by ad8e on 10/4/22, 12:39 PM with 41 comments
by MBCook on 10/8/22, 3:06 AM
Just ask!
Seriously. You can ask AMD. Maybe they won’t tell you, but they might. It might be really good info. Why not ask someone who is really knowledgeable about this stuff like a kernel developer who works on x86-64 or worked on the mitigations?
This is what I never understand about Phoronix. People link to them all the time but they run a bunch of benchmarks and then end on “there you go”. I’d like investigation into why. You won’t always get an answer but you should try.
by Ristovski on 10/4/22, 2:02 PM
> My theory is that fixing the Spectre V2 vulnerability on a hardware level would lead to fundamental architecture changes that AMD is not willing to make, because it may add so much more complexity to the architecture or it may just be too unconvenient. They probably realized that optimizing the code paths that the Linux kernel utilizes on the default mitigations mode is faster, simpler and it may involve less deeper changes, while still being secure.
> As far as I know, pretty much every CPU architecture that implements speculative execution is vulnerable to some version of Spectre, so note that this is not a fundametal flaw of AMD64.
by ZiiS on 10/8/22, 8:36 AM
by stevefan1999 on 10/8/22, 6:13 AM
by amelius on 10/8/22, 11:38 AM
by staticassertion on 10/8/22, 1:59 PM
by Havoc on 10/8/22, 12:06 AM
by sylware on 10/8/22, 10:13 AM
by simlevesque on 10/8/22, 1:12 AM