Originally posted by birdie
View Post
Announcement
Collapse
No announcement yet.
MDS / Zombieload Mitigations Come At A Real Cost, Even If Keeping Hyper Threading On
Collapse
X
-
Originally posted by Michael View Post
I thought I mentioned it in the article, but yes it's coming.
It would also be funny to see how the performance of Intel CPUs after all these mitigations compares to the AMD CPU generation that everyone made fun of for having bad performance.
- Likes 3
Comment
-
Originally posted by aphysically View Post
According to the detailed Intel breakdown my 8th gen Skylake is vulnerable to all of the above. Some specific 8th gen processors have mitigations for specific types of MDS, but not mine. My laptop is a new model that was released 3 months ago.Originally posted by NateHubbard View Post
I assume you meant Cascade Lake, but I doubt that design is far enough out to have hardware corrections for this kind of thing. Probably more like Ice Lake or whatever.
Comment
-
-
-
Originally posted by kenjitamura View PostSo my question is this really Intel taking shortcuts and producing less secure architectures than AMD? Or is it just that AMD is getting less hammered by researchers and hackers looking for vulnerabilities?.
It's partly due to horrendously insecure short-cuts that only they took (Metldown: speculatively looking into privileged memory, before access clearance has been confirmed. Meanwhile AMD CPUs stall and patiently wait until access rights are confirmed), and also how much over-the-top their optimisations are pushed (their CPUs executes an insane amount of speculative steps in advance, enabling to manage whole tricks during this speculation that aren't available on AMD pipeline: see difference in susceptibility in speculative branches).
MDS/Zombieland relies on optimisations tricks that Intel is the only single company to have attempted.
AMD and ARM are a lot more conservative in their designs. It comes at a performance costs in some benchmarks. But also means that a lot less exploitable flaw are found, despite the latter (ARM) being ultra-popular on smartphone and in embed hardware, thus making it a juicy target to find exploits on (very few ARM cores do speculative execution to begin with, and very few take dangerous shortcuts like Intel - over all ARM tend to be a lot less susceptible to such attacks, even if black hat hacker would be rejoicing at the taught of mass-pwning smartphones and IoT devices).
- Likes 3
Comment
-
Just Fucking Terrific. Apparently this effects my Westmeres.
Code:cat /sys/devices/system/cpu/vulnerabilities/mds Vulnerable: Clear CPU buffers attempted, no microcode; SMT vulnerable
Guess it's time to update my my mitigation free Grub entries.
- Likes 1
Comment
-
Originally posted by starshipeleven View PostThis relies on the assumption that Intel is actually making or selling "secure" chips at all. So far they didn't.
I'm actually pretty sure they won't and will rely on the OS and the "user choice"
Comment
Comment