Computers & Hardware > PC Hardware

New vulnerability in Intel processors

(1/2) > >>

broadstairs:
A new issue has arisen with Intel processors, not present in AMD though. See https://www.theregister.co.uk/2018/08/14/intel_l1_terminal_fault_bugs/ here for one description. This could be as bad as Meltdown etc.....

Stuart

Peguero:
Do you think we can expect another drop in performance after they fix this? That would suck.

Weaver:
Not much detail in the stuff I read but I suspect that they have been able to improve things without crucifying performance. Disabling hyper threading in one case will knock out what 5-15% performance in some cases but I do not like hyper threading much as I suspect there are even cases where unfortunate software can end up going slower with hyper threading on than off and it is better to turn it off.

ejs:
Linux 4.18.1, my cpu bug list is getting quite long:


--- Code: ---$ cat /proc/cpuinfo
model name : Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz
bugs : cpu_meltdown spectre_v1 spectre_v2 spec_store_bypass l1tf

--- End code ---

burakkucat:
Here's a simple shell script that might be useful --


--- Code: ---#!/bin/sh

/bin/echo -e "Kernel                   -- \c"
/bin/uname -r

if [ -d /sys/devices/system/cpu/vulnerabilities ]; then
if [ -r /sys/devices/system/cpu/vulnerabilities/l1tf ]; then
/bin/echo -e "L1tf                     -- \c"
/bin/cat /sys/devices/system/cpu/vulnerabilities/l1tf
fi

if [ -r /sys/devices/system/cpu/vulnerabilities/meltdown ]; then
/bin/echo -e "Meltdown                 -- \c"
/bin/cat /sys/devices/system/cpu/vulnerabilities/meltdown
fi

if [ -r /sys/devices/system/cpu/vulnerabilities/spec_store_bypass ]; then
/bin/echo -e "Speculative Store Bypass -- \c"
/bin/cat /sys/devices/system/cpu/vulnerabilities/spec_store_bypass
fi

if [ -r /sys/devices/system/cpu/vulnerabilities/spectre_v1 ]; then
/bin/echo -e "Spectre v1               -- \c"
/bin/cat /sys/devices/system/cpu/vulnerabilities/spectre_v1
fi

if [ -r /sys/devices/system/cpu/vulnerabilities/spectre_v2 ]; then
/bin/echo -e "Spectre v2               -- \c"
/bin/cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
fi
else
/bin/echo "                         -- No data available."
fi

exit 0

--- End code ---

Navigation

[0] Message Index

[#] Next page

Go to full version