Deutsch   English   Français   Italiano  
<6f26c7df4e339b3c2e85ec4b2291f106@www.novabbs.org>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!news.nk.ca!rocksolid2!i2pn2.org!.POSTED!not-for-mail
From: mitchalsup@aol.com (MitchAlsup1)
Newsgroups: comp.arch
Subject: Re: Reverse engineering of Intel branch predictors
Date: Fri, 1 Nov 2024 21:21:53 +0000
Organization: Rocksolid Light
Message-ID: <6f26c7df4e339b3c2e85ec4b2291f106@www.novabbs.org>
References: <vfbfn0$256vo$1@dont-email.me> <vg38o4$1mcfe$1@paganini.bofh.team>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: i2pn2.org;
	logging-data="506623"; mail-complaints-to="usenet@i2pn2.org";
	posting-account="o5SwNDfMfYu6Mv4wwLiW6e/jbA93UAdzFodw5PEa6eU";
User-Agent: Rocksolid Light
X-Rslight-Posting-User: cb29269328a20fe5719ed6a1c397e21f651bda71
X-Rslight-Site: $2y$10$KF7XLfF1B0QXjq445h9JIeHe0qQJ6BHzesVWCUWRPQZao.D5TXSyi
X-Spam-Checker-Version: SpamAssassin 4.0.0
Bytes: 2683
Lines: 41

On Fri, 1 Nov 2024 19:04:38 +0000, Waldek Hebisch wrote:

> Thomas Koenig <tkoenig@netcologne.de> wrote:
>> Seems like Intel branch predictors have been pretty completely
>> reverse-engineered.  The following paper promises to for very
>> interesting reading:
>>
>> https://www.usenix.org/conference/usenixsecurity24/presentation/li-luyi
>>
>> I wonder what you think of this...
>
> There are more papers on this topic.  There were several papers
> on variations of Spectre.  I think that there is simple condition
> which guarantees that nothing Spectre-related affects given
> processor: the sequence of microarchitecutral operations (incuding
> speculative operations) should depend only on architecturaly
> executed instructions.

The easiest way to state this succinctly is::
No microarchitectural state can be updated until the instruction
causing said update retires. Caches, TLBs, and all predictor
state(s) has to be included in the above.

>                         So, processor may do widely speculative
> things, but only base speculation on architecturaly executed
> instructions.

The processor can maintain look-ahead predictor state and use it
at decode/issue but it has to verify said state in order to retire.

>                Some people try to just close single hole at
> a time, IMO it is hopeless, there are too many possible
> variations.

So far its been almost t10 years of closing one hole after another
and they are still closing holes. So, I agree with the hopeless-
ness of that line of attack.

>              And weaker conditions, like "cancelling" effects
> of speculative instructions are likely to fail.

These also lead to replay-storms.