• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Intel Explains Key Difference Between "Coffee Lake" and "Whiskey Lake"

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
46,362 (7.68/day)
Location
Hyderabad, India
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard ASUS ROG Strix B450-E Gaming
Cooling DeepCool Gammax L240 V2
Memory 2x 8GB G.Skill Sniper X
Video Card(s) Palit GeForce RTX 2080 SUPER GameRock
Storage Western Digital Black NVMe 512GB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
Intel "Whiskey Lake" CPU microarchitecture recently made its debut with "Whiskey Lake-U," an SoC designed for Ultrabooks and 2-in-1 laptops. Since it's the 4th refinement of Intel's 2015 "Skylake" architecture, we wondered what set a "Whiskey Lake" core apart from "Coffee Lake." Silicon fabrication node seemed like the first place to start, with rumors of a "14 nm+++" node for this architecture, which should help it feed up to 8 cores better in a compact LGA115x MSDT environment. Turns out, the process hasn't changed, and that "Whiskey Lake" is being built on the same 14 nm++ node as "Coffee Lake."

In a statement to AnandTech, Intel explained that the key difference between "Whiskey Lake" and "Coffee Lake" is silicon-level hardening against "Meltdown" variants 3 and 5. This isn't just a software-level mitigation part of the microcode, but a hardware fix that reduces the performance impact of the mitigation, compared to a software fix implemented via patched microcode. "Cascade Lake" will pack the most important hardware-level fixes, including "Spectre" variant 2 (aka branch target injection). Software-level fixes reduce performance by 3-10 percent, but a hardware-level fix is expected to impact performance "a lot less."



View at TechPowerUp Main Site
 
Joined
Jul 17, 2011
Messages
80 (0.02/day)
System Name Custom build, AMD/ATi powered.
Processor AMD FX™ 8350 [8x4.6 GHz]
Motherboard AsRock 970 Extreme3 R2.0
Cooling be quiet! Dark Rock Advanced C1
Memory Crucial, Ballistix Tactical, 16 GByte, 1866, CL9
Video Card(s) AMD Radeon HD 7850 Black Edition, 2 GByte GDDR5
Storage 250/500/1500/2000 GByte, SSD: 60 GByte
Display(s) Samsung SyncMaster 950p
Case CoolerMaster HAF 912 Pro
Audio Device(s) 7.1 Digital High Definition Surround
Power Supply be quiet! Straight Power E9 CM 580W
Software Windows 7 Ultimate x64, SP 1
Am I the only one having a hard time believing that those changes which allegedly were made are ones on the very silicon-level instead of just ordinary updates on µCode-level? I mean, I'm fine with fixes on Meltdown anyway though it seems highly unlikely that they already fixed even L1TF aka Foreshadow this fast, given the little time and all the time-consuming processes which are involved.

In addition, it's rather unlikely that they would risk to postpone something (which they actually risk to do in such a case) by fabbing a completely new mask (which always includes the risk that something goes wrong), given the competitive market-situation at the moment. So a completely or at least comprehensive re-design of the very core? In that time-frame?! Something seems fishy here.

If they actually managed to make a stunt like that (Foreshadow was revealed just in January '18!), they should've must been also able to mitigate (via µCode) or eliminate Meltdown completely and address some parts Spectre by January already in hardware. They didn't neither of both. So either they're lying this time or were lying (and were incredibly lazy) back in January (and half the year before) …
 

deu

Joined
Apr 24, 2016
Messages
493 (0.17/day)
System Name Bo-minator (my name is bo)
Processor AMD 3900X
Motherboard Gigabyte X570 AORUS MASTER
Cooling Noctua NH-D15
Memory G-SkiLL 2x8GB RAM 3600Mhz (CL16-16-16-16-36)
Video Card(s) ASUS STRIX 1080Ti OC
Storage Samsung EVO 850 1TB
Display(s) ACER XB271HU + DELL 2717D
Case Fractal Design Define R4
Audio Device(s) ASUS Xonar Essence STX
Power Supply Antec HCP 1000W
Mouse G403
Keyboard CM STORM Quick Fire Rapid
Software Windows 10 64-bit Pro
Benchmark Scores XX
Am I the only one having a hard time believing that those changes which allegedly were made are ones on the very silicon-level instead of just ordinary updates on µCode-level? I mean, I'm fine with fixes on Meltdown anyway though it seems highly unlikely that they already fixed even L1TF aka Foreshadow this fast, given the little time and all the time-consuming processes which are involved.

In addition, it's rather unlikely that they would risk to postpone something (which they actually risk to do in such a case) by fabbing a completely new mask (which always includes the risk that something goes wrong), given the competitive market-situation at the moment. So a completely or at least comprehensive re-design of the very core? In that time-frame?! Something seems fishy here.

If they actually managed to make a stunt like that (Foreshadow was revealed just in January '18!), they should've must been also able to mitigate (via µCode) or eliminate Meltdown completely and address some parts Spectre by January already in hardware. They didn't neither of both. So either they're lying this time or were lying (and were incredibly lazy) back in January (and half the year before) …

Remember: They knew about these exploits before you did! :0 They might very well have been planing fixes on hardwarelevel way before we knew of the actual breach. Again im guessing, but Intel had every interest in it not getting out to the public before they had a fix (Again only intel knows! :D)
 
Joined
Apr 12, 2013
Messages
6,749 (1.68/day)
Am I the only one having a hard time believing that those changes which allegedly were made are ones on the very silicon-level instead of just ordinary updates on µCode-level? I mean, I'm fine with fixes on Meltdown anyway though it seems highly unlikely that they already fixed even L1TF aka Foreshadow this fast, given the little time and all the time-consuming processes which are involved.

In addition, it's rather unlikely that they would risk to postpone something (which they actually risk to do in such a case) by fabbing a completely new mask (which always includes the risk that something goes wrong), given the competitive market-situation at the moment. So a completely or at least comprehensive re-design of the very core? In that time-frame?! Something seems fishy here.

If they actually managed to make a stunt like that (Foreshadow was revealed just in January '18!), they should've must been also able to mitigate (via µCode) or eliminate Meltdown completely and address some parts Spectre by January already in hardware. They didn't neither of both. So either they're lying this time or were lying (and were incredibly lazy) back in January (and half the year before) …
My initial assessment of smeltdown wrt Intel is that they know they skimped on security & probably did have a very good idea about these exploits, even if we discount the NSA baked deliberate holes theory. Now the fact that they've fixed holes as recent as L1TF in hardware, seems to support the theory. Which probably means that they skimped on some of the major (security) aspects of their hardware design by choice, perhaps in a race to beat AMD. I mean look at the recent results FFS, it's a slaughterhouse!
https://www.phoronix.com/scan.php?page=article&item=linux-419-mitigations
 
Joined
Oct 18, 2013
Messages
5,460 (1.42/day)
Location
Everywhere all the time all at once
System Name The Little One
Processor i5-11320H @4.4GHZ
Motherboard AZW SEI
Cooling Fan w/heat pipes + side & rear vents
Memory 64GB Crucial DDR4-3200 (2x 32GB)
Video Card(s) Iris XE
Storage WD Black SN850X 4TB m.2, Seagate 2TB SSD + SN850 4TB x2 in an external enclosure
Display(s) 2x Samsung 43" & 2x 32"
Case Practically identical to a mac mini, just purrtier in slate blue, & with 3x usb ports on the front !
Audio Device(s) Yamaha ATS-1060 Bluetooth Soundbar & Subwoofer
Power Supply 65w brick
Mouse Logitech MX Master 2
Keyboard Logitech G613 mechanical wireless
Software Windows 10 pro 64 bit, with all the unnecessary background shitzu turned OFF !
Benchmark Scores PDQ
Simply put, they (intel) know that we now know that they knew that we didnt know about this until we knew....

