• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

Windows 10 1H-2019 Update to Reduce Performance Impact of Spectre V2 Mitigations

btarunr

Editor & Senior Moderator
Staff member
Joined
Oct 9, 2007
Messages
47,895 (7.38/day)
Location
Dublin, Ireland
System Name RBMK-1000
Processor AMD Ryzen 7 5700G
Motherboard Gigabyte B550 AORUS Elite V2
Cooling DeepCool Gammax L240 V2
Memory 2x 16GB DDR4-3200
Video Card(s) Galax RTX 4070 Ti EX
Storage Samsung 990 1TB
Display(s) BenQ 1440p 60 Hz 27-inch
Case Corsair Carbide 100R
Audio Device(s) ASUS SupremeFX S1220A
Power Supply Cooler Master MWE Gold 650W
Mouse ASUS ROG Strix Impact
Keyboard Gamdias Hermes E2
Software Windows 11 Pro
Microsoft is working to reduce the performance impact of "Spectre" V2 security vulnerability software mitigation with its next major update to Windows 10. The major update that's scheduled for the first half of 2019, will feature the "Retpoline" mitigation enabled on the operating system's kernel by default. Retpoline will be enabled in addition something Microsoft's OS kernel developer Mehmet Iyigun calls "import optimization." Together, the two reduce the impact of Spectre V2 software mitigation to "noise-level" (i.e. that which can be discounted for random variation, or minimal).



View at TechPowerUp Main Site
 
I see more broken PCs in the future
 
I'll rather buy an AMD processor.
 
Me too, intel is going dodo.
 
AMD is affected by Spectre v2 as well. And the mitigations are global anyhow.



Nope. You are thinking of Meltdown and Spectre variant 1.
You are right.
I can't keep track of all those vulnerabilities, patches, updates and so on. . .
 
AMD is affected by Spectre v2 as well. And the mitigations are global anyhow.



Nope. You are thinking of Meltdown and Spectre variant 1.

Not sure, if your statement is true.
https://www dot reddit dot com/r/Amd/comments/7o2i91/technical_analysis_of_spectre_meltdown/

This attack requires poisoning the CPU's BTB. This is easy on at least Intel Haswell CPUs (and probably some other Intel CPUs), because BTB entries are aliased in a very predictable way. Some recent ARM Cortex-A series CPU cores are reportedly vulnerable too, for the same reason. It is much more difficult on all AMD CPUs, because BTB entries are not aliased - the attacker must know (and be able to execute arbitrary code at) the exact address of the targeted branch instruction.

?
 
Not sure, if your statement is true.
https://www dot reddit dot com/r/Amd/comments/7o2i91/technical_analysis_of_spectre_meltdown/



?

It's true. Diffilcult does not equal impossible. AMD has since released AGESA updates for Spectre variant 2 so they clearly think it still needs patching.
 
Back
Top