Message from @Jignx

Discord ID: 644527690631610369


2019-11-14 12:30:39 UTC  

no one actually compiles for different cpus

2019-11-14 12:30:51 UTC  

unless you're some arch turboautist

2019-11-14 12:32:27 UTC  

gentoo*

2019-11-14 12:32:51 UTC  

Same difference

2019-11-14 12:34:09 UTC  

it's not, you don't build from source on arch unless outside package manageer

2019-11-14 12:50:03 UTC  

Performance in games seems to be in line with the 0-4% decrease Intel states

2019-11-14 12:50:13 UTC  

Mainly because games are GPU limited anyways

2019-11-14 13:09:42 UTC  

INTEL NO 1

2019-11-14 13:18:01 UTC  

https://cdn.discordapp.com/attachments/527849695020580866/644526455723917315/15736812040381.png

2019-11-14 13:18:15 UTC  

>when desktop CPUs are more powerful than your 10 times more expensive server CPUs

2019-11-14 13:18:16 UTC  

LOL!

2019-11-14 13:19:31 UTC  

>actually taking passmark as a representative benchmark

2019-11-14 13:19:32 UTC  

LOL!

2019-11-14 13:20:03 UTC  

https://cdn.discordapp.com/attachments/527849695020580866/644526967290462208/15735834049871.png

2019-11-14 13:20:11 UTC  

LOL!

2019-11-14 13:20:49 UTC  

you're laughing now until you realize that with the current going AMD users will get the same performance impact

2019-11-14 13:22:00 UTC  

yeah when that happens

2019-11-14 13:22:08 UTC  

it's already happening

2019-11-14 13:22:14 UTC  

intel submitted the patches to GCC today

2019-11-14 13:22:50 UTC  

Current Intel hardware mitigations do not cover TAA and current Cascade Lake CPUs remain vulnerable. TAA can allow leaking of data across processes, privilege boundaries and Hyper Threading. With Hyper Threading disabled, TAA can still leak data from protected domains.

2019-11-14 13:22:56 UTC  

yikes imagine leaking data even when HT is off

2019-11-14 13:24:16 UTC  

also the next time you cherrypick benchmarks

2019-11-14 13:24:17 UTC  

>In this case the assembler update didn't make any difference as Firefox wasn't rebuilt from source as part of the test profile or the Clear Linux revision.

2019-11-14 13:25:01 UTC  

so normal usecase for home user ?

2019-11-14 13:25:14 UTC  

where ucode is applied but software is not update to match ?(or apt-get repo aint updated) ?

2019-11-14 13:25:18 UTC  

what do you mean normal use case

2019-11-14 13:25:21 UTC  

firefox has autoupdater

2019-11-14 13:25:39 UTC  

it'll be updated soon enough

2019-11-14 13:25:46 UTC  

windows 10 will get it updated too

2019-11-14 13:26:09 UTC  

yeah soon enough few days of slow speeds nobody notices :D

2019-11-14 13:26:20 UTC  

on a consumer level, there wont be anything much that exploit these vulnerabilities tbh

2019-11-14 13:26:21 UTC  

no slow speeds until the microcode update rolls out

2019-11-14 13:26:32 UTC  

true enough ~

2019-11-14 13:26:56 UTC  

however on the server cloud level, these vulnerabilities allows one to steal data

2019-11-14 13:27:01 UTC  

JCC errata is only fixing "undefined behaviour" atm

2019-11-14 13:27:05 UTC  

no published vuln

2019-11-14 13:27:11 UTC  

and not that firefox is the place where the speed is needed that much anyway

2019-11-14 13:27:12 UTC  

it's like the FDIV bug

2019-11-14 13:28:11 UTC  

https://cdn.discordapp.com/attachments/527849695020580866/644529011032195072/unknown.png