And now that they know that we did in fact know about what they thought we didn't know, they have to come up with some lame explanation to try to explain why, and how they are gonna fix it, and try to make themselves look good in the process....

Bottom line: C.Y.A. all the time, every time, or die tryin :D
 
Joined
Oct 30, 2008
Messages
1,901 (0.34/day)
Processor 5930K
Motherboard MSI X99 SLI
Cooling WATER
Memory 16GB DDR4 2132
Video Card(s) EVGAY 2070 SUPER
Storage SEVERAL SSD"S
Display(s) Catleap/Yamakasi 2560X1440
Case D Frame MINI drilled out
Audio Device(s) onboard
Power Supply Corsair TX750
Mouse DEATH ADDER
Keyboard Razer Black Widow Tournament
Software W10HB
Benchmark Scores PhIlLyChEeSeStEaK
How Very boring, seeing AMD people posting in an Intel Thread.
 
Joined
Jun 12, 2017
Messages
136 (0.05/day)
Am I the only one having a hard time believing that those changes which allegedly were made are ones on the very silicon-level instead of just ordinary updates on µCode-level? I mean, I'm fine with fixes on Meltdown anyway though it seems highly unlikely that they already fixed even L1TF aka Foreshadow this fast, given the little time and all the time-consuming processes which are involved.

In addition, it's rather unlikely that they would risk to postpone something (which they actually risk to do in such a case) by fabbing a completely new mask (which always includes the risk that something goes wrong), given the competitive market-situation at the moment. So a completely or at least comprehensive re-design of the very core? In that time-frame?! Something seems fishy here.

If they actually managed to make a stunt like that (Foreshadow was revealed just in January '18!), they should've must been also able to mitigate (via µCode) or eliminate Meltdown completely and address some parts Spectre by January already in hardware. They didn't neither of both. So either they're lying this time or were lying (and were incredibly lazy) back in January (and half the year before) …

My guess is that it is related to performance. They can't find a hardware solution that is satisfyingly fast enough (not messing up that much). Baking a slow hardware solution into silicon could permanently make them crippled at single-threaded performance. So they prefer to wait, meanwhile people can choose to (or unawaredly) enjoy "blazingly fast" experience with security holes wide open.
And for vulnerabilities with minor performance impact, they can fix them quite fast.
 
Joined
Mar 16, 2017
Messages
211 (0.08/day)
Location
behind you
Processor Threadripper 1950X (4.0 GHz OC)
Motherboard ASRock X399 Professional Gaming
Cooling Enermax Liqtech TR4
Memory 48GB DDR4 2934MHz
Video Card(s) Nvidia GTX 1080, GTX 660TI
Storage 2TB Western Digital HDD, 500GB Samsung 850 EVO SSD, 280GB Intel Optane 900P
Display(s) 2x 1920x1200
Power Supply Cooler Master Silent Pro M (1000W)
Mouse Logitech G602
Keyboard Corsair K70 MK.2
Software Windows 10
In other words Intel is selling a new stepping as a new microarchitecture.
 
Joined
Jul 29, 2014
Messages
484 (0.14/day)
Location
Fort Sill, OK
Processor Intel 7700K 5.1Ghz (Intel advised me not to OC this CPU)
Motherboard Asus Maximus IX Code
Cooling Corsair Hydro H115i Platinum
Memory 48GB G.Skill TridentZ DDR4 3200 Dual Channel (2x16 & 2x8)
Video Card(s) nVIDIA Titan XP (Overclocks like a champ but stock performance is enough)
Storage Intel 760p 2280 2TB
Display(s) MSI Optix MPG27CQ Black 27" 1ms 144hz
Case Thermaltake View 71
Power Supply EVGA SuperNova 1000 Platinum2
Mouse Corsair M65 Pro (not recommded, I am on my second mouse with same defect)
Software Windows 10 Enterprise 1803
Benchmark Scores Yes I am Intel fanboy that is my benchmark score.
I suppose we should not expect the usual 1 to 5 % IPC gain this time around.

