Page 1 of 2 12 LastLast
Results 1 to 16 of 25

Thread: AMD provides update on Spectre and Meltdown patches

  1. #1
    HEXUS.admin
    Join Date
    Apr 2005
    Posts
    31,709
    Thanks
    0
    Thanked
    2,060 times in 719 posts

    AMD provides update on Spectre and Meltdown patches

    And Nvidia has patched its drivers to mitigate for host CPU (not its GPU) and OS issues.
    Read more.

  2. #2
    Senior Member spacein_vader's Avatar
    Join Date
    Sep 2014
    Location
    Darkest Northamptonshire
    Posts
    1,936
    Thanks
    172
    Thanked
    708 times in 361 posts
    • spacein_vader's system
      • Motherboard:
      • Asus B85M-G
      • CPU:
      • i5 4460 3.2GHz
      • Memory:
      • 4x4GB Crucial DDR3 1600
      • Storage:
      • 256GB Crucial MX100, 500GB Crucial MX100, 1TB Crucial MX200
      • Graphics card(s):
      • Asus RX 480 Dual OC 4GB
      • PSU:
      • Corsair HX 520W modular
      • Case:
      • Fractal Design Meshify C
      • Operating System:
      • Pop!_OS 19:10 / Windows 10 Pro
      • Monitor(s):
      • BenQ GW2765, Dell Ultrasharp U2412
      • Internet:
      • Zen Internet

    Re: AMD provides update on Spectre and Meltdown patches

    So Nvidia GPUs aren't vulnerable but they're releasing an update anyway? Eh?

  3. #3
    Not a good person scaryjim's Avatar
    Join Date
    Jan 2009
    Location
    Gateshead
    Posts
    15,196
    Thanks
    1,231
    Thanked
    2,291 times in 1,874 posts
    • scaryjim's system
      • Motherboard:
      • Dell Inspiron
      • CPU:
      • Core i5 8250U
      • Memory:
      • 2x 4GB DDR4 2666
      • Storage:
      • 128GB M.2 SSD + 1TB HDD
      • Graphics card(s):
      • Radeon R5 230
      • PSU:
      • Battery/Dell brick
      • Case:
      • Dell Inspiron 5570
      • Operating System:
      • Windows 10
      • Monitor(s):
      • 15" 1080p laptop panel

    Re: AMD provides update on Spectre and Meltdown patches

    Quote Originally Posted by spacein_vader View Post
    So Nvidia GPUs aren't vulnerable but they're releasing an update anyway? Eh?
    It would appear that certain calls in the nvidia GPU driver could be an avenue of attack against vulnerable CPUs. Presumably some software contains more instructions and pathways that could be used as a channel for the attacks, and since GPU drivers will cross the user and kernel memory spaces to some degree it's plausible to me that you could tweak a GPU driver to make it less vulnerable to use as an attack vector.

    CAT-THE-FIFTH has pointed out elsewhere that nvidia moved a lot of the scheduling for their GPUs to software a few generations ago, which may be a partial explanation for why nvidia have been particularly pro-active in optimising their drivers.

  4. #4
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    12,335
    Thanks
    714
    Thanked
    1,406 times in 1,188 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 3700X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 1TB Linux, 1TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 33 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 80Mb/20Mb VDSL

    Re: AMD provides update on Spectre and Meltdown patches

    Quote Originally Posted by scaryjim View Post
    CAT-THE-FIFTH has pointed out elsewhere that nvidia moved a lot of the scheduling for their GPUs to software a few generations ago, which may be a partial explanation for why nvidia have been particularly pro-active in optimising their drivers.
    I would hope that scheduling would be in a user mode driver, so no impact.

  5. #5
    Senior Member
    Join Date
    Dec 2013
    Posts
    3,526
    Thanks
    504
    Thanked
    468 times in 326 posts

    Re: AMD provides update on Spectre and Meltdown patches

    Quote Originally Posted by DanceswithUnix View Post
    I would hope that scheduling would be in a user mode driver, so no impact.
    True but doesn't it, at some point, have to do a context switch so the Kernel can dispatch the data to the GPU?

