New Intel Security Flaw Fix Could Slow All Intel CPU''s Up To 30 Percent

I downloaded the Windows 10 update, I say now change in a Cinebench benchmark for my i5-4590.
 
Google released another statement
In addition, we have deployed Kernel Page Table Isolation (KPTI) -- a general purpose technique for better protecting sensitive information in memory from other software running on a machine -- to the entire fleet of Google Linux production servers that support all of our products, including Search, Gmail, YouTube, and Google Cloud Platform.

There has been speculation that the deployment of KPTI causes significant performance slowdowns. Performance can vary, as the impact of the KPTI mitigations depends on the rate of system calls made by an application. On most of our workloads, including our cloud infrastructure, we see negligible impact on performance.

In our own testing, we have found that microbenchmarks can show an exaggerated impact. Of course, Google recommends thorough testing in your environment before deployment; we cannot guarantee any particular performance or operational impact.
 
Windows benchmarks including games. 4k reads seem to be taking a big hit, nothing else was affected though. He commented in the comments that he tested with a 2600k and has got similar results.
 
Last edited:
Official response from AMD opens the door to potential problems but states it's safe as of right now.

"
Variant / AMD Response Matrix
Google Project Zero (GPZ) Research Title Details
Variant One Bounds Check Bypass Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.
Variant Two Branch Target Injection Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant Three Rogue Data Cache Load Zero AMD vulnerability due to AMD architecture differences.


As the security landscape continues to evolve, a collaborative effort of information sharing in the industry represents the strongest defense.

Total protection from all possible attacks remains an elusive goal and this latest example shows how effective industry collaboration can be.

As always, AMD strongly encourages its customers to consistently undertake safe computing practices, examples of which include: not clicking on unrecognized hyperlinks, following strong password protocols, using secure networks, and accepting regular software updates.
"
 
Tech Yes City with more gaming benchmarks with a Xeon X5670 (LGA1366). Adobe Premier as well.
 
AMD is big winner from chip flaw fiasco as more than $11 billion in Intel stock value is wiped out
  • Companies will likely diversify their chip security architecture risk by buying more AMD server chips.
  • Fred Hickey, editor of High Tech Strategist, says AMD's new server chips "already had momentum and that momentum will likely be propelled further by the recent security issue disclosures."
Tae Kim | @firstadopter
Published 5 Hours Ago Updated 2 Hours AgoCNBC.com


AMD is big winner from chip flaw fiasco as more than $11 billion in Intel stock value is wiped out 1 Hour Ago | 00:43

Investors are piling into AMD shares and selling Intel stock after major chip security vulnerabilities were revealed earlier this week, and it totally makes sense.

Enterprises will likely diversify their chip security architecture risk for mission-critical applications by buying more AMD server chips. The company's "architecture differences" have proven immune to the more problematic one of the two disclosed vulnerabilities.

British tech website The Register reported Tuesday that some Intel processors have a "fundamental design flaw" and security issue, which spurred the company to confirm the problem later in the day.


AMD shares are up 10.4 percent in the two days through Thursday following the report, while Intel's stock declined 5.2 percent in the period, wiping out $11.3 billion of shareholder value.

One of the two vulnerabilities, called Meltdown, affects Intel processors. The other, named Spectre, could affect chips from Intel, AMD and Arm.

Intel said Wednesday that performance degradation after security updates for Meltdown "should not be significant" for the average user. But on a call with investors, the company admitted a decrease in performance of up to 30 percent was possible after fixes under some "synthetic workloads."

Bank of America Merrill Lynch told clients the big Intel performance hits were "likely for enterprise and server workloads."

On the flip side, AMD said any performance hits will be "negligible" after Spectre-related security software updates and there is "near zero risk of exploitation." The company also confirmed it is not affected by Meltdown due to processor "architecture differences."

Researchers and Apple said Spectre is more difficult to exploit.

Multiple Wall Street analysts predicted AMD will take advantage of the Intel's security issues.

AMD could use it as "a marketing edge given differing architectures and no vulnerability yet," Mizuho Securities analyst Vijay Rakesh wrote in a note to clients Wednesday.

Intel's high-profit data-center business, which sells server chips to cloud computing providers and enterprises, is the chipmaker's crown jewel.

Rakesh noted that Intel had 99 percent market share of the data-center market, representing a huge opportunity for AMD.

Analysts estimate that Intel's data-center group will generate $18.5 billion in sales and $7.4 billion in operating profit in 2017, according to FactSet.