"When fixed in software, Intel expects a 3-10% drop in performance depending on the workload – when fixed in hardware, Intel says that performance drop is a lot less, but expects new platforms (like Cascade Lake) to offer better overall performance anyway.":eek:
 

hat

Enthusiast
Joined
Nov 20, 2006
Messages
21,731 (3.42/day)
Location
Ohio
System Name Starlifter :: Dragonfly
Processor i7 2600k 4.4GHz :: i5 10400
Motherboard ASUS P8P67 Pro :: ASUS Prime H570-Plus
Cooling Cryorig M9 :: Stock
Memory 4x4GB DDR3 2133 :: 2x8GB DDR4 2400
Video Card(s) PNY GTX1070 :: Integrated UHD 630
Storage Crucial MX500 1TB, 2x1TB Seagate RAID 0 :: Mushkin Enhanced 60GB SSD, 3x4TB Seagate HDD RAID5
Display(s) Onn 165hz 1080p :: Acer 1080p
Case Antec SOHO 1030B :: Old White Full Tower
Audio Device(s) Creative X-Fi Titanium Fatal1ty Pro - Bose Companion 2 Series III :: None
Power Supply FSP Hydro GE 550w :: EVGA Supernova 550
Software Windows 10 Pro - Plex Server on Dragonfly
Benchmark Scores >9000
That means it's still vulnerable to some Meltdown variants, and of course Spectre. Even the Cascade Lake will still be vulnerable to Spectre (only protects against variant 2).

Wake me in 10 years when it's over... :shadedshu:
 
Joined
Jun 12, 2017
Messages
136 (0.05/day)
That means it's still vulnerable to some Meltdown variants, and of course Spectre. Even the Cascade Lake will still be vulnerable to Spectre (only protects against variant 2).

Wake me in 10 years when it's over... :shadedshu:
A firmware patch is a patch, as a basic fact.
 

hat

Enthusiast
Joined
Nov 20, 2006
Messages
21,731 (3.42/day)
Location
Ohio
System Name Starlifter :: Dragonfly
Processor i7 2600k 4.4GHz :: i5 10400
Motherboard ASUS P8P67 Pro :: ASUS Prime H570-Plus
Cooling Cryorig M9 :: Stock
Memory 4x4GB DDR3 2133 :: 2x8GB DDR4 2400
Video Card(s) PNY GTX1070 :: Integrated UHD 630
Storage Crucial MX500 1TB, 2x1TB Seagate RAID 0 :: Mushkin Enhanced 60GB SSD, 3x4TB Seagate HDD RAID5
Display(s) Onn 165hz 1080p :: Acer 1080p
Case Antec SOHO 1030B :: Old White Full Tower
Audio Device(s) Creative X-Fi Titanium Fatal1ty Pro - Bose Companion 2 Series III :: None
Power Supply FSP Hydro GE 550w :: EVGA Supernova 550
Software Windows 10 Pro - Plex Server on Dragonfly
Benchmark Scores >9000
Joined
Jul 17, 2011
Messages
80 (0.02/day)
System Name Custom build, AMD/ATi powered.
Processor AMD FX™ 8350 [8x4.6 GHz]
Motherboard AsRock 970 Extreme3 R2.0
Cooling be quiet! Dark Rock Advanced C1
Memory Crucial, Ballistix Tactical, 16 GByte, 1866, CL9
Video Card(s) AMD Radeon HD 7850 Black Edition, 2 GByte GDDR5
Storage 250/500/1500/2000 GByte, SSD: 60 GByte
Display(s) Samsung SyncMaster 950p
Case CoolerMaster HAF 912 Pro
Audio Device(s) 7.1 Digital High Definition Surround
Power Supply be quiet! Straight Power E9 CM 580W
Software Windows 7 Ultimate x64, SP 1
A firmware patch is a patch, as a basic fact.
Exactly! Meanwhile, Intel wants us to believe they already have a definite solution to those vulnerabilities in hardware (as @hat already pointed out) – which is highly douptful …
 