  6. #6
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    12,335
    Thanks
    714
    Thanked
    1,406 times in 1,188 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 3700X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 1TB Linux, 1TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 33 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 80Mb/20Mb VDSL

    Re: AMD provides update on Spectre and Meltdown patches

    Quote Originally Posted by Corky34 View Post
    True but doesn't it, at some point, have to do a context switch so the Kernel can dispatch the data to the GPU?
    No, the GPU is memory mapped and so during set up can be mapped such that a user mode process can write to it.

    Kernel needs to do support stuff like route interrupts and initial hardware setup, but the main fast path you would hope will be user only.

    Other hardware I have worked on functions that way, I presume Nvidia would do the same.

  7. #7
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    12,335
    Thanks
    714
    Thanked
    1,406 times in 1,188 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 3700X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 1TB Linux, 1TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 33 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 80Mb/20Mb VDSL

    Re: AMD provides update on Spectre and Meltdown patches

    Interesting article: https://arstechnica.com/gadgets/2018...t-performance/

    an unpatched Linux system can switch about 5.2 million times a second. Dual page tables slashes that to 2.2 million a second; dual page tables with PCID gets it back up to 3 million.
    Which I think puts some context on this. If your workload is trying to push the CPU to do over a million kernel context switches per second, like some of the benchmarks do, then you could see some slowdown.

  8. Received thanks from:

    kalniel (12-01-2018)

  9. #8
    Banhammer in peace PeterB kalniel's Avatar
    Join Date
    Aug 2005
    Posts
    30,749
    Thanks
    1,789
    Thanked
    3,289 times in 2,647 posts
    • kalniel's system
      • Motherboard:
      • Gigabyte Z390 Aorus Ultra
      • CPU:
      • Intel i9 9900k
      • Memory:
      • 32GB DDR4 3200 CL16
      • Storage:
      • 1TB Samsung 970Evo+ NVMe
      • Graphics card(s):
      • nVidia GTX 1060 6GB
      • PSU:
      • Seasonic 600W
      • Case:
      • Cooler Master HAF 912
      • Operating System:
      • Win 10 Pro x64
      • Monitor(s):
      • Dell S2721DGF
      • Internet:
      • rubbish

    Re: AMD provides update on Spectre and Meltdown patches

    Ah, that explains why my new westmere hasn't particularly improved (meltdown specifically affected) things with PCID support (alone), need Haswell's INVPCID as well :/

  10. Received thanks from:

    Millennium (14-01-2018)

  11. #9
    root Member DanceswithUnix's Avatar
    Join Date
    Jan 2006
    Location
    In the middle of a core dump
    Posts
    12,335
    Thanks
    714
    Thanked
    1,406 times in 1,188 posts
    • DanceswithUnix's system
      • Motherboard:
      • Asus X470-PRO
      • CPU:
      • 3700X
      • Memory:
      • 32GB 3200MHz ECC
      • Storage:
      • 1TB Linux, 1TB Games (Win 10)
      • Graphics card(s):
      • Asus Strix RX Vega 56
      • PSU:
      • 650W Corsair TX
      • Case:
      • Antec 300
      • Operating System:
      • Fedora 33 + Win 10 Pro 64 (yuk)
      • Monitor(s):
      • Benq XL2730Z 1440p + Iiyama 27" 1440p
      • Internet:
      • Zen 80Mb/20Mb VDSL

    Re: AMD provides update on Spectre and Meltdown patches

    The big question I still want an answer to: Why is the Spectre in the logo holding a stick?
    Edit: Oh, it's a branch isn't it. *foreheadslap*

