Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems

Bleipriester

Freedom!
Nov 14, 2012
31,950
4,124
1,140
Doucheland
Microsoft has published information about the patches that fix the newly discovered CPU security holes. There are significant losses in performance:

"Here is the summary of what we have found so far:

  • With Windows 10 on newer silicon (2016-era PCs with Skylake, Kabylake or newer CPU), benchmarks show single-digit slowdowns, but we don’t expect most users to notice a change because these percentages are reflected in milliseconds.
  • With Windows 10 on older silicon (2015-era PCs with Haswell or older CPU), some benchmarks show more significant slowdowns, and we expect that some users will notice a decrease in system performance.
  • With Windows 8 and Windows 7 on older silicon (2015-era PCs with Haswell or older CPU), we expect most users to notice a decrease in system performance.
  • Windows Server on any silicon, especially in any IO-intensive application, shows a more significant performance impact when you enable the mitigations to isolate untrusted code within a Windows Server instance. This is why you want to be careful to evaluate the risk of untrusted code for each Windows Server instance, and balance the security versus performance tradeoff for your environment."

Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems
 
Updating your Windows will not solve the problem. You also have to download and install Bios-Updates when they are available. These Updates will include the patches from AMD and Intel. As long as you don´t, you are probably not protected. You can check if you are protected with the guide here:
Microsoft releases PowerShell script to check if your PC is vulnerable to Meltdown and Spectre

In my result, we can see that the Windows Update is applied but not active because there is no Update from the AMD:
msnfpss.jpg



CVE-2017-5715 [branch target injection] = Variant of Spectre
CVE-2017-5753 [bounds check bypass] = Variant of Spectre (maybe included in the results for CVE-2017-5715)
CVE-2017-5754 [rogue data cache load] = Meltdown (My AMD CPU is not affected)
 

Forum List

Back
Top