Joined
Jun 10, 2014
Messages
2,900 (0.81/day)
Processor AMD Ryzen 9 5900X ||| Intel Core i7-3930K
Motherboard ASUS ProArt B550-CREATOR ||| Asus P9X79 WS
Cooling Noctua NH-U14S ||| Be Quiet Pure Rock
Memory Crucial 2 x 16 GB 3200 MHz ||| Corsair 8 x 8 GB 1333 MHz
Video Card(s) MSI GTX 1060 3GB ||| MSI GTX 680 4GB
Storage Samsung 970 PRO 512 GB + 1 TB ||| Intel 545s 512 GB + 256 GB
Display(s) Asus ROG Swift PG278QR 27" ||| Eizo EV2416W 24"
Case Fractal Design Define 7 XL x 2
Audio Device(s) Cambridge Audio DacMagic Plus
Power Supply Seasonic Focus PX-850 x 2
Mouse Razer Abyssus
Keyboard CM Storm QuickFire XT
Software Ubuntu
My initial assessment of smeltdown wrt Intel is that they know they skimped on security & probably did have a very good idea about these exploits, even if we discount the NSA baked deliberate holes theory. Now the fact that they've fixed holes as recent as L1TF in hardware, seems to support the theory. Which probably means that they skimped on some of the major (security) aspects of their hardware design by choice, perhaps in a race to beat AMD.
Both of these vulnerabilities are results of logical mistakes in the design process. Your theory is easily disproved by the fact that Spectre affects four different CPU makers, and Meltdown affects three. Some of these mistakes have been present in CPU designs since the 90s.

So why does multiple CPU makers do the same principal mistakes? It doesn't mean they steal from each other, but the following are major factors:
- Engineers think alike - Given similar training and experience, engineers tend to find similar solutions to the same problem. To make matters worse, I would claim ~90% of engineers overestimate their own rationality and wants to be "the smartest guy in the room" by rushing to conclusions, rather than doing the actual research.
- Switching jobs - The semiconductor world is very small (compared to e.g. the software world). Most of the people in Intel's and AMD's CPU teams have worked with one or more competitors in the past. Even though they don't steal IP, they do still bring experience and ideas, both the good and the bad.
- Knowledge sharing - There are conferences, academic research projects, and even voluntary sharing between companies in the industry. If one party shares a flawed idea, others might not challenge that.

These companies have some of the brightest engineers in the world, yet they manage to produce products year after year with the same design flaws. But why didn't anyone of them find these flaws? Chances are several of them either knew about the potential or have seen symptoms of these bugs throughout the development. But the structure of the departments, development teams and management can make it very hard to communicate the right information. Design choices, schedules, etc. are usually decided from the top down, while anyone finding such bugs will be at the very bottom, having to convince every superior about the severity of the flaw. I've experienced this several times first-hand in software development, once at a former employer I found a serious defect in a core library, but other team members dismissed it despite a proof-of-concept, because "the code had been used for years without any 'problems', so the new guy must be mistaken…", this code might still be used in equipment worth $B…
 

hat

Enthusiast
Joined
Nov 20, 2006
Messages
21,731 (3.42/day)
Location
Ohio
System Name Starlifter :: Dragonfly
Processor i7 2600k 4.4GHz :: i5 10400
Motherboard ASUS P8P67 Pro :: ASUS Prime H570-Plus
Cooling Cryorig M9 :: Stock
Memory 4x4GB DDR3 2133 :: 2x8GB DDR4 2400
Video Card(s) PNY GTX1070 :: Integrated UHD 630
Storage Crucial MX500 1TB, 2x1TB Seagate RAID 0 :: Mushkin Enhanced 60GB SSD, 3x4TB Seagate HDD RAID5
Display(s) Onn 165hz 1080p :: Acer 1080p
Case Antec SOHO 1030B :: Old White Full Tower
Audio Device(s) Creative X-Fi Titanium Fatal1ty Pro - Bose Companion 2 Series III :: None
Power Supply FSP Hydro GE 550w :: EVGA Supernova 550
Software Windows 10 Pro - Plex Server on Dragonfly
Benchmark Scores >9000
Who knows. Maybe the engineer(s) saw a potential for some fuckery like this, but the big boss, like many of us here on TPU when discussing the flaws, said something like "fuck that, they'll never find it, and even if they do, it'll be ridiculously hard to attack, and we don't have time to redesign everything for such a silly flaw, especially when the fix could hinder performance anyway, just make them".