  12. #10
    Not a good person scaryjim's Avatar
    Join Date
    Jan 2009
    Location
    Gateshead
    Posts
    15,196
    Thanks
    1,231
    Thanked
    2,291 times in 1,874 posts
    • scaryjim's system
      • Motherboard:
      • Dell Inspiron
      • CPU:
      • Core i5 8250U
      • Memory:
      • 2x 4GB DDR4 2666
      • Storage:
      • 128GB M.2 SSD + 1TB HDD
      • Graphics card(s):
      • Radeon R5 230
      • PSU:
      • Battery/Dell brick
      • Case:
      • Dell Inspiron 5570
      • Operating System:
      • Windows 10
      • Monitor(s):
      • 15" 1080p laptop panel

    Re: AMD provides update on Spectre and Meltdown patches

    Quote Originally Posted by DanceswithUnix View Post
    ... Edit: Oh, it's a branch isn't it. *foreheadslap*
    Although at a stretch you could argue it's a reference to (Out of) Order of the Stick (execution)...

  13. #11
    Senior Member
    Join Date
    May 2009
    Location
    Where you are not
    Posts
    1,244
    Thanks
    519
    Thanked
    90 times in 79 posts
    • Iota's system
      • Motherboard:
      • Asus Maximus Hero XI
      • CPU:
      • Intel Core i9 9900KF
      • Memory:
      • CMD32GX4M2C3200C16
      • Storage:
      • 1 x 250GB / 1 x 1TB / 1 x 2TB Samsung 970 Evo Plus NVMe
      • Graphics card(s):
      • Nvidia RTX 3090 Founders Edition
      • PSU:
      • Corsair HX1200i
      • Case:
      • Corsair Obsidian 500D
      • Operating System:
      • Windows 10 Pro 64-bit
      • Monitor(s):
      • Samsung Odyssey G9
      • Internet:
      • 40Mbps SKY Fibre

    Re: AMD provides update on Spectre and Meltdown patches

    Quote Originally Posted by kalniel View Post
    Ah, that explains why my new westmere hasn't particularly improved (meltdown specifically affected) things with PCID support (alone), need Haswell's INVPCID as well :/
    Yes, annoyingly earlier Sandy Bridge has PCID, but not INVPCID, which means;

    Windows will use PCID if the hardware supports INVPCID—that means Haswell or newer. If the hardware doesn't support INVPCID, then Windows won't fall back to using plain PCID; it just won't use the feature at all.
    So you end up with more overhead due to TLB flushing on older CPUs. It also probably explains why Intel has cherry picked which CPUs it shows performance impacts on, because they know the fix for older CPUs introduces more overhead in certain scenarios. It really does depend on what you are using your PC for though.

  14. Received thanks from:

    Millennium (14-01-2018)

  15. #12
    Senior Member
    Join Date
    Aug 2017
    Posts
    278
    Thanks
    10
    Thanked
    28 times in 19 posts

    Re: AMD provides update on Spectre and Meltdown patches

    On the other hand....Complete silence from Intel on their mitigation scenarios with specifically, the Meltdown problem (apart form " We take customers security seriously") Reading 90% of the tech press - you would be forgiven for thinking that there is comparable culpability from InteL, AMD, and ARM.
    There is not. Intel still has the Meltdown architecture problem that affects ALL Intel products. Maybe that's why their CEO sold off all his stock in October, when the problem was going to be made public. But kept only the bare minimum that is allowed legally.

  16. Received thanks from:

    Millennium (14-01-2018)

  17. #13
    Registered+
    Join Date
    Apr 2017
    Posts
    22
    Thanks
    0
    Thanked
    0 times in 0 posts

    Re: AMD provides update on Spectre and Meltdown patches

    Maybe instead of worrying so much about viruses, protecting yourself from them and clogging up your computer with rubbish to combat it, perhaps just don't click on stupid things if you don't know what they do, don't open emails you don't know where they came from and don't visit unknown websites?

    Reminds me of people that buy into weight loss gimmicks when all you EVER need to do is make sure you're using up more caloric energy than you take in.

    It's not rocket science.

