As expected, silence on Spectre v1. But nice job @arstechnica being explicit that the microcode fixes are for Spectre v2.https://twitter.com/DrPizza/status/966389985510416385 …
The scope of Spectre v1 is way bigger than things you actively think of as "sandboxes". It's unbounded attack surface. There will be clever new exploits of this for *decades* if the underlying bug is not fixed.
-
-
So no, I don't want correct speculations to cause cache misses. Preventing that would cost <1% perf to workloads with low to moderate cache miss rate. But I don't believe it's possible with just uc updates, needs bigger changes.
-
On the other hand, just turning off branch prediction should be possible with an MSR; early x86's with branch prediction actually had an MSR documented to do just that.
End of conversation
New conversation -
-
-
I don't think that's obvious at all.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.