Any word yet on the actual performance hit per generation/CPU? Sounds like they are very unsure of the actual effect given that I've seen 2%-30% thrown around. Makes me think it will affect different architectures differently at the very least.
-
Support.2@XOTIC PC Company Representative
-
https://www.marketwatch.com/investing/stock/intc
Intel stock price down 4% today! -
Windows Insider Preview 17063 apparently already has the patch, and already showing at least in these common benchmarks there is very very small difference in performance. The sky isn't falling and it appears the world will go on.
https://www.computerbase.de/2018-01/intel-cpu-pti-sicherheitsluecke/#update2Ashtrix, bennyg, hmscott and 1 other person like this. -
This is why gaming isn't as affected as high performance computing.Raiderman likes this. -
https://www.hardwareluxx.de/index.p...er-sicherheitsluecke-im-prozessor-design.html
Again more benchmarks with the latest Windows Insider Build 17063 that includes the KPTI patch. While there is some change, it's so small it's not even worth really the hype that has been thrown around. If this is their first hack at a fix and the change is this tiny then I'll take it. Given time and further refinements to the overhead I highly doubt there will be any measurable change after a few more patches. -
Support.2@XOTIC PC Company Representative
Makes sense, will be interesting to see when more benchmarks start rolling in. -
What that shows is that, to the consumer market, Intel is not hit hard by this, generally, leaving their crown intact there. What it doesn't show is the market where the real money is, servers, and the fact they have a 99% (or had, haven't checked numbers recently) market share that may be hit significantly. So, what is being shown is that the average consumer has little to worry about. In that, I'll agree with what you have posted. But, I am not seeing your refutation on their commercial side.Raiderman likes this. -
-
Also I would standby as most people probably didn't know the fix was in the latest build as the bug is under embargo until tomorrow from what I've read. I would expect that we will be seeing a lot more benchmarks being released today and tomorrow.Raiderman likes this. -
-
-
Raiderman likes this.
-
Talon likes this.
-
Papusan, Mr. Fox, hmscott and 1 other person like this.
-
Support.2@XOTIC PC Company Representative
-
If you run compilers, databases, VMs, and other more enterprise style software, you take the hit. If the software is packaged to not need a kernel address or permission, which most consumer software is designed not to need, then you get little to no effect. File transfers rely on checking for permissions at times, which is why that gets some. Compiling does. Database permissions, servers, etc.
What would be nice is doing a spec benchmark suite and sisoft to compare the before and after and which areas, as well as other benches like those.
What we are missing is pi and prime benchmarks, benches needing elevated permissions to varying degrees, etc. -
hmscott and saturnotaku like this.
-
-
Support.2@XOTIC PC Company Representative
-
I would guess intel has a huge stake in the government. I know Intel CPUs are widely used where I work in the servers and everyone's personal laptop. I'm curious to see the fall out from this and how it actually impacts everything. I'm also curious to know how it'll impact my own system with a 980x in it.
-
-
-
Support.2@XOTIC PC Company Representative
-
-
Support.2@XOTIC PC Company Representative
-
alexhawker, Ashtrix, saturnotaku and 1 other person like this.
-
https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
Intel Responds to Security Research Findings
Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.
Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.
Intel is committed to product and customer security and is working closely with many other technology companies, including AMD, ARM Holdings and several operating system vendors, to develop an industry-wide approach to resolve this issue promptly and constructively. Intel has begun providing software and firmware updates to mitigate these exploits. Contrary to some reports, any performance impacts are workload-dependent, and, for the average computer user, should not be significant and will be mitigated over time.
Intel is committed to the industry best practice of responsible disclosure of potential security issues, which is why Intel and other vendors had planned to disclose this issue next week when more software and firmware updates will be available. However, Intel is making this statement today because of the current inaccurate media reports.
Check with your operating system vendor or system manufacturer and apply any available updates as soon as they are available. Following good security practices that protect against malware in general will also help protect against possible exploitation until updates can be applied.
Intel believes its products are the most secure in the world and that, with the support of its partners, the current solutions to this issue provide the best possible security for its customers. -
Starlight5 Yes, I'm a cat. What else is there to say, really?
Is the bug still valid in Windows with pagefile disabled?
hmscott likes this. -
They had to issue a statement, Intel stock dropped 3.5% today. A little damage control never hurts.
-
Last edited: Jan 3, 2018alexhawker, Ashtrix, KY_BULLET and 2 others like this.
-
Support.2@XOTIC PC Company Representative
-
Video discussing and a graphic giving an idea of apps and kernel, but more of the same.
https://www.thestreet.com/amp/story...hip-disaster-means-for-its-stock-and-amd.html
https://fortune.com/2018/01/03/intel-kernel-security-flaw-amd/hmscott, Papusan, Starlight5 and 1 other person like this. -
Fascinating... an entire OS redesign (across different platforms) for the purpose of making it run as it should on Intel because Intel made a mistake.