  18. #14
    Senior Member
    Join Date
    Jul 2009
    Location
    West Sussex
    Posts
    1,616
    Thanks
    165
    Thanked
    227 times in 208 posts
    • kompukare's system
      • Motherboard:
      • Asus P8Z77-V LX
      • CPU:
      • Intel i5-3570K
      • Memory:
      • 4 x 8GB DDR3
      • Storage:
      • Samsung 850 EVo 500GB | Corsair MP510 960GB | 2 x WD 4TB spinners
      • Graphics card(s):
      • Sappihre R7 260X 1GB (sic)
      • PSU:
      • Antec 650 Gold TruePower (Seasonic)
      • Case:
      • Aerocool DS 200 (silenced, 53.6 litres)l)
      • Operating System:
      • Windows 10-64
      • Monitor(s):
      • 2 x ViewSonic 27" 1440p

    Re: AMD provides update on Spectre and Meltdown patches

    Quote Originally Posted by deadcatwalking View Post
    Maybe instead of worrying so much about viruses, protecting yourself from them and clogging up your computer with rubbish to combat it, perhaps just don't click on stupid things if you don't know what they do, don't open emails you don't know where they came from and don't visit unknown websites?
    Well, plenty of well-known website have had problems with malicious things being served with their adverts etc., so it's naïve to imagine that people only get viruses when visiting dodgy sites.

  19. #15
    Senior Member
    Join Date
    May 2014
    Posts
    2,385
    Thanks
    181
    Thanked
    304 times in 221 posts

    Re: AMD provides update on Spectre and Meltdown patches

    Quote Originally Posted by deadcatwalking View Post
    Maybe instead of worrying so much about viruses, protecting yourself from them and clogging up your computer with rubbish to combat it, perhaps just don't click on stupid things if you don't know what they do, don't open emails you don't know where they came from and don't visit unknown websites?

    Reminds me of people that buy into weight loss gimmicks when all you EVER need to do is make sure you're using up more caloric energy than you take in.

    It's not rocket science.
    As a Security Professional i cannot begin to list how many different kinds of wrong you are.

    A large percentage of hacks are performed as a drive by while you're visiting legitimate benign sites. This is through malicious cookies or a hackvertisement backdooring through your browser via scripts.

    The internet is not safe, wherever you go

  20. #16
    bios curious
    Join Date
    Mar 2013
    Location
    Lancashire
    Posts
    320
    Thanks
    203
    Thanked
    41 times in 34 posts
    • Mr_Jon's system
      • Motherboard:
      • ASRock AB350 Pro4
      • CPU:
      • Ryzen 5 1600
      • Memory:
      • Ballistix Sport LT DDR4-2666, 24gb
      • Storage:
      • Samsung 970 EVO NVME
      • Graphics card(s):
      • Gigabyte GTX 1070 G1
      • PSU:
      • EVGA SuperNOVA 650 G2
      • Case:
      • Fractal Design Define XL R2
      • Operating System:
      • Windows 10 Pro
      • Monitor(s):
      • Samsung C32JG50 WQHD @ 144hz

    Re: AMD provides update on Spectre and Meltdown patches

    Quote Originally Posted by deadcatwalking View Post
    Maybe instead of worrying so much about viruses, protecting yourself from them and clogging up your computer with rubbish to combat it, perhaps just don't click on stupid things if you don't know what they do, don't open emails you don't know where they came from and don't visit unknown websites?

    Reminds me of people that buy into weight loss gimmicks when all you EVER need to do is make sure you're using up more caloric energy than you take in.

    It's not rocket science.
    Yes...with viruses - but the whole spectre/meltdown hoo-hah goes behind that, in that it's out of the hands of the end user.

    Couldn't agree more though when it comes to being careful what one clicks on. I've had one virus in 25 years of computing. The work computer, on the other hand, has a virus/malware/pup every other week due to its principle users clicking on crap and insisting on using an unprotected browser (which in itself will have installed even more bumph without them realising).

Page 1 of 2 12 LastLast

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •