Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <3a691dbdc80ebcc98d69c3a234f4135b@www.novabbs.org>
Deutsch   English   Français   Italiano  
<3a691dbdc80ebcc98d69c3a234f4135b@www.novabbs.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.misty.com!weretis.net!feeder9.news.weretis.net!i2pn.org!i2pn2.org!.POSTED!not-for-mail
From: mitchalsup@aol.com (MitchAlsup1)
Newsgroups: comp.arch
Subject: Re: Privilege Levels Below User
Date: Tue, 11 Jun 2024 00:27:02 +0000
Organization: Rocksolid Light
Message-ID: <3a691dbdc80ebcc98d69c3a234f4135b@www.novabbs.org>
References: <jai66jd4ih4ejmek0abnl4gvg5td4obsqg@4ax.com> <h0ib6j576v8o37qu1ojrsmeb5o88f29upe@4ax.com> <2024Jun9.185245@mips.complang.tuwien.ac.at> <38ob6jl9sl3ceb0qugaf26cbv8lk7hmdil@4ax.com> <2024Jun10.091648@mips.complang.tuwien.ac.at> <o32f6jlq2qpi9s1u8giq521vv40uqrkiod@4ax.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: i2pn2.org;
	logging-data="3811913"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="65wTazMNTleAJDh/pRqmKE7ADni/0wesT78+pyiDW8A";
User-Agent: Rocksolid Light
X-Rslight-Site: $2y$10$EqwPKooGacTPf1MSSABeSuaLH9sUrsK4KMwRo27Ad4MHSevqnSzCy
X-Spam-Checker-Version: SpamAssassin 4.0.0
X-Rslight-Posting-User: ac58ceb75ea22753186dae54d967fed894c3dce8
Bytes: 5201
Lines: 89

John Savard wrote:

> On Mon, 10 Jun 2024 07:16:48 GMT, anton@mips.complang.tuwien.ac.at
> (Anton Ertl) wrote:

>>John Savard <quadibloc@servername.invalid> writes:

>>>In the case of Spectre, fixing the hardware has a cost in performance.
>>
>>How do you know?
>>
>>Papers on so-called "invisible speculation" schemes have reported
>>slowdowns <10% for the more advanced schemes, with IIRC some even
>>reporting a speedup.

> I've heard claims - especially from Mitch Alsup - that, indeed, all
> one has to do is avoid certain _mistakes_ when designing a pipeline,
> and there's no room for Spectre any more.

> I'm no expert on these things at all, so I don't know that this can't
> be true. But I also don't know that it _is_ true.

Timeline:: the microarchitecture of Intel's latest chips are derived
all the way back to Pentium Pro. Sure they have tweaked lots of 
things and created an explosion of new instructions, but deep inside
it is still PP.

> What does Spectre exploit? it exploits the fact that speculative
> execution keeps around data that was fetched into cache by the
> speculative execution of some code that was never supposed to be
> executed. Just in case it might be useful later.

Yes

> Obviously, keeping around any data that just happens to be
> accidentally in cache, just in case it might be useful later, does
> have a positive (but likely very slight) effect on performance. Being
> strict about what speculative execution can do, on the other hand, so
> nothing is allowed to leak information, will reduce performance... at
> least a little bit.

In the course of accessing data from the cache, one also has to check
if
there is an outstanding request to memory for this same cache line. So,
when multiple requests all target the same cache line, one only fetches
it once. This check is performed fully associatively in the miss
buffer.
Since one is already checking the miss buffer, and the miss buffer has
to have any cache line pass through it during instruction execution::

ALL I have DONE is to not have the MB write into the cache until the
causing instruction retires !! Should the instruction NOT retire, the
data in the miss buffer can be delivered back to memory/whence it came
(depending on coherence protocol) and we remain coherent without::
a) delaying the core
b) modifying the cache
c) exposing microarchitectural details

The only piece of logic that needs to change is the miss buffer in that
they currently only deliver the "critical word" of the miss and then
dump the buffer into the cache. All I ask is for the miss buffer to 
deliver data to all outstanding requests while initiator is waiting 
to retire. {This may need an extra entry (or 2) in MB to avoid losing
performance.

Intel and AMD (and everyone else it appears) have not done a major
new microarchitecture since Spectré was announced {they may NOT even
CARE !} Instead of new microarchitecture, they prefer to add o the
width and depth of the execution window {not that anyone would
disagree).

Noting in My 66000 requires and serious modification to the GBOoO
general architecture of the execution window--just modifications to
some sequences to prevent microarchitectural leakage.

> It could well be that the losses aren't enough to be concerned about,
> if this is done carefully. That is, not even the 3% quoted as the cost
> of one of the earliest fixes. But since I've heard higher figures for
> the fixes for later variants, without positive knowledge, I have to be
> skeptical about claims that all possible variants of this kind of
> attack can be prevented at little cost.

> And Rowhammer is even worse. It's not at all clear to me what can be
> done without adding an expensive layer of monitoring to memory
> accesses. However, only DRAM is vulnerable to Rowhammer, and so it may
> be possible to turn cache into a bulwark against it somehow.

My 66000 is also insensitive to RowHammer and derivatives.....

> John Savard