Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems

Discussion in 'Computers' started by Bleipriester, Jan 10, 2018.

  1. Bleipriester
    Online

    Bleipriester Freedom!

    Joined:
    Nov 14, 2012
    Messages:
    20,086
    Thanks Received:
    1,314
    Trophy Points:
    275
    Location:
    Syrian troll farm
    Ratings:
    +5,482
    Microsoft has published information about the patches that fix the newly discovered CPU security holes. There are significant losses in performance:

    "Here is the summary of what we have found so far:

    • With Windows 10 on newer silicon (2016-era PCs with Skylake, Kabylake or newer CPU), benchmarks show single-digit slowdowns, but we don’t expect most users to notice a change because these percentages are reflected in milliseconds.
    • With Windows 10 on older silicon (2015-era PCs with Haswell or older CPU), some benchmarks show more significant slowdowns, and we expect that some users will notice a decrease in system performance.
    • With Windows 8 and Windows 7 on older silicon (2015-era PCs with Haswell or older CPU), we expect most users to notice a decrease in system performance.
    • Windows Server on any silicon, especially in any IO-intensive application, shows a more significant performance impact when you enable the mitigations to isolate untrusted code within a Windows Server instance. This is why you want to be careful to evaluate the risk of untrusted code for each Windows Server instance, and balance the security versus performance tradeoff for your environment."

    Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems
     
    • Thank You! Thank You! x 1
  2. Bleipriester
    Online

    Bleipriester Freedom!

    Joined:
    Nov 14, 2012
    Messages:
    20,086
    Thanks Received:
    1,314
    Trophy Points:
    275
    Location:
    Syrian troll farm
    Ratings:
    +5,482
    Updating your Windows will not solve the problem. You also have to download and install Bios-Updates when they are available. These Updates will include the patches from AMD and Intel. As long as you don´t, you are probably not protected. You can check if you are protected with the guide here:
    Microsoft releases PowerShell script to check if your PC is vulnerable to Meltdown and Spectre

    In my result, we can see that the Windows Update is applied but not active because there is no Update from the AMD:
    [​IMG]


    CVE-2017-5715 [branch target injection] = Variant of Spectre
    CVE-2017-5753 [bounds check bypass] = Variant of Spectre (maybe included in the results for CVE-2017-5715)
    CVE-2017-5754 [rogue data cache load] = Meltdown (My AMD CPU is not affected)
     

Share This Page