"Longer-term customers could be more motivated to find alternatives at AMD and possibly ARM (CAVM benefits) to diversify the architectural risks," Bank of America Merrill Lynch analyst Vivek Arya wrote Thursday. "AMD appears poised to be the most direct beneficiary."

An AMD gain of significant market share in the server market is not unprecedented. The company hit 25 percent share in 2006. If AMD is able to reach 10 percent or 15 percent market share of the data-center business, it could add billions in revenue to the company's financial results.

Any increase will be a boon for AMD because the Wall Street consensus for the company's 2017 estimated sales is just $5.25 billion.

One leading tech industry analyst says the chipmaker will do just that.

"The news of Intel's processor security issue and the potential performance degradation to correct it comes at an inopportune time as Intel currently faces heavy competitive pressure from its long-time nemesis, AMD," Fred Hickey, editor of High Tech Strategist, wrote in an email Thursday. "AMD's new line of chips is a significant challenger for the first time in many years (since AMD's Opteron chip days)."

AMD launched new line Epyc data-center processors to much fanfare last June with design wins at cloud computing providers MicrosoftAzure and Baidu.

"For Intel, it likely means loss of market share (lower revenues) as well as loss of pricing power (lower gross margins) as the advantage shifts to the buyers and away from Intel, which has totally dominated the PC/computer server processor market in recent years," Hickey said. "AMD's new processor chips already had momentum and that momentum will likely be propelled further by the recent security issue disclosures."
LOL, yeah, I'd say so:
After Meltdown and Spectre revelation, questions arise about timing of Intel CEO’s stock sales

And yet, in spite of it all, LMFAO:
Intel stock rises despite CPU fiasco.png
 

AMD seems to keep having things fall into their lap, which is awesome because we're starting to see competition again. The crypto craze hit at the perfect time to help them move massive amounts of cards and now this. Ryzen 2 is lining up to be a huge seller.


Raspberry Pi's are safe
https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/
 
lol maybe i should look into a ryzen build
 
Gaming isn't affected.

I mostly stopped caring after that.
It''s not about gaming you need to watch the video I posted. The chips defective a software patch to the eprom will not repair the chip.

The only corrective way is to do a hardware change or redesign the cpu. Intel releasing a software patch will only buy time hackers will find workarounds.

The other issue is DirectX games Microsoft has not released their patch they waited till Intel released their code patch then motherboard vendors have to update their boards code.
 
It''s not about gaming you need to watch the video I posted. The chips defective a software patch to the eprom will not repair the chip.

The only corrective way is to do a hardware change or redesign the cpu. Intel releasing a software patch will only buy time hackers will find workarounds.

The other issue is DirectX games Microsoft has not released their patch they waited till Intel released their code patch then motherboard vendors have to update their boards code.

I think you, like a lot of fanboys and the media, are blowing this waaaay out of proportion. Yes, there is an issue. And yes, it's being fixed. Remember when everyone's bank accounts got hacked during Heartbleed?

Google
There has been speculation that the deployment of KPTI causes significant performance slowdowns. Performance can vary, as the impact of the KPTI mitigations depends on the rate of system calls made by an application. On most of our workloads, including our cloud infrastructure, we see negligible impact on performance.

Amazon
“We don’t expect meaningful performance impact for most customer workloads,” Amazon told Business Insider. “There may end up being cases that are workload or OS specific that experience more of a performance impact. In those isolated cases, we will work with customers to mitigate any impact.”
 
It''s not about gaming you need to watch the video I posted. The chips defective a software patch to the eprom will not repair the chip.

The only corrective way is to do a hardware change or redesign the cpu. Intel releasing a software patch will only buy time hackers will find workarounds.

The other issue is DirectX games Microsoft has not released their patch they waited till Intel released their code patch then motherboard vendors have to update their boards code.
Jesus...is your grasp of all this really that feeble?
 
Jesus...is your grasp of all this really that feeble?
"VariantTwo Branch Target Injection Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant Three Rogue Data Cache Load Zero AMD vulnerability due to AMD architecturedifferences."

Read it.
 
Jesus...is your grasp of all this really that feeble?
Like I posted above, there's a lot of fanboyism and media blowing this way out of proportion.
There's security flaws that are patched all the time, we just don't know about them. The only reason we heard about this is that is was leaked and someone broke the NDA.
 
Back
Top