Notes from the Intelpocalypse
Notes from the Intelpocalypse
Posted Jan 5, 2018 6:59 UTC (Fri) by epa (subscriber, #39769)In reply to: Notes from the Intelpocalypse by roc
Parent article: Notes from the Intelpocalypse
In user space, I imagine that the explicit speculative load instruction used on Itanium does do all the same memory access checking as an ordinary non-speculative load, so it can't be used to snoop in the same way as the hidden speculative execution on x86_64.
Posted Jan 5, 2018 10:12 UTC (Fri)
by ortalo (guest, #4654)
[Link]
Posted Jan 5, 2018 11:16 UTC (Fri)
by roc (subscriber, #30627)
[Link] (1 responses)
FWIW in C I don't think it's easy to tell what is a bounds check and which loads are guarded by which checks.
I agree that it would be a bit easier to fix these specific issues in Itanium. I don't think that makes this a "Itanium should have won!" moment.
Posted Jan 7, 2018 16:02 UTC (Sun)
by mtaht (subscriber, #11087)
[Link]
And it does look like the mill was invulnerable by design to spectre/meltdown. They did find and fix a bug where the compiler could lift a memory access ahead of its guard, but near as I can tell that would have caused a segfault rather than a permissions violation.
Notes from the Intelpocalypse
Anyway, I would love to be proven wrong and see some of this past research resurrect into a nice powerfull-enough deterministic processor and the associated innovative software development environment for current and near-future critical systems. In my opinion, it is the right time now and many would certainly consider helping it (in good faith I assure you ;-).
Notes from the Intelpocalypse
Notes from the Intelpocalypse