netkas.org forum

General Category => OSX and Graphics Cards => Topic started by: Spacedust on January 27, 2018, 11:32:27 PM



Title: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on January 27, 2018, 11:32:27 PM
Apple claims Macs are safe under macOS, but how about Windows?

inSpectre reports under Windows 7 on my Mac Pro 5,1:

Quote
Spectre & Meltdown Vulnerability
and Performance Status

Vulnerable to Meltdown: NO
Vulnerable to Spectre: YES!
Performance: SLOWER

If I disable this Meltdown patch I've got instantly about 13-15% more CPU power!

To patch Spectre under Windows we need another firmware (EFI) update which should be released at least for Mac Pro 5,1.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Squishy Tia on January 28, 2018, 06:09:43 AM
I don't see how that machine wouldn't be vulnerable to Meltdown as the CPU still does speculative processing even in Windows via Boot Camp. I would say that inSpectre doesn't know how to handle the Macs and their proprietary EFI configurations.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on January 29, 2018, 12:41:38 PM
You're referring to Spectre. Meltdown can be patched via kernel update and that was done via simple Windows update.

Without Meltdown patch:

(https://scontent-waw1-1.xx.fbcdn.net/v/t1.0-9/19554718_1856010198022864_5271605021264095822_n.jpg?oh=66085330a8a4d82663da98cfdf48da3c&oe=5AE9A091)

With Meltdown patch - performance drop is about 13%:

(https://scontent-waw1-1.xx.fbcdn.net/v/t1.0-9/26903635_1856010194689531_7867259713475373755_n.jpg?oh=2b6f851de1ff690c949f5abeb3b49ff7&oe=5B23F9A5)


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on February 27, 2018, 03:36:15 PM
Latest update from Intel shows we are now in Pre-Beta stage:

Westmere
EP, WS
Intel® Xeon® Processor E5603, E5606, E5607, E5620,
E5630, E5640, E5645, E5649
Intel® Xeon® Processor L5609, L5618, L5630, L5638,
L5640
Intel® Xeon® Processor W3670, W3680
Intel® Xeon® Processor X5647, X5650, X5660, X5667,
X5670, X5672, X5675, X5677, X5680, X5687, X5690,
X5698

https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on March 08, 2018, 04:07:12 PM
Beta stage now ;-)

https://newsroom.intel.com/wp-content/uploads/sites/11/2018/03/microcode-update-guidance.pdf


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: mysticalos on March 21, 2018, 05:59:35 AM
the problem is, even if you do update micro, you'd probably have to hack macOS, since the software fix simply just always runs. It doesn't check "hey do I need to run" as far as I know


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on March 21, 2018, 06:57:47 PM
It would probably only work under Windows when installed manually or Apple would need to release a new BIOS (firmware) so it would be a permanent fix.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on March 30, 2018, 06:23:56 PM
I just tested manual upgrading the microcode today on some Core i3 4th gen series system which didn't got BIOS update since 2015 and it worked ;)


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: h9826790 on March 30, 2018, 10:01:09 PM
The 10.13.4 Full installer contain a firmware update for the cMP 5,1. The version now is MP51.0085.B00. Not sure if this update is related to Meltdown and Spectre.
(https://forums.macrumors.com/attachments/screen-shot-2018-03-31-at-00-13-42-copy-jpg.756252/)



Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: mysticalos on March 31, 2018, 12:41:08 AM
Doubt it. it's simply more likely an updated APFS patch since they updated the efi driver for it in this update


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on March 31, 2018, 07:49:44 PM
Amazing find! My normal update did not update the firmware. I need to download full installer to get the latest firmware now.

Then I will switch back to Windows again and report. Intel din't release patches for our old Xeons yet, but maybe Apple is providing some betas at least.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on March 31, 2018, 08:24:58 PM
Damn, they still haven't fix that bug with updating firmware - native Mac Pro 5,1 simply does not shutdown after clicking Shutdown button in installer. I need to install 10.9.5 on a clean drive just to make firmware update.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: lowrider on March 31, 2018, 08:34:20 PM
^^^^What do you mean?  I've updated my FW 3 times since HS was first introduced.  The last update was yesterday to FW MP51.0085.B00.  Are you using a GPU with a Mac EFI? 

Lou


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Rominator on March 31, 2018, 08:44:11 PM
Yeah, I doubt Apple would expect everyone to keep a 10.9.5 install handy.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on March 31, 2018, 10:58:37 PM
I've used standard flashed R9 280 (aka HD7950) for update and Mavericks did the trick.

