News Intel CPUs hit by major hardware security flaw

Discussion in 'Article Discussion' started by bit-tech, 3 Jan 2018.

  1. bit-tech

    bit-tech Supreme Overlord Staff Administrator

    Joined:
    12 Mar 2001
    Posts:
    620
    Likes Received:
    12
    Read more
     
  2. meandmymouth

    meandmymouth Well-Known Member

    Joined:
    15 Sep 2009
    Posts:
    3,343
    Likes Received:
    101
    It might finally be time to switch to AMD.
     
  3. edzieba

    edzieba Virtual Realist

    Joined:
    14 Jan 2009
    Posts:
    2,072
    Likes Received:
    54
    Depending on workload, the performance impact can be absolutely nothing. Unless your workload is absolutely hammering syscalls, then you're probably not going to be affected to a measurable degree.
    A big headache for servers, but for desktop use unlikely to cause any problems.
     
  4. Corky42

    Corky42 What did walle eat for breakfast?

    Joined:
    30 Oct 2012
    Posts:
    7,741
    Likes Received:
    108
    That certainly appears to be the case for Linux but it maybe a little hasty to extrapolate that to Windows as it's my understand the way Linux and Windows deal with drivers maybe markedly different, in that Linux runs drivers in user space so something like games that depend on drivers doesn't do much, if any, context switching whereas the picture for Windows drivers is less clear.

    I know nothing about driver development for Windows though so maybe the context switching is minimal.

    Microsoft's documentation on the subject says the following...
     
  5. Gareth Halfacree

    Gareth Halfacree WIIGII! Staff Administrator Super Moderator Moderator

    Joined:
    4 Dec 2007
    Posts:
    9,608
    Likes Received:
    358
    Hence "can result" - i.e. "its implementation can result in a performance loss and where such a performance loss occurs it is between five and 30 percent depending on workload." Sorry if I didn't phrase that bit very clearly!
     
  6. edzieba

    edzieba Virtual Realist

    Joined:
    14 Jan 2009
    Posts:
    2,072
    Likes Received:
    54
    Windows has had user-mode drivers since Windows Vista a decade ago. The big switch was what people threw a fit about when manufacturers declined to update their drivers to maintain compatibility.
     
  7. Krikkit

    Krikkit All glory to the hypnotoad! Super Moderator

    Joined:
    21 Jan 2003
    Posts:
    23,430
    Likes Received:
    365
    Slight typo. :)
     
  8. Corky42

    Corky42 What did walle eat for breakfast?

    Joined:
    30 Oct 2012
    Posts:
    7,741
    Likes Received:
    108
    It's had partial user-mode drivers, there's still large portions of drivers handled in Kernel-mode.
     
  9. Otis1337

    Otis1337 aka - Ripp3r

    Joined:
    28 Nov 2007
    Posts:
    4,359
    Likes Received:
    89
    AMD is not effected but will suffer the same performance hit due to the patch. its been confirmed now
     
  10. gosh

    gosh Member

    Joined:
    20 Oct 2009
    Posts:
    151
    Likes Received:
    0
    i would be interested for bit-tech to run benchmarks on their test rig pre and post patch, just to see if any games are actually affected
     
  11. RedFlames

    RedFlames ...is not a Belgian football team

    Joined:
    23 Apr 2009
    Posts:
    8,274
    Likes Received:
    405
  12. gosh

    gosh Member

    Joined:
    20 Oct 2009
    Posts:
    151
    Likes Received:
    0
    "To be clear, the security research team identified three variants targeting speculative execution," AMD said in a statement to Axios. "The threat and the response to the three variants differ by microprocessor company, and AMD is not susceptible to all three variants. Due to differences in AMD's architecture, we believe there is a near zero risk to AMD processors at this time. We expect the security research to be published later today and will provide further updates at that time."

    don't see how that article suggests AMD are affected too, guess since the vulnerability hasn't been released for obvious reasons that may yet change.
     
  13. Risky

    Risky Well-Known Member

    Joined:
    10 Sep 2001
    Posts:
    3,941
    Likes Received:
    32
    It is worth including the sentence from the article before your quote:
     
  14. RedFlames

    RedFlames ...is not a Belgian football team

    Joined:
    23 Apr 2009
    Posts:
    8,274
    Likes Received:
    405
    Also i did say ARM, not AMD
     
  15. jb0

    jb0 Member

    Joined:
    8 Apr 2012
    Posts:
    226
    Likes Received:
    4
    There's actually TWO vulnerabilities.
    https://meltdownattack.com

    One "only" hits every Intel part since Pentium Pro(Itanium and pre-2013 Atoms excepted). The other hits AMD, Intel, and ARM.
    Both have supervillain names.
     
    Last edited: 4 Jan 2018
  16. adidan

    adidan Avatar is back in season.

    Joined:
    25 Mar 2009
    Posts:
    11,054
    Likes Received:
    394
    How lucky it was for the Inel CEO to sell all those shares he had to take him down to the 250,000 bare minimum he needs under his employment agreement before all this broke.
     
    MLyons likes this.
  17. Corky42

    Corky42 What did walle eat for breakfast?

    Joined:
    30 Oct 2012
    Posts:
    7,741
    Likes Received:
    108
  18. Bindibadgi

    Bindibadgi Tired. Forever tired.

    Joined:
    12 Mar 2001
    Posts:
    36,362
    Likes Received:
    424
    AMD is not susceptible to Meltdown. ARM, AMD, Intel is to Spectre. Likely custom versions of ARM cores too.
     
  19. Corky42

    Corky42 What did walle eat for breakfast?

    Joined:
    30 Oct 2012
    Posts:
    7,741
    Likes Received:
    108
    Official statement from AMD on how each variant effects them.
    • Variant One Bounds Check Bypass Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.
    • Variant Two Branch Target Injection Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
    • Variant Three Rogue Data Cache Load Zero AMD vulnerability due to AMD architecture differences.
    Official statement from ARM listing what models are effected.

    No statement from Intel about what variants effect what CPUs as of yet.
     
  20. Chicken76

    Chicken76 Member

    Joined:
    10 Nov 2009
    Posts:
    836
    Likes Received:
    19
    So what can we do, dust off those old Pentiums and K6s? I think 32-bit linux and Win98 should still be running well on them.
     
Tags: Add Tags

Share This Page