Lost from crippling a CPU or lost from accelerants forgone? E.g. -- speculative execution was an accelerant.. . . Each new patch is more performance that is potentially lost.
Sauce: https://www.phoronix.com/scan.php?page=article&item=swapgs-spectre-impact&num=1In the other common benchmarks tested, the SWAPGS performance impact tended to be 1% or less at least for this latest generation Intel Core i9 9900K desktop. Additional tests are currently being conducted on more hardware and more benchmarks. At least as it stands now it seems to be largely a 1% or less performance hit (with select exceptions at ~5%), so not nearly as bad as the other Spectre/Meltdown/Foreshadow/Zombieload mitigations, but this is on top of all that we've seen since January 2018.
Accelerant. But you know the drill by now.Lost from crippling a CPU or lost from accelerants forgone? E.g. -- speculative execution was an accelerant.
[phoronix.com] Initial Benchmarks Of The Spectre "SWAPGS" Mitigation Performance Impact
What is the performance impact from this update?
The fix for this CVE has shown to cause a minimal performance impact. The impact will be felt more in applications with high rates of user-kernel-user space transitions. For example, in system calls, NMIs, and kernel interrupts.
Although there is no way to say what the impact will be for any given workload, in our testing we determined that the performance changes are not measurable in current benchmarks.
There was some confusion on that at first. The original researchers said they tried it on 2 AMD chips but they weren't vulnerable. AMD says they are not affected. Microsoft says AMD is not affected. The Linux kernel patch only applies to Intel CPUs. Redhat is the only one saying AMD is vulnerable despite having no patch that applies to AMD systems.Ugh...Did anyone actually read the article? AMD is affected too, as is ARM. You fell for the clickbait headline. This nothing more than another Specter V1 variant.
As far as performance, here's Redhat:
For someone who complains that people don't read the article, maybe you should look a little closer yourself:What are you talking about? RHEL has been patched for AMD.
Don't be a Larry, facts are your friend.
Phoronix said:Contrary to Red Hat's report initially saying AMD CPUs are affected, the Linux kernel is not applying this SWAPGS mitigation to AMD hardware
Does anyone still do "self-pnwage of the year" in ATOT anymore?What are you talking about? RHEL has been patched for AMD.
I, for one, would be honored. You rock, VirtualLarry! Mostly!Don't be a Larry, facts are your friend.
Probably one of the reasons why I hit these forums 99x more often than the main page.Still not even an article reporting the mere existence of the ZombieLoad exploit from AT.
Thread starter | Similar threads | Forum | Replies | Date |
---|---|---|---|---|
![]() |
News Windows on ARM, getting 64 bit emulation | CPUs and Overclocking | 53 | |
I | Question Is the Thread Ripper 3990x issue with windows 10 still there? | CPUs and Overclocking | 17 | |
![]() |
Question Ryzen 3600 CPU blue screening on windows login | CPUs and Overclocking | 16 |