@RL_Dane More cores? Higher RAM speed maybe. Improvements and speed upgrades here and there I'd think.
Ooh, also hardware vulnerability fixes. Meltdown and Spectre are a ๐๐
I have an Intel i7 10th gen. lscpu says that it isn't affected by Meltdown ๐ though it says that Spectre and a number of other vulns are only mitigated.
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Mitigation; Enhanced IBRS, IBPB conditional, RSB filling, PBRSB-eIBRS SW sequence
Srbds: Mitigation; Microcode
Tsx async abort: Not affected
[2/2]
@RL_Dane I wish it wasn't this way. I'd love the ability to switch vulnerable processor optimizations on and off, per-process, if possible. So I can choose between speed and security. Is it a thing?
@golemwire
Dunno!
Vulnerabilities:
Itlb multihit: KVM: Mitigation: VMX disabled
L1tf: Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Mds: Mitigation; Clear CPU buffers; SMT vulnerable
Meltdown: Mitigation; PTI
Mmio stale data: Not affected
Retbleed: Not affected
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
...
@golemwire
...
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP conditional, RS
B filling
Srbds: Vulnerable: No microcode
Tsx async abort: Not affected
@RL_Dane And this is a 10-year-old laptop? Better than I would have thought. (I don't know what Srbds is though)
I'm too sleepy to actually try to mentally parse it ;)
@RL_Dane Vulnerabilities:
Itlb multihit: KVM: Mitigation: VMX disabled
L1tf: Not affected
Mds: Not affected
Meltdown: Not affected
Mmio stale data: Mitigation; Clear CPU buffers; SMT vulnerable
Retbleed: Mitigation; Enhanced IBRS
[1/2]