I wonder how much of an OS redesign would happen if this happened with AMD... or better yet... if this redesign will affect AMD CPU's negatively (which wouldn't be the first time).Last edited: Jan 3, 2018Papusan, Starlight5, Mr. Fox and 1 other person like this. -
Now, generally, what is being hinted at is Google and others found a group of security exploits that effect ARM, AMD, and Intel. The one that causes the largest performance hit is Intel specific (and possibly ARM as well). So, the fixes are needed overall.
Now, as we've covered looking at released benches, regular consumers have little to worry about on performance. Corporations are looking at hits that vary according to the server's purpose. Corporations are not ones to just buy Intel if they find out the other can serve them better over the lifetime of the systems. So public opinion will only keep the stock price up until we see the effect on sales in the quarterly report in March/April time frame. But, to be hit with this at the start of the quarter is painful on server sales, as deployments are based on the test-beds that were done since June of last year, unless an Intel partner. Cloud providers already, in large part, committed to adding more AMD servers to the mix. This may influence that decision, causing larger deployment and a tightening of Epyc inventory in either Q1 or Q2 of this year, when AMD sales of Epyc were predicted to ramp.Raiderman likes this. -
Support.2@XOTIC PC Company Representative
I'm using that one next time I hear "you can't get a virus on a mac" type arguments.alexhawker, KY_BULLET, Papusan and 2 others like this. -
hmscott likes this.
-
-
So, AMD will be releasing research later today, which is nice!
Also, if this does help on server sales, it will mean to largest margin products being picked up, which increases revenue for future development. That is great news considering the added amounts they have done over the past three quarters on R&D, in part gearing up for 7nm fabrication (there was a huge increase in spending and buying more wafers last quarter). So, we should see something on the refresh in a week or so at CES, then we will have to see when they release a 7nm chip. But, added revenue in the segment where Intel is so dominant that AMD is a fleck, although they have significantly grown share relative to where they were a year ago, is going to be a nice turning point. -
Support.2@XOTIC PC Company Representative
-
Charles P. Jefferies Lead Moderator Super Moderator
All I can say about this whole thing is that in the reviews business, we're going to have an interesting challenge trying to explain why benchmark scores are suddenly a lot lower. I'm holding my breath to see the actual performance impact.
Charlesalexhawker, steberg, hmscott and 3 others like this. -
Updated to add
The Intel processor flaw is real. A PhD student at the systems and network security group at Vrije Universiteit Amsterdam has developed a proof-of-concept program that exploits the Chipzilla flaw to read kernel memory from user mode:
Bingo! #kpti #intelbug pic.twitter.com/Dml9g8oywk
— brainsmoke (@brainsmoke) January 3, 2018
The Register has also seen proof-of-concept exploit code that leaks a tiny amount of kernel memory to user processes.
Finally, macOS has been patched to counter the chip design blunder since version 10.13.2, according to operating system kernel expert Alex Ionescu. And it appears 64-bit ARM Linux kernels will also get a set of KAISER patches, completely splitting the kernel and user spaces, to block attempts to defeat KASLR. We'll be following up this week.
Update on the Register article. -
Intel's statement is smoke and mirrors. Yes other processors and OS's are of issue but they specifically avoid mentioning AMD. This may be true of ARM or VIA etc. but they again are very vague. For the average user of a modern home computer it may not matter much but to big business this could be a travesty in the making.
Edit; https://www.cnbc.com/2018/01/03/amd-rebukes-intel-says-flaw-poses-near-zero-risk-to-its-chips.htmlLast edited: Jan 3, 2018 -
...and this doesnt look promising
https://www.theverge.com/2018/1/3/16846840/intel-arm-processor-flaw-chipocalypse-windows-macos-linuxajc9988 likes this. -
AMD CPU's don't have the flaw Intel X86 CPU's have (according to AMD) but they are also being tagged as insecure and have the PTI fix for Intel applied to them as well.
A patch is available to disable the fix on AMD CPU's, but the kernel patch hasn't been folded in to the current build.
Here's an example of the PTI fix's performance hit on "du -s" run on the patched kernel on an AMD Epyc 7601 CPU:
This is bad: performance hit from PTI on the du -s benchmark on an AMD EPYC 7601 is 49%
https://twitter.com/grsecurity/status/947439275460702208
https://grsecurity.net/~spender/epyc_pti_results1.txt
https://grsecurity.net/~spender/epyc_nopti_results1.txt
phoronix PTI fix before / after benchmarks with significant IO usage show a big hit as well:
Initial Benchmarks Of The Performance Impact Resulting From Linux's x86 Security Changes
https://www.phoronix.com/scan.php?page=article&item=linux-415-x86pti&num=2
So if you are keeping up with new release updates, and have an AMD CPU, make sure to set ' nopti' to disable the fix.
