Announcement

Collapse
No announcement yet.

Bisected: The Unfortunate Reason Linux 4.20 Is Running Slower

Collapse
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • I wonder how much the new Intel cpu (like 9700k) is impacted (or not) by this performance issue.
    It has more hardware mitigations built-in, but the number of spectre variants is so large, it's hard to know which one must still be software, which impact they have, what's the equivalent story for competing chips (both AMD and ARM are impacted too)

    Comment


    • Originally posted by carewolf View Post

      That is literally the opposite of what you said in the comment I replied to.

      ... and doesn't change the fact that the no viable attacks have been demonstrated.

      -- and if you bothered reading what you link, AMD are advising against using STIBP. They are only recommending one of the three mechanisms.
      If you read my other 2 comments on the topic, you would know that I stated that AMD discourages stibp as a Spectre v2 mitigation. Furthermore, you are missing the point that they clearly state that they recommend a Spectre v2 mitigation.

      The change in mainline was made because someone felt that the current measures do not go far enough. I have neither have studied this in enough detail to know one way or another nor have access to the likely confidential information that the mainline developers are using to make their decisions to evaluate them, but I doubt that you are in any better position than I am to second guess their decisions this. Anyway, here is what I know:

      1. AMD is vulnerable to Spectre v2.
      2. This patch is written in a way that should apply this mitigation to AMD hardware, whether it needs further mitigations or not.
      3. Reports contradict #2.

      If I had access to an AMD Zen machine, I could probably figure out the contradiction.
      Last edited by ryao; 11-17-2018, 07:38 PM.

      Comment


      • Originally posted by juanrga View Post

        Yes, because AMD CPUs are invulnerable to those attacks. No wait, they aren't...
        They are invulnerable to a handful of them, such as meltdown.

        Comment


        • Originally posted by Xaero_Vincent View Post
          Seven more speculative execution vulnerabilities found. An absolute disaster for CPU design. I guess the answer is remove Hyper Threading from mainstream processors and bump up the core count and remove speculative decision making from the architecture and offset the losses with clock speed increases. 7 to 8 GHz would be good? I guess smarter and more efficient processor design means worse security.
          There is no way you can clock processors to 7 or 8 GHz for compensating for elimination of speculation. Engineers hit a frequency wall at around 4--5 GHz


          Comment


          • Originally posted by ryao View Post
            It is linear, not exponential. Voltage increases are quadratic. The unfortunate reality that higher clock speeds are dependent on voltage increases makes it cubic-ish.
            Damn that's even worse than I thought then.

            Comment


            • Originally posted by Michael View Post
              All of my AMD systems were tested with their latest BIOS releases.
              That doesn't imply that all the mitigations were enabled for them.

              Comment


              • Originally posted by ryao View Post
                They are invulnerable to a handful of them, such as meltdown.
                I guess you missed recent research and my former post:

                We also debunk implicit assumptions including that AMD processors are immune to Meltdown-type effects

                Comment


                • Originally posted by juanrga View Post

                  I guess you missed recent research and my former post:
                  They would have to demonstrate an exploit in order to debunk AMD's supposed immunity, which they did not do. No exploit in the literal sense means no exploit.

                  Comment


                  • Originally posted by juanrga View Post

                    I guess you missed recent research and my former post:
                    that's a bit disingenuous, considering that neither of the two meltdown-type vulnerabilities that affect AMD processors can cross privilege boundaries, while meltdown itself can and three other meltdown-type vulnerabilities that can cross privilege boundaries affect Intel processors, but not AMD.

                    Comment


                    • Originally posted by juanrga View Post

                      I guess you missed recent research and my former post:
                      I did not miss it. However, I only refer to Spectre v3 as Meltdown and AMD processors are reportedly immune to it,

                      Comment

                      Working...
                      X