Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

ACUConfig is the Intel recommended way, per the mitigation guide (at least for now, until a patch is released).


sort by: page size:

Some mitigations also apply to AMD CPUs.

He is aware, but sidestepped these issues. so this code is only recommended on the newest Cannon Lake processors, but we really want to know for which CPU which method is best. What about AMD Rome e.g.?

Depends on what CPU you are running, on Zen 4 it's not supported to disable the mitigations and caused bugs/crashes. I think they did fix that exact crash but I'd still not recommend it. New CPUs from both AMD and Intel are designed to be run with at least the default mitigations on.

Between shenanigans like this and Spectre/Meltdown mitigations giving me a ~20% performance hit [1], I avoid Intel like the plague if I have the choice.

[1] https://arxiv.org/pdf/1807.08703.pdf


Intel FUD. AMD is not affected.

This almost calls from a microcode patch or kernel driver from AMD to mitigate this, if at all possible.

Is this equally true for AMD CPUs? Does the kernel offer different mitigations per CPU or one unified set of strategies?

The new mkl_serv_intel_cpu_true() function seems to have been known since Agner Fog's 2019 update. I am quite surprised that no changes to the feature indicator was needed though.

If you are publishing an application, I still recommend using the intel_dispatch_patch.zip.


No, other way around. The patch which decreases Intel performance has already occurred. This patch AMD saying "we don't need this, so we're disabling it for AMD CPUs."

I thought it was clear that this patch only applies to AMD. However, reading the comments here confuses me. How's does the performance on Intel drops with this?

I believe AMD has been contributing upstream to intel-cmt-cat, and Intel has accepted those patches.

Since AMD has equally no obligation to Intel users, they can submit a patch that replaces Intel's

    if (intel)
        fast();
    else
        slow();
with

    if (amd)
        fast();
    else
        slow();
Or maybe there's a better way.

I disabled these mitigations on my i5-2500k a year ago and it felt like buying a new CPU. Sandy Bridge was hit hard.

Or just keep using AMD CPUs, because yet again they are unaffected https://www.amd.com/en/corporate/security-updates

Interesting. I guess they must have finally stopped intentionally crippling ICC for non-intel processors[0].

[0] http://www.agner.org/optimize/blog/read.php?i=49#49



>Tuned.

Intel on HPCs.


A bunch of people keep saying this with no substantiation - the best we saw was a link to the latest Intel optimization manual that quite specifically refutes this claim. I even quoted it upthread.

Do you have anything substantial to add to that?


This is how it should be. And this is going to net positive thing for AMD.

If performance takes a hit by about 20% it is going to be noticeable. Next up I think people will start looking to upgrade to a faster CPU just to get back to last week's performance metrics. They might now consider AMD.

If AMD finds this affects them less they should sponsor security researchers writing proof of concept exploits to convince people that that turning off the mitigation is an absolute no-no, so it will for force people to take a performance hit and go shopping for CPUs.

next

Legal | privacy