[LIST] of CPU's most likely immune to Spectre

Sure, intel would LOVE that

then its a complete monopoly with amd not getting a look in.

I just hope they make them compatible with LGA 1151 sockets if they do decide to go that route. It would really suck to have to replace both the CPU and the motherboard on my new desktop

You are aware that itanium is not x86 compatible?

It’s the reason the industry chose amd64 over itanium in the first place.

2 Likes

Ah, I see. Would they be able to make Itanium 64 bit or would they be limited to 32 bit?

Itanium is 64bit. Its just IA64 instead of amd64.
And the architectural redesigns required to make that work, mean its easier to just build a new CPU.

Also Itanium is crazy power hungry. Double what standard Intel x86 uses at ~2.4ish GHz.

Here are intels latest 2017 itaniums.

Thanks!

According to what Eben Upton wrote (here) in order to explain why the Raspberry Pi is not affected, out-of-order execution is part of the problem, so my strong guess is that Spectre doesn’t work when things are done in-order.

I had no idea that the Itanium architecture aka IA-64 is an in-order design… Again, thanks.

I wounder if VLIW chips are immune.

Funny this thread, when I first heard about Spectre I thought “what ISN’T vulnerable…”

You’ve missed Ultrasparc III and III CU.

Of all the Sparc processors listed, I think these would be the closest to the modern desktop speed wise. When I replaced a Sun Blade 2000 (with two 1.0GHz US III CUs) with an AMD x2 4800+ back in the day, I thought I would be in a treat by the benchmarks. I was disappointed, the AMD didn’t feel appreciably faster with Linux using modern applications and in a lot of cases was significantly slower.

My experience with the T1 Ultrasparc processors is that they were very, very slow for single threaded applications. (These and later ones were directed towards heavily-threaded server applications.)

I would categorize Ultrasparc II somewhere between “filthy old stuff” and “new enough”.

1 Like

Thank you for your input.

I found a 730 pages spec but it’s not exactly something to go through in an afternoon.

There’s also a US-III vs IA64 comparison.

As far as I understand from a quick read the US-III is an in-order superscalar microprocessor that uses only speculative loads and static branch prediction. The execution units and queue are also quite limited.

If that is all, it should render it immune to this problem.

Maybe find something somewhere on page 450 (Mispredicted Branches) or somewhere in that enormous PDF.

Maybe you can provide some more input, but I’m not well enough acquainted with UltraSPARC to be able to say for certain. (Kind of winging it here :smiley: )

Also something fun I came across that aligns with your statement about the AMD x2 vs US III CU’s

MySQL application running on an UltraSPARC T1 server ran 13.5 times faster than on an AMD Opteron server. :smiley:

http://blogs.digitar.com/media/2/T2000_Experience.pdf

Hey, when you listed the Pentium 1 processors, would that include the Pentium T3200?

Certainly not.

Only Pentium’s based on P5 core: (1993 - 1997)

I see, the T3200 is based off the P6, that makes sense. Thanks!

1 Like

Nope the pentium T3200 is Core architecture already. Codename Merom.

But you get a heart anyway :smile_cat:

I haven’t heard from authority if the Sun Sparc processors are immune to spectre, neither Oracle or Fujitsu have spoken up.

Including Sparc in a conversation like this is fun, but academic. I like Sun hardware because it is all so over-engineered. There are definite drawbacks to actually using Sun hardware.

2 Likes

Well, at least my Atom 330 based pfSense box is safe. That’s about all the good news for me, though. Most of my current in-use stuff is almost certainly affected.

I have these systems available to test if they’d be useful:

  • Main laptop (i5-4310u)
  • Old laptop 1 (i5-2540)
  • Old laptop 2 (i5-560M)
  • Old laptop 3 (A8-3110MX)
  • Macbook Pro Early 2011 (2nd gen i5 something)
  • Main desktop (i7-6700k)
  • HTPC (i3-6100)
  • Old Desktop 1 (Phenom II X4 955 BE)
  • Old desktop 2 (Athlon II X3 435)
  • File server (Xeon E3-1220L v3)
  • VM/test server (Dual Xeon E5-2670 v1)
1 Like

From what I’ve read around so far, pretty much most of the mainstream Intel CPU’s post Pentium 1 are vulnerable, so any i3’s, i5’s, and i7’s (Which sucks cuz I just built a PC with a 6770k i7). Idk about the Xeon’s, Athlon’s, or Phenom’s though.
And the A8 should just be as well since it’s ARM.

Well, I didn’t read the thread thoroughly; @catsay already disqualified POWER6 which does in-order execution and is still vulnerable:

This probably makes Itanium also likely to be vulnerable right? Unless someone already confirmed that and I missed that post too. Gah! Too many threads, too much information, too little time!

If I recall from the info he posted on it, the Itanium runs in-order predictive branching, and Spectre/Meltdown take advantage of out-of-order predictive branching.

Some fun info:

AMD’s PSP Platform Security Processor (at least from 2015 info) is an ARM Cortex A5.

Which as we know is not subject to SpecMelt.

https://www.anandtech.com/show/9319/amd-launches-carrizo-the-laptop-leap-of-efficiency-and-architecture-updates/8

Can’t say its still the case in Ryzen. But I expect not so. The requirements on Ryzen likely mean that it is using a more powerful ARM core.

Also I’ve now coined the term SpecMelt when referring to Spectre + Meltdown because the patches Melt your specs.

3 Likes