Spectre is still unpatched but firmware (BIOS) is now dated 02/02/2018 ;)

Also please note it's a native 5,1 (2010) made at the beginning of 2012. Maybe it only works well on 5,1 machines with Mid-2012 serial number.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: lowrider on April 01, 2018, 04:25:12 AM
I've used standard flashed R9 280 (aka HD7950) for update and Mavericks did the trick.

Spectre is still unpatched but firmware (BIOS) is now dated 02/02/2018 ;)

Also please note it's a native 5,1 (2010) made at the beginning of 2012. Maybe it only works well on 5,1 machines with Mid-2012 serial number.


My 5,1 is a 2010 model.  Again, no issues.  GPU is an MVC flashed GTX 1080.

Lou


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: h9826790 on April 01, 2018, 09:54:06 AM
My cMP is a 2009 model flashed to 5,1. The latest firmware update performed directly by the HS installer.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: mysticalos on April 01, 2018, 09:56:33 PM
I highly doubt apple will patch spectre or meltdown in an old machine. These machines are literally just getting apfs.efi flashes when apple upgrades the apfs driver. (which they did with 10.13.4, they didn't with .3 or any of supp updates. Last update of driver was 10.13.2 i think).

The mac EFI has to have latest apfs firmware for booting 10.13.x until the software apfs driver takes over.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Rominator on April 03, 2018, 04:02:35 AM
So the only way to get the new firmware is to download the entire OS?

I ran the Combo and I'm still on 84.

Seems kinda silly, guess it isn't a life & death thing.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: lowrider on April 03, 2018, 05:40:09 AM
^^^^I downloaded the full Installer. Ran it just to install the FW update. I then used the Combo Updater to update from 10.13.3 to 10.13.4.

Lou


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on April 03, 2018, 10:48:30 AM
So the only way to get the new firmware is to download the entire OS?

I ran the Combo and I'm still on 84.

Seems kinda silly, guess it isn't a life & death thing.

I first updated to 10.13.4 with firmware 84. Then installed OS X 10.9.5 on a clean SSD and downloaded full 10.13.4 installer from AppStore and just updated the firmware to 85. Finally placed the original drive again and all works well with firmware 85.

CPU-Z now reports:  BIOS
Apple Inc. MP51.88Z.0085.B00.1802021746 (02/02/18)


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on April 04, 2018, 06:30:00 PM
https://newsroom.intel.com/wp-content/uploads/sites/11/2018/04/microcode-update-guidance.pdf

Nehalem EP, Nehalem WS and Westmere EP, WS now in production!

Now they just need to update this file: https://downloadcenter.intel.com/download/27591/Linux-Processor-Microcode-Data-File?product=873


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on May 02, 2018, 04:34:19 PM
Here it is: https://downloadcenter.intel.com/download/27776/Linux-Processor-Microcode-Data-File?v=t

Sadly they've removed microcode.dat from the package. We need to create it on our own.

Update, no Westmere inside it:

Quote
== 20180425 Release ==
-- Updates upon 20180312 release --
Processor             Identifier     Version       Products
Model        Stepping F-MO-S/PI      Old->New
---- updated platforms ------------------------------------
GLK          B0       6-7a-1/01 0000001e->00000022 Pentium Silver N/J5xxx, Celeron N/J4xxx
---- removed platforms ------------------------------------
BDX-ML       B/M/R0   6-4f-1/ef 0b000021           Xeon E5/E7 v4; Core i7-69xx/68xx

-- Special release with caveats --
BDX-ML       B/M/R0   6-4f-1/ef           0b00002c Xeon E5/E7 v4; Core i7-69xx/68xx


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on July 25, 2018, 11:49:14 PM
Finally Apple updated Microcode inside 89 firmware in 10.13.6 and my old Mac Pro 2010 is now immune for Meltdown and Spectre under Windows 7 ;-)

For the first time it shutdown when needed. No need to install Mavericks again.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on August 12, 2018, 01:21:02 PM
I've runned linux checker and it shows Mac Pro is still vulnerable for Spectre Variant 3a and 4 so Apple needs to update microcodes again!

Quote
[root@livedvd Desktop]# ./spectre-meltdown-checker.sh                       
Spectre and Meltdown mitigation detection tool v0.38+                       

Checking for vulnerabilities on current system
Kernel is Linux 2.6.32-754.el6.x86_64 #1 SMP Tue Jun 19 21:26:04 UTC 2018 x86_64
CPU is Intel(R) Xeon(R) CPU           X5675  @ 3.07GHz                         