FYI - "du" is a simple UNIX / Linux "disk usage" command used often by normal users to gather file size information of a specified file - or many files in a specified (or current directory).
For example "du -s ." will add up the sizes of all the files and files in sub-directories in the current directory ( "."); a simple way to see how much disk space the current folder is using.
This information gathering is very IO intensive in that it takes a lot of small IO accesses to get the file information for every file in the folder tree, while not benefiting from high speed IO capability from transferring large data - it's all small data accesses, so "du -s ." incurs the maximum OS overhead - running into the PTI fix performance penalty constantly.Last edited: Jan 3, 2018 -
Just got this in my Windows update...It carries a weird date and install procedure....I wonder if it has anything to do with the Bug?
I'm not doing it until I find out exactly what it is.Attached Files:
-
-
Written by Michael Larabel in Linux Kernel on 3 January 2018 at 12:45 PM EST.
https://www.phoronix.com/scan.php?page=news_item&px=Linux-Tip-Git-Disable-x86-PTI
"While at the moment with the mainline Linux kernel Git tree AMD CPUs enable x86 PTI and are treated as "insecure" CPUs, the AMD patch for not setting X86_BUG_CPU_INSECURE will end up being honored.
The patch covered in the aforelinked article has not been merged through to Linus Torvalds' Git tree. Instead, as of a short time ago, is now living within the tip/tip.git tree. In there is also defaulting PAGE_TABLE_ISOLATION to on and other recent fixes around x86 Page Table Isolation (PTI) support.
But what remains to be seen is if this work will be pulled into Linux 4.15 Git or not. We're within three weeks of the executed debut of Linux 4.15.0 stable and it isn't clear if these tip changes will be requested to be pulled into Linux 4.15 or be postponed until the start of the Linux 4.16 kernel merge window, since the safe bulk of the x86 PTI work is already in Git master. Right now the branch name doesn't indicate it's in any fixes/urgent queue nor has there been any pull request yet asking Torvalds to take it into his repository: normally tip.git master is with material for linux-next.
So we'll have to see what ends up happening in the days ahead, but regardless, at least the "AMD patch" is now sitting within a known tree that will eventually flow into the mainline Linux tree whether it be 4.15 or 4.16.
Update: Linus Torvalds has now ended up pulling the latest PTI fixes that also include the change to disable page table isolation for now on all AMD CPUs. The commit is in mainline for Linux 4.15 along with a few basic fixes and ensuring PAGE_TABLE_ISOLATION is enabled by default.
Kernel developer Thomas Gleixner wrote in the pull request of disabling KPTI on AMD hardware, "Not necessarily a fix, but if AMD is so confident that they are not affected, then we should not burden users with the overhead.""Ashtrix, Raiderman, ajc9988 and 1 other person like this. -
The Cloud Service Azure maintenance is scheduled for massive updates Jan 9th / reboots Jan 9-10th, so that's kinda the date we expect the fix roll-out to start, but it looks like the consumer's may be the first GP's if that is the update.Last edited: Jan 3, 2018KY_BULLET likes this. -
Someone else can be the guinea pig -
Never a dull moment, google now says they found a similar (same?) memory security issue last year, and says that the problem they found also affects other CPU make's:
Google Makes Disclosure About The CPU Vulnerability Affecting Intel / AMD / ARM
Written by Michael Larabel in Google on 3 January 2018 at 05:33 PM EST.
"We're finally getting actual technical details on the CPU vulnerability leading to the recent race around (K)PTI that when corrected may lead to slower performance in certain situations. Google has revealed they uncovered the issue last year and have now provided some technical bits.
Google says their Project Zero team last year discovered serious flaws in speculative execution that could lead to reading system memory where it shouldn't be authorized. Google was also able to demonstrate an attack where one VM could access the physical memory of the host machine and in turn read memory of other VMs on the same host.
Google reports that this vulnerability not only affects Intel CPUs but also AMD and ARM... Contrary to AMD saying they are not affected by this issue.
Those interested in Google's just-published technical details can find them on the Google Security Blog. Meanwhile, I'm continuing in my benchmarks around the Linux KPTI performance impact, beyond this afternoon's summary.
The issue is now being called "Meltdown and Spectre" with the bug description up at SpectreAttack.com."Last edited: Jan 3, 2018
CPU Vulnerabilities, Meltdown and Spectre, Kernel Page Table Isolation Patches, and more
Discussion in 'Hardware Components and Aftermarket Upgrades' started by hmscott, Jan 2, 2018.