I don't make semiconductors, instead I work in a plastics plant, but even I see "defects" passed on as good product all the time. These defects are minor defects that nobody would ever find, or give a shit about if they did, but still, it's not "perfect" like it should be. And if you ask the production manager, he'll try to save as much as he possibly can, telling you to pass stuff you've been trained to know is bad.

Two vastly different products, but it's still in the world of manufacturing, where time literally is money. These guys have product to push out the door, so it wouldn't surprise me if someone knew, but thought it wasn't worth fixing, for one or more reasons... but now that it's been brought to light, they can't hide behind "security through obscurity", even if it would be hard to pull off, so now it has to be fixed.

Or maybe it really did slip by them for 20+ years... :p
 
Joined
Jun 10, 2014
Messages
2,900 (0.81/day)
Processor AMD Ryzen 9 5900X ||| Intel Core i7-3930K
Motherboard ASUS ProArt B550-CREATOR ||| Asus P9X79 WS
Cooling Noctua NH-U14S ||| Be Quiet Pure Rock
Memory Crucial 2 x 16 GB 3200 MHz ||| Corsair 8 x 8 GB 1333 MHz
Video Card(s) MSI GTX 1060 3GB ||| MSI GTX 680 4GB
Storage Samsung 970 PRO 512 GB + 1 TB ||| Intel 545s 512 GB + 256 GB
Display(s) Asus ROG Swift PG278QR 27" ||| Eizo EV2416W 24"
Case Fractal Design Define 7 XL x 2
Audio Device(s) Cambridge Audio DacMagic Plus
Power Supply Seasonic Focus PX-850 x 2
Mouse Razer Abyssus
Keyboard CM Storm QuickFire XT
Software Ubuntu
Who knows. Maybe the engineer(s) saw a potential for some fuckery like this, but the big boss, like many of us here on TPU when discussing the flaws, said something like "fuck that, they'll never find it, and even if they do, it'll be ridiculously hard to attack, and we don't have time to redesign everything for such a silly flaw, especially when the fix could hinder performance anyway, just make them".
Yes, for sure, but it doesn't even have to be the big boss, could just as well be team lead or someone in between. Unfortunately this is a cultural problem in many companies, and it usually doesn't change until there are major incidents, and even then there could be more panic reactions rather than rational solutions. It's actually quite "interesting" to watch from the inside when incidents happen, how things escalate, when different levels of management take action, jumping to conclusions and blaming, what's communicated internally vs. publicly and to clients, etc., it gives an idea of how these things may be playing out at Intel etc.

But it's worth mentioning that Computer Science as a field is much more deceptive than most people realize. The fundamentals are of course completely logical on the lowest level, but human's ability to comprehend it is very limited. In CS it's possible to design and make a completely broken product that looks fine on the surface, to a much larger extent than e.g. building a bridge, a giant ship or a space rocket. And design flaws in CS might be much harder to spot without comprehensive investigation. It shouldn't surprise anyone that when Intel or AMD releases a new CPU, it usually have around 20-30 know defects in their errata. Some of these are mitigated in firmware, and could be really serious security issues, but we usually never get to know. The difference with Spectre and Meltdown is that it was found externally, and that it was present in multiple consecutive CPU designs. This doesn't mean it's even close to the most serious flaws they've shipped in a CPU. And when it comes to software, it's much worse. This comic stripe is pretty spot-on when it comes to describing the state of the field.
 