Hardware check
* Hardware support (CPU microcode) for mitigation techniques
  * Indirect Branch Restricted Speculation (IBRS)           
    * SPEC_CTRL MSR is available:  YES                     
    * CPU indicates IBRS capability:  YES  (SPEC_CTRL feature bit)
  * Indirect Branch Prediction Barrier (IBPB)                     
    * PRED_CMD MSR is available:  YES                             
    * CPU indicates IBPB capability:  YES  (SPEC_CTRL feature bit)
  * Single Thread Indirect Branch Predictors (STIBP)             
    * SPEC_CTRL MSR is available:  YES                           
    * CPU indicates STIBP capability:  YES  (Intel STIBP feature bit)
  * Speculative Store Bypass Disable (SSBD)                         
    * CPU indicates SSBD capability:  NO                             
  * Enhanced IBRS (IBRS_ALL)                                         
    * CPU indicates ARCH_CAPABILITIES MSR availability:  NO         
    * ARCH_CAPABILITIES MSR advertises IBRS_ALL capability:  NO     
  * CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO):  NO
  * CPU explicitly indicates not being vulnerable to Variant 4 (SSB_NO):  NO
  * Hypervisor indicates host CPU might be vulnerable to RSB underflow (RSBA):  NO                                                                             
  * CPU microcode is known to cause stability problems:  NO  (model 0x2c family 0x6 stepping 0x2 ucode 0x1e cpuid 0x206c2)                                     
* CPU vulnerability to the speculative execution attack variants               
  * Vulnerable to Variant 1:  YES                                               
  * Vulnerable to Variant 2:  YES                                               
  * Vulnerable to Variant 3:  YES                                               
  * Vulnerable to Variant 3a:  YES                                             
  * Vulnerable to Variant 4:  YES                                               

CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Mitigated according to the /sys interface:  YES  (Mitigation: Load fences)
* Kernel has array_index_mask_nospec:  NO                                   
* Kernel has the Red Hat/Ubuntu patch:  YES                                 
* Kernel has mask_nospec64 (arm64):  NO                                     
> STATUS:  NOT VULNERABLE  (Mitigation: Load fences)                       

CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigated according to the /sys interface:  YES  (Mitigation: Full retpoline)
* Mitigation 1                                                                 
  * Kernel is compiled with IBRS support:  YES
    * IBRS enabled and active:  NO
  * Kernel is compiled with IBPB support:  YES
    * IBPB enabled and active:  YES
* Mitigation 2
  * Kernel has branch predictor hardening (arm):  NO
  * Kernel compiled with retpoline option:  YES
    * Kernel compiled with a retpoline-aware compiler:  YES  (kernel rel retpoline compilation)
    * Retpoline is enabled:  YES
> STATUS:  NOT VULNERABLE  (Full retpoline + IBPB are mitigating the vuty)

CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Mitigated according to the /sys interface:  YES  (Mitigation: PTI)
* Kernel supports Page Table Isolation (PTI):  YES
  * PTI enabled and active:  YES
  * Reduced performance impact of PTI:  YES  (CPU supports PCID, perforact of PTI will be reduced)
* Running as a Xen PV DomU:  NO
> STATUS:  NOT VULNERABLE  (Mitigation: PTI)

CVE-2018-3640 [rogue system register read] aka 'Variant 3a'
* CPU microcode mitigates the vulnerability:  NO
> STATUS:  VULNERABLE  (an up-to-date CPU microcode is needed to mitigaulnerability)

CVE-2018-3639 [speculative store bypass] aka 'Variant 4'
* Mitigated according to the /sys interface:  NO  (Vulnerable)
* Kernel supports speculation store bypass:  YES  (spec_store_bypass)
> STATUS:  VULNERABLE  (Your CPU doesn't support SSBD)

Need more detailed information about mitigation options? Use --explain
A false sense of security is worse than no security at all, see --discl


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on August 15, 2018, 10:04:11 PM
Another firmware update and it seems they've patched Spectre Variant 3a and 4:

Quote
Spectre and Meltdown mitigation detection tool v0.39+                       
                                                                                                                       
Checking for vulnerabilities on current system                                                                         
Kernel is Linux 2.6.32-754.el6.x86_64 #1 SMP Tue Jun 19 21:26:04 UTC 2018 x86_64                                       
CPU is Intel(R) Xeon(R) CPU           X5675  @ 3.07GHz                                                                   

Hardware check
* Hardware support (CPU microcode) for mitigation techniques
  * Indirect Branch Restricted Speculation (IBRS)           
    * SPEC_CTRL MSR is available:  YES                     
    * CPU indicates IBRS capability:  YES  (SPEC_CTRL feature bit)
  * Indirect Branch Prediction Barrier (IBPB)                                                                                   
    * PRED_CMD MSR is available:  YES                                                                                           
    * CPU indicates IBPB capability:  YES  (SPEC_CTRL feature bit)                                                             
  * Single Thread Indirect Branch Predictors (STIBP)                                                                           
    * SPEC_CTRL MSR is available:  YES                                                                                         
    * CPU indicates STIBP capability:  YES  (Intel STIBP feature bit)                                                           
  * Speculative Store Bypass Disable (SSBD)                                                                                     
    * CPU indicates SSBD capability:  YES  (Intel SSBD)                                                                         
  * Enhanced IBRS (IBRS_ALL)                                                                                                   
    * CPU indicates ARCH_CAPABILITIES MSR availability:  NO                                                                     
    * ARCH_CAPABILITIES MSR advertises IBRS_ALL capability:  NO                                                                 
  * CPU explicitly indicates not being vulnerable to Meltdown (RDCL_NO):  NO
  * CPU explicitly indicates not being vulnerable to Variant 4 (SSB_NO):  NO
  * Hypervisor indicates host CPU might be vulnerable to RSB underflow (RSBA):  NO
  * CPU microcode is known to cause stability problems:  NO  (model 0x2c family 0x6 stepping 0x2 ucode 0x1f cpuid 0x206c2)
  * CPU microcode is the latest known available version:  YES  (you have version 0x1f and latest known version is 0x1f)
* CPU vulnerability to the speculative execution attack variants
  * Vulnerable to Variant 1:  YES
  * Vulnerable to Variant 2:  YES
  * Vulnerable to Variant 3:  YES
  * Vulnerable to Variant 3a:  YES
  * Vulnerable to Variant 4:  YES

CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1'
* Mitigated according to the /sys interface:  YES  (Mitigation: Load fences)
* Kernel has array_index_mask_nospec:  NO
* Kernel has the Red Hat/Ubuntu patch:  YES
* Kernel has mask_nospec64 (arm64):  NO
> STATUS:  NOT VULNERABLE  (Mitigation: Load fences)

CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2'
* Mitigated according to the /sys interface:  YES  (Mitigation: Full retpoline)
* Mitigation 1
  * Kernel is compiled with IBRS support:  YES
    * IBRS enabled and active:  NO
  * Kernel is compiled with IBPB support:  YES
    * IBPB enabled and active:  YES
* Mitigation 2
  * Kernel has branch predictor hardening (arm):  NO
  * Kernel compiled with retpoline option:  YES
    * Kernel compiled with a retpoline-aware compiler:  YES  (kernel reports full retpoline compilation)
    * Retpoline is enabled:  YES
> STATUS:  NOT VULNERABLE  (Full retpoline + IBPB are mitigating the vulnerability)

CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3'
* Mitigated according to the /sys interface:  YES  (Mitigation: PTI)
* Kernel supports Page Table Isolation (PTI):  YES
  * PTI enabled and active:  YES
  * Reduced performance impact of PTI:  YES  (CPU supports PCID, performance impact of PTI will be reduced)
* Running as a Xen PV DomU:  NO
> STATUS:  NOT VULNERABLE  (Mitigation: PTI)

CVE-2018-3640 [rogue system register read] aka 'Variant 3a'
* CPU microcode mitigates the vulnerability:  YES
> STATUS:  NOT VULNERABLE  (your CPU microcode mitigates the vulnerability)

CVE-2018-3639 [speculative store bypass] aka 'Variant 4'
* Mitigated according to the /sys interface:  YES  (Mitigation: Speculative Store Bypass disabled via prctl)
* Kernel supports speculation store bypass:  YES  (spec_store_bypass)
> STATUS:  NOT VULNERABLE  (Mitigation: Speculative Store Bypass disabled via prctl)

CVE-2018-3615/3620/3646 [L1 terminal fault] aka 'Foreshadow & Foreshadow-NG'
> STATUS:  VULNERABLE  (your CPU is known to be vulnerable, and your kernel doesn't report that it mitigates the issue, but more thorough mitigation checking by this script is being worked on (check often for new versions!))

Need more detailed information about mitigation options? Use --explain
A false sense of security is worse than no security at all, see --disclaimer


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on August 15, 2018, 10:35:02 PM
Another amazing find! This new firmware fixes a bug causing all MVC flashed cards from Maxwell and Pascal series to stay on PCIe 1.1 when resuming from standby under Windows. It only worked on clean boot before, now I've resumed from standby on my Windows 7 and it remained on PCIe 2.0  :D


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: netkas on August 16, 2018, 09:46:28 AM
Hope they don't block unsigned fw upgrades liek it's on modern macs.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: Spacedust on August 16, 2018, 12:02:59 PM
Probably they will, it's some sort of security measure.


Title: Re: Spectre/Meltdown patches for Mac Pro and others
Post by: forbiddenera on November 17, 2018, 06:33:42 AM
I don't want to melt!