacker News [thehackernews.com] certainly makes Spectre appear to be serious and difficult to mitigate:
The second problem, Spectre (paper), is not easy to patch and will haunt people for quite some time since this issue requires changes to processor architecture in order to fully mitigate.
Spectre attack breaks the isolation between different applications, allowing the attacker-controlled program to trick error-free programs into leaking their secrets by forcing them
Re: (Score:1)
AMD has released a "disable" feature for their ME-analogue. The motherboard BIOS has to support it though, and who the f_ knows if it actually works. I think we need to go back to dipper switches and jumpers so we can physically disable parts of the system.
Re: (Score:1)
Re: (Score:2)
Already Spinning it in their FAQ (Score:2)
Is this a bug in Intel hardware or processor design?
No. This is not a bug or a flaw in Intel products. These new exploits leverage data about the proper operation of processing techniques common to modern computing platforms, potentially compromising security even though a system is operating exactly as it is designed to. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.
Re: (Score:2)
This bug is much worse (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2)
What about the rest of them? (Score:2)
Re:What about the rest of them? (Score:4, Informative)
Re: (Score:2)
They don't. Spectre is an industry-wide problem. The far more egregious Meltdown seems to be an Intel problem.
Re: (Score:2)
Differences of Intel's most famous 3 problems (Score:5, Informative)
The Pentium FDIV bug:
No sane way to workaround at all, and no way to work around it in real mode operating systems, which mattered a lot at the time. Intel ultimately forced to do a recall because they could not provide accurate results for applications. Three models (60, 66, and 90mhz) exposed and caught *relatively* early and volumes were manageable.
F00F bug:
Feasible OS workarounds for protected mode operating systems with no performance impact. Real mode operating systems still mattered, but if you were running real mode there were tons of other ways to freeze the whole system so F00F wasn't that interesting in real mode anyway. Workarounds looked *ugly*, but they were cheap. Intel screwed up, but software workaround was pretty appropriate.
Meltdown:
There are workarounds, but could be very expensive. At the same time, they have two decades of exposed products and much higher volumes than they had before. So the scope of a recall would be way more massive. The workaround results in reduced performance, not incorrect results. If anything were to happen, I'd bet some sort of small rebate or credit for the performance loss, and telling the world to just deal with the performance impact if they care about security.
Re: (Score:2)
At the same time, they have two decades of exposed products and much higher volumes than they had before. So the scope of a recall would be way more massive.
If a recall were to happen, I would imagine it would only apply to chips made within the past 5 years. Anything else would be considered EOL and thus not covered by the recall.
re: last 5 years (Score:2)
I agree. That's certainly how they'd handle a recall in a "worst case" scenario. They're not going to offer to give you brand new CPUs in exchange for obsolete ones over 5 years old. Heck, they can argue that if you used it that long, you fully got your money's worth out of it, regardless of the current issue.
It'll be interesting to see how this plays out. But I wouldn't be surprised if we wind up with a "mixed" situation, where server class Xeon processors, primarily used in Enterprise cloud environments,
Re: (Score:2)
I agree. That's certainly how they'd handle a recall in a "worst case" scenario. They're not going to offer to give you brand new CPUs in exchange for obsolete ones over 5 years old.
"Obsolete" is very subjective.
e.g. I have an intel i7-3930K, 6-core with hyperthreading. It's from Q4 2011, and now labeled as EOL by Intel.
However, despite the age still performs neck-on-neck with the Intel I7-7700K 4.2GHz, released on Q1 2017. (cpubenchmark.net Passmark score of the I7-3930K = 12,025, I7-7700K=12,087)
re: subjective (Score:2)
Sure ... but the same argument ALWAYS gets made with older technology. I used to work for a manufacturing business that would never let go of some of their high speed 132 column dot-matrix line printers. Everyone who saw them cried, "Ancient tech! Obsolete! Get rid of it!" But the reality was, I.T. staff weren't clueless. They tried to "upgrade" those many times before, but discovered reasons it was better to keep the status quo. (Among other things, the company relied on multi-part forms because there w
Re: (Score:2)
Of course that's jumping from the 'e' line to the 'normal' desktop line. The closest match would now be i9-7940X or i9-7920X, 12 to 14 cores.
Re: (Score:2)
Re: (Score:2)
Meltdown: There are workarounds, but could be very expensive. At the same time, they have two decades of exposed products and much higher volumes than they had before. So the scope of a recall would be way more massive. The workaround results in reduced performance, not incorrect results. If anything were to happen, I'd bet some sort of small rebate or credit for the performance loss, and telling the world to just deal with the performance impact if they care about security.
"way more more massive" doesn't even begin to cover it -- it would include almost every single processor they manufactured over the past 20 years. Even if they wanted to, it would take them longer to manufacturer everyone a replacement processor than the remaining economical lifespan of your computer in the first place... CPU manufacturing plants are insanely expensive, and I seriously doubt that intel has enough spare capacity to 'just' redo their entire production run of the past 5 years on top of their n
All around the PCI Bus... (Score:1)
The monkey chase the intel
The monkey thought t`was all in fun
FOOF goes the intel
Modern x86 CPUs are riddled with bugs (Score:2)
Both AMD and Intel routinely put out addendums detailing bugs on their CPUs and chipsets. These are normally addressed at BIOS or OS level.
This is different though. Meltdown and Spectre are a result of how branch prediction works on pretty much all modern CPUs and are difficult - if not impossible - to shield from on existing hardware.
Re: (Score:2)
I wonder if microcode could be patched to *undo* caching of data which would have triggered a memory permission exception?
It's not a monolith. (Score:2)
" .. but a report said that at least two people had indicated on an Intel newsgroup that the company knew about it earlier before[SIC]..."
But the company is not a monolith, with a single brain that is aware of all the reports from all the employees. Some parts of the company knew about the bug earlier. Other parts of the company who should have acted to fix it and disclose it did not do the right thing.
If we blame wholesale "Intel" then Intel will close ranks and perps will enjoy some amount of protection.
The same thing happens when we generally blame "Police Brutality" or "Islam
Re: (Score:2)
Can't get Meltdown/Spectre JS exploit to work (Score:2)
I've tried this exploit code [react-etc.net] on Win10 with full updates in FF+Chrome+IE, and on LineageOS 14.1-something on FF+Chrome+stock browser. All just give the output "0".
Re: (Score:2)
I've tried this exploit code [react-etc.net] on Win10 with full updates in FF+Chrome+IE, and on LineageOS 14.1-something on FF+Chrome+stock browser. All just give the output "0".
If you've applied the latest patches, then you're already protected. MS released the patch on Wednesday, January 3rd. I see from a quick search that LineageOS is an Android distro. Google announced their patch early this week, though I don't know which Android distros have incorporated it and pushed a new release. Assuming the exploit you linked is legit, you probably want to test it with an unpatched system instead.
Re: (Score:2)
Re: (Score:2)
This explains how the source works:
https://spectreattack.com/spec... [spectreattack.com]
Apparently it was only intended to work on Chrome. If it works, it should output a small memory dump.
No, not "merely by sending" (Score:2)
merely by sending it the byte sequence "F0 0F C7 C8"
Sending, really? What, down a modem, via email, on a webpage?
No, you have to get the computer to execute that byte sequence. That involves a bit more than "sending."
Re: (Score:2)
Sending, really? What, down a modem, via email, on a webpage?
Reporter Sam Varghese did slightly misstate things in that sentence, but then quoted me a couple of sentences later with the full picture:
You know, reading with context with improve your life. Give it a t
Maybe this will prompt a change (Score:2)
Re: (Score:2)
You still don't know about these [wikipedia.org]?
Re: (Score:2)
oups, I missed the "fab" part.
But why should Apple waste time and money building their own fabs and then pouring more money to keep them up-to-date? They're not manufacturing their own computers, their own RAM, their own SSD chips, etc.
Pentium Processor Invalid Instruction Erratum' (Score:2)
No. But I remember the one 1996.987390689