  • Like
Reactions: hat
Joined
Apr 12, 2013
Messages
6,749 (1.68/day)
Yes, for sure, but it doesn't even have to be the big boss, could just as well be team lead or someone in between. Unfortunately this is a cultural problem in many companies, and it usually doesn't change until there are major incidents, and even then there could be more panic reactions rather than rational solutions. It's actually quite "interesting" to watch from the inside when incidents happen, how things escalate, when different levels of management take action, jumping to conclusions and blaming, what's communicated internally vs. publicly and to clients, etc., it gives an idea of how these things may be playing out at Intel etc.

But it's worth mentioning that Computer Science as a field is much more deceptive than most people realize. The fundamentals are of course completely logical on the lowest level, but human's ability to comprehend it is very limited. In CS it's possible to design and make a completely broken product that looks fine on the surface, to a much larger extent than e.g. building a bridge, a giant ship or a space rocket. And design flaws in CS might be much harder to spot without comprehensive investigation. It shouldn't surprise anyone that when Intel or AMD releases a new CPU, it usually have around 20-30 know defects in their errata. Some of these are mitigated in firmware, and could be really serious security issues, but we usually never get to know. The difference with Spectre and Meltdown is that it was found externally, and that it was present in multiple consecutive CPU designs. This doesn't mean it's even close to the most serious flaws they've shipped in a CPU. And when it comes to software, it's much worse. This comic stripe is pretty spot-on when it comes to describing the state of the field.
I've talked about this at length numerous times. The lead GPZ investigator found smeltdown combing Intel manuals! If that doesn't hint at incompetence, at the very least, or deliberate unpatched hole (NSA?) at worst then you won't be convinced by anything. Btw Spectre is inherent to OoO CPU uarch, however at some point in time Intel decided that privilege checks should take a back seat ~ perhaps in search of performance? Form there, we've seen near double digits flaws that are exclusive to Intel, some of them so dangerous that they haven't been revealed as yet.
 
Joined
Sep 17, 2014
Messages
20,913 (5.97/day)
Location
The Washing Machine
Processor i7 8700k 4.6Ghz @ 1.24V
Motherboard AsRock Fatal1ty K6 Z370
Cooling beQuiet! Dark Rock Pro 3
Memory 16GB Corsair Vengeance LPX 3200/C16
Video Card(s) ASRock RX7900XT Phantom Gaming
Storage Samsung 850 EVO 1TB + Samsung 830 256GB + Crucial BX100 250GB + Toshiba 1TB HDD
Display(s) Gigabyte G34QWC (3440x1440)
Case Fractal Design Define R5
Audio Device(s) Harman Kardon AVR137 + 2.1
Power Supply EVGA Supernova G2 750W
Mouse XTRFY M42
Keyboard Lenovo Thinkpad Trackpoint II
Software W10 x64
Simply put, Coffee lake gives you a caffeine buzz, Whiskey lake makes you puke and pass out.

Lmao

Whats next, Meth River? "For a complete Fix!"
 
Joined
Jun 10, 2014
Messages
2,900 (0.81/day)
Processor AMD Ryzen 9 5900X ||| Intel Core i7-3930K
Motherboard ASUS ProArt B550-CREATOR ||| Asus P9X79 WS
Cooling Noctua NH-U14S ||| Be Quiet Pure Rock
Memory Crucial 2 x 16 GB 3200 MHz ||| Corsair 8 x 8 GB 1333 MHz
Video Card(s) MSI GTX 1060 3GB ||| MSI GTX 680 4GB
Storage Samsung 970 PRO 512 GB + 1 TB ||| Intel 545s 512 GB + 256 GB
Display(s) Asus ROG Swift PG278QR 27" ||| Eizo EV2416W 24"
Case Fractal Design Define 7 XL x 2
Audio Device(s) Cambridge Audio DacMagic Plus
Power Supply Seasonic Focus PX-850 x 2
Mouse Razer Abyssus
Keyboard CM Storm QuickFire XT
Software Ubuntu
Btw Spectre is inherent to OoO CPU uarch, however at some point in time Intel decided that privilege checks should take a back seat ~ perhaps in search of performance? Form there, we've seen near double digits flaws that are exclusive to Intel, some of them so dangerous that they haven't been revealed as yet.
Not quite, Spectre is due to lack of validation and sanitation in speculative execution, which is a part of OoO. Claiming it's an intentional move to gain extra performance is a stretch, especially if you don't have concrete evidence of that. Doing this properly from the start isn't costly or especially damaging to performance either, but if discovered after a completed design, then doing a proper redesign, calibration and testing of the whole front-end will be costly.
 
