1. We're giving away an NVIDIA RTX 6000 video card!
    Dismiss Notice
  2. OCAU Merchandise is available! Check out our 20th Anniversary Mugs, Classic Logo Shirts and much more! Discussion in this thread.
    Dismiss Notice
  3. We're giving away an NVIDIA RTX 6000 video card!
    Dismiss Notice
  4. OCAU Merchandise is available! Check out our 20th Anniversary Mugs, Classic Logo Shirts and much more! Discussion in this thread.
    Dismiss Notice

Intel cpu flaw - kernel memory leaking

Discussion in 'Intel x86 CPUs and chipsets' started by argent, Jan 3, 2018.

  1. dirtyd

    dirtyd Member

    Joined:
    Jan 4, 2006
    Messages:
    4,262
    Location:
    Melbs
  2. cvidler

    cvidler Member

    Joined:
    Jun 29, 2001
    Messages:
    19,821
    Location:
    Canberra
    unless you're the CIA wanting to target Iranian reactors, malware is very rarely targeted at anything other than 'everything and anything'.
     
  3. ipv6ready

    ipv6ready Member

    Joined:
    Feb 10, 2014
    Messages:
    3,607
    Location:
    North Sydney
    So I presume it is Kabylake and down that is affected by the bug.
     
  4. mAJORD

    mAJORD Member

    Joined:
    Jun 4, 2002
    Messages:
    14,299
    Location:
    Griffin , Brisbane
    AMD has only confirmed 1 of the 3 exploits announced require a workaround - It's that simple.
     
  5. genxor

    genxor Member

    Joined:
    May 9, 2003
    Messages:
    487
    Location:
    Perth
    Anything made in the last 10 years apparently so that'd be a shitload of CPUs if true. Pretty scary that the majority won't be patched
     
  6. Pemalite

    Pemalite Member

    Joined:
    Jul 20, 2010
    Messages:
    723
    Location:
    Port Lincoln, SA
    I am just laughing at you being in damage control.
    This is just Karma after all your immature Failzen bashing.

    Intel gone and stuffed up massively. Accept it and move on, these things happen, in-fact it is not the first time a massive flaw has been found in Intel processors. (Or AMD for that matter.)
    And it will happen again.

    As processors grow exponentially in size... Then so does their chances of errata.
     
    VirtualNinja likes this.
  7. flu!d

    flu!d Motoring and Intel forum admin

    Joined:
    Jun 27, 2001
    Messages:
    23,496
    There's two exploits here, one of which affects every processor out there with the exception of Cirtix and Via (sarcasm intended).

    Doesn't bother me as I'm not the kind of person that wastes money on a constant upgrade cycle in order to have the best sig, I'm still running an x58 system with a Xeon in my main rig under Linux and a 2700k in my Windows PC, which I never use as Windows 10 sucks - Both have served me exceptionally well. When the time comes that this issue is resolved in silicon, I'll update my rig (probably get rid of the Windows rig) and be happy for the next ten years.
     
  8. Apokalipse

    Apokalipse Member

    Joined:
    May 29, 2006
    Messages:
    4,250
    Location:
    Melbourne
    Only variant 1, on Linux in a non-default configuration (when you have explicitly enabled eBPF JIT). Not on Windows at all.
    AMD is not vulnerable to variant 2 or variant 3.
     
  9. Zenskas

    Zenskas Member

    Joined:
    Jan 27, 2010
    Messages:
    2,162
    Location:
    Tas
    Linus has made a comment here (no not that Linus, the smart one)

    I really hope this doesn't affect general desktop performance more than a few percent...most of my PCs are running Intel chips :(

    In gaming I've read that the fixes don't have any initial negative impacts but I think way more testing will need to be done before I believe that. Minimum frames and frame pacing being the two areas that need a really close look IMO.
     
    Last edited: Jan 5, 2018
  10. GumbyNoTalent

    GumbyNoTalent Member

    Joined:
    Jan 8, 2003
    Messages:
    11,893
    Location:
    Briz Vegas
  11. itsmydamnation

    itsmydamnation Member

    Joined:
    Apr 30, 2003
    Messages:
    10,742
    Location:
    Canberra
    There are three attack vectors grouped into 2 pretty/cute names. all 3 effect Intel, arm has acknowledged that all three can be an issue for them. AMD has stated that meltdown doesn't effect them, that they believe they are secure to one of spectre attacks and acknowledge vulnerability to one.

    If you read the spectre paper they never were able to get both attacks on amd to work but believe it is vulnerable. AMD on the otherhand believe that they arent vulnerable to the second method of attack. So right now it's 3 of 3 for Intel and 3 of 3 for arm and 1 of 3 for amd.

    anyone who says differently should stop spreading FUD and put there money where there mouth is and produce evidence of the compromise!
     
    VirtualNinja and AEKaBeer like this.
  12. flu!d

    flu!d Motoring and Intel forum admin

    Joined:
    Jun 27, 2001
    Messages:
    23,496
    With the exception of Intel, until there are no 'can', believe' and 'never were ables' - It's all FUD.
     
  13. itsmydamnation

    itsmydamnation Member

    Joined:
    Apr 30, 2003
    Messages:
    10,742
    Location:
    Canberra
    Bull**** , systems are complex and new discoveries are made and things change over time. Researchers have been working on the for 1/2 a year as it stands its 1 of 3 for AMD, to say anything else at the stage is simply incorrect.

    There is very strong language around meltdown, and less strong words around Branch Target Injection. Thats because speculative execution is extremely complex crossing many domains within the CPU ( predict, prefetch, decode/op cache, Load and store, Retirement) so that increases the risk of a possible attack vector(swiss cheese model) compared to the much simpler to protect against in hardware Rogue Data Cache Load ( Meltdown).

    Again this is all false equivalence, if AMD are vulnerable to Branch Target Injection researchers haven't been able to find it and/or make it work in 6 months but have empirical data of successful compromise for other vendors.
     
    mAJORD likes this.
  14. BiggusDickus

    BiggusDickus Member

    Joined:
    Aug 8, 2006
    Messages:
    341
    Location:
    Brentwood WA
  15. adamsleath

    adamsleath Member

    Joined:
    Oct 17, 2006
    Messages:
    24,385
    Location:
    Sunnybank Q 4109
    need to see revised benchmarks after the patching.
     
  16. Supersize

    Supersize Member

    Joined:
    Jul 30, 2008
    Messages:
    2,576
    Location:
    Gold Coast QLD
  17. General_Cartman

    General_Cartman Member

    Joined:
    Apr 28, 2005
    Messages:
    2,752
    Location:
    The Confedaracah!
    Unless you're doing a lot of IO you won't see that much of a performance decrease. Home users don't really have anything to worry about. Database servers - that's a completely different story.
     
  18. BiggusDickus

    BiggusDickus Member

    Joined:
    Aug 8, 2006
    Messages:
    341
    Location:
    Brentwood WA
    Would multiplayer gaming count as a lot of IO? I'm not sure how this would compare to web server levels of IO...
     
  19. pH@tTm@N

    pH@tTm@N Member

    Joined:
    Jun 27, 2001
    Messages:
    2,590
    Location:
    BRISBANE
    hypervisors will be hit heavily. if you only have 30% overhead capacity remaining kiss it goodbye.
     
  20. im late

    im late Member

    Joined:
    Jan 5, 2012
    Messages:
    1,899
    Location:
    Booragoon WA 6154

Share This Page

Advertisement: