Originally posted by Michael
View Post
Announcement
Collapse
No announcement yet.
"CrossTalk" / SRBDS Is The Newest Side-Channel Vulnerability
Collapse
X
-
Michael Larabel
https://www.michaellarabel.com/
- Likes 3
-
Originally posted by NotMine999 View PostI wonder when Intel will realize that they simply ought to go back to the drawing board with a BLANK piece of paper ... what AMD did with Zen.
In other words, Intel ought to re-imagine the internals of processors rather than constantly putting lipstick on what is turning out to be a very ugly pig.
- Likes 3
Comment
-
Originally posted by Spooktra View PostMakes me wonder if someone is hell bent on tanking Intel's stock so they can buy it up cheaply and make some dough when it inevitably goes up.
It's just what happens when you have programs that fucked their way into existence, running on computers made of meat, trying to create programmable systems of complexity far greater than their ability to truly hold a model of action->consequence->repeat for the entire system.
And then you have other, similar programs running on similar meat using inadequate tools to craft poorly-designed systems with little-to-no concern for their mathematical correctness, only speed and the ability to tickle said meat's irrelevant quirks with fancy, unnecessary effects.
I can't help but wonder where we'd be if, instead of Silicon Valley's "innovation is king!" attitude in a "make us money OR STARVE AND DIE" culture, we had a "get the job done RIGHT, and take the time, prototyping, and testing to GET IT RIGHT!" attitude in a "you get the bare minimum to survive, and free access to the best means to improve yourself" culture. Maybe we'd have less of this rush-out-to-meet-quarterly-earnings nonsense, and better engineering from a wider range of people. With enough time off for personal projects to avoid mistake-creating burn-out, and maybe have less ass-covering and Wall Of Silence nonsense to boot.
You may say, I'm a dreamer...
- Likes 6
Comment
-
Here are all the details now with embargo passed - https://www.phoronix.com/scan.php?pa...rability&num=1Michael Larabel
https://www.michaellarabel.com/
- Likes 3
Comment
-
Originally posted by muncrief View PostGood lord, does it ever stop? I mean seriously, how many mitigations are there for Intel now? And I know AMD has less but it also has a significant number of them.
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full AMD retpoline, IBPB conditional, STIBP disabled, RSB filling
Vulnerability Tsx async abort: Not affected
- Likes 7
Comment
-
Originally posted by torsionbar28 View Postintel is far worse. current score, intel 8, amd 3. not including this new one. here's my 'lscpu' on my AMD desktop:
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full AMD retpoline, IBPB conditional, STIBP disabled, RSB filling
Vulnerability Tsx async abort: Not affected
It's good to know AMD has fewer vulnerabilities (my R7 3700X and Athlon 5370 display the same ones as you posted), but all of these mitigations are costly and I hope that new Ryzen silicon will eliminate them.
Intel is hobbled by decades of stagnation but AMD has a relatively clean slate to begin anew.
- Likes 2
Comment
-
And for comparison, 'lscpu' from my intel i5:
Vulnerability Itlb multihit: KVM: Vulnerable
Vulnerability L1tf: Mitigation; PTE Inversion
Vulnerability Mds: Mitigation; Clear CPU buffers; SMT disabled
Vulnerability Meltdown: Mitigation; PTI
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Full generic retpoline, IBPB conditional, IBRS_FW, STIBP disabled, RSB filling
Vulnerability Tsx async abort: Vulnerable: Clear CPU buffers attempted, no microcode
- Likes 2
Comment
Comment