Intel CPU performance-loss by security-patch?!?

Discussion of anything and everything relating to chess playing software and machines.

Moderators: hgm, Rebel, chrisw

syzygy
Posts: 5557
Joined: Tue Feb 28, 2012 11:56 pm

Re: Intel CPU performance-loss by security-patch?!?

Post by syzygy »

APassionForCriminalJustic wrote:
Jouni wrote:I see now, that SF8 bench is always below 2 Mnps previuosly it was about 2 100 000 (Corei5) if I recall correctly so 5% slower :( .
Is this patch really necessary? I mean - is someone really going to hack a personal PC? Doesn't seem worth any performance loss...
The meltdown vulnerabiltiy of Intel processors is a very serious problem unless you're not connected to the internet and don't run any untrusted software. I'm sure it is already being exploited.
Paloma
Posts: 1167
Joined: Thu Dec 25, 2008 9:07 pm
Full name: Herbert L

Re: Intel CPU performance-loss by security-patch?!?

Post by Paloma »

Where is this patch?
I have not yet been offered it by Mircosoft update ?!

Win 7 prof
syzygy
Posts: 5557
Joined: Tue Feb 28, 2012 11:56 pm

Re: Intel CPU performance-loss by security-patch?!?

Post by syzygy »

Paloma wrote:Where is this patch?
I have not yet been offered it by Mircosoft update ?!

Win 7 prof
I'm not sure, but you may have received it already in December or November.
syzygy
Posts: 5557
Joined: Tue Feb 28, 2012 11:56 pm

Re: Intel CPU performance-loss by security-patch?!?

Post by syzygy »

syzygy wrote:
Paloma wrote:Where is this patch?
I have not yet been offered it by Mircosoft update ?!

Win 7 prof
I'm not sure, but you may have received it already in December or November.
Hmm, maybe not:
https://www.pcworld.com/article/3245810 ... flaws.html
Jouni
Posts: 3281
Joined: Wed Mar 08, 2006 8:15 pm

Re: Intel CPU performance-loss by security-patch?!?

Post by Jouni »

I found same bencmarks from June 2017 and after that no slowdown visible even there are some kind of Windows 10 update almost every day.
Jouni
Joost Buijs
Posts: 1563
Joined: Thu Jul 16, 2009 10:47 am
Location: Almere, The Netherlands

Re: Intel CPU performance-loss by security-patch?!?

Post by Joost Buijs »

Microsoft released some information about Meltdown and Spectre, only the fix for Spectre variant 2 'Branch Target Injection' seems to have a significant impact on performance depending on processor type and OS. This fix also needs a microcode update (via a bios update) before it can or will be enabled.

https://cloudblogs.microsoft.com/micros ... s-systems/
Paloma
Posts: 1167
Joined: Thu Dec 25, 2008 9:07 pm
Full name: Herbert L

Re: Intel CPU performance-loss by security-patch?!?

Post by Paloma »

how did you handle that problem with your pc?
Michel
Posts: 2272
Joined: Mon Sep 29, 2008 1:50 am

Re: Intel CPU performance-loss by security-patch?!?

Post by Michel »

The following link give a very readable explanation of the bugs and how the exploits work

https://blog.cloudflare.com/meltdown-sp ... technical/
Ideas=science. Simplification=engineering.
Without ideas there is nothing to simplify.
kasinp
Posts: 251
Joined: Sat Dec 02, 2006 10:47 pm
Location: Toronto
Full name: Peter Kasinski

Re: Intel CPU performance-loss by security-patch?!?

Post by kasinp »

Michel wrote:The following link give a very readable explanation of the bugs and how the exploits work

https://blog.cloudflare.com/meltdown-sp ... technical/
Thanks for the link. I have read and still have the same fundamental question about the nature of the attack, and therefore, about the ways to prevent it:

The men in black, or the exploiting code: would that not have to be some kind of malware running on my computer? And if so, why should I not expect that anti-malware software should be able to detect and prevent it? If not today, then at some point when anti-malware developers catch up to it.

Peter
Milos
Posts: 4190
Joined: Wed Nov 25, 2009 1:47 am

Re: Intel CPU performance-loss by security-patch?!?

Post by Milos »

kasinp wrote:The men in black, or the exploiting code: would that not have to be some kind of malware running on my computer? And if so, why should I not expect that anti-malware software should be able to detect and prevent it? If not today, then at some point when anti-malware developers catch up to it.
Peter
Yes it would have to be a malware, but problem is thanks to the general nature of exploit knowing how the exploit work would make it very easy to write millions of version of the malware that would all have different signatures effectively making it impossible for anti-malware developers to catch up to it.