Joined
Apr 12, 2013
Messages
6,749 (1.68/day)
Not quite, Spectre is due to lack of validation and sanitation in speculative execution, which is a part of OoO. Claiming it's an intentional move to gain extra performance is a stretch, especially if you don't have concrete evidence of that. Doing this properly from the start isn't costly or especially damaging to performance either, but if discovered after a completed design, then doing a proper redesign, calibration and testing of the whole front-end will be costly.
I was talking more about meltdown & derivative flaws.

Well there's AMD, in case you forgot?

Yet some of the fixes found early in the year are already fixed in hardware for WHL, how much lead time did you think Intel had for L1TF?
 
Joined
Mar 7, 2007
Messages
1,412 (0.23/day)
Processor E5-1680 V2
Motherboard Rampage IV black
Video Card(s) Asrock 7900 xtx
Storage 500 gb sd
Software windows 10 64 bit
Benchmark Scores 29,433 3dmark06 score
Lmao

Whats next, Meth River? "For a complete Fix!"

You have to admit product/company opinion aside, can you get a lamer more stupid naming scheme? How much money did the genius who came up with that dumbassness get paid to do it? Answer= TOO MUCH!

Nah, Fentanyl is the new rage, all the rage ~ probably your last rage, ever!

Good point...Intel's Fentanyl lake 2024, so good it kills you.
 
Joined
Aug 20, 2007
Messages
20,773 (3.41/day)
System Name Pioneer
Processor Ryzen R9 7950X
Motherboard GIGABYTE Aorus Elite X670 AX
Cooling Noctua NH-D15 + A whole lotta Sunon and Corsair Maglev blower fans...
Memory 64GB (4x 16GB) G.Skill Flare X5 @ DDR5-6000 CL30
Video Card(s) XFX RX 7900 XTX Speedster Merc 310
Storage 2x Crucial P5 Plus 2TB PCIe 4.0 NVMe SSDs
Display(s) 55" LG 55" B9 OLED 4K Display
Case Thermaltake Core X31
Audio Device(s) TOSLINK->Schiit Modi MB->Asgard 2 DAC Amp->AKG Pro K712 Headphones or HDMI->B9 OLED
Power Supply FSP Hydro Ti Pro 850W
Mouse Logitech G305 Lightspeed Wireless
Keyboard WASD Code v3 with Cherry Green keyswitches + PBT DS keycaps
Software Gentoo Linux x64
My initial assessment of smeltdown wrt Intel is that they know they skimped on security & probably did have a very good idea about these exploits, even if we discount the NSA baked deliberate holes theory.

These are very clever timing based attacks that are very general in nature. Sorry, but that isn't the NSA's style at all.

If you ask me, these appear A LOT more like sn honest error in design.
 
Joined
Mar 7, 2007
Messages
1,412 (0.23/day)
Processor E5-1680 V2
Motherboard Rampage IV black
Video Card(s) Asrock 7900 xtx
Storage 500 gb sd
Software windows 10 64 bit
Benchmark Scores 29,433 3dmark06 score
These are very clever timing based attacks that are very general in nature. Sorry, but that isn't the NSA's style at all.

If you ask me, these appear A LOT more like sn honest error in design.

Better known as bad engineering.
 
Top