• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

New "L1 Terminal Fault" Security Vulnerability Affects Intel Processors, Mitigation Out

Joined
Sep 15, 2007
Messages
3,944 (0.65/day)
Location
Police/Nanny State of America
Processor OCed 5800X3D
Motherboard Asucks C6H
Cooling Air
Memory 32GB
Video Card(s) OCed 6800XT
Storage NVMees
Display(s) 32" Dull curved 1440
Case Freebie glass idk
Audio Device(s) Sennheiser
Power Supply Don't even remember
Talk to datacenter admins.



You know, I'm pretty sure if that were true for a second you wouldn't be withholding the name...

Graybar. Sorry, meant big corporation that's in fortune 500. Me sleepy. Obviously, they're pretty far down.
 
Joined
Nov 4, 2005
Messages
11,689 (1.73/day)
System Name Compy 386
Processor 7800X3D
Motherboard Asus
Cooling Air for now.....
Memory 64 GB DDR5 6400Mhz
Video Card(s) 7900XTX 310 Merc
Storage Samsung 990 2TB, 2 SP 2TB SSDs and over 10TB spinning
Display(s) 56" Samsung 4K HDR
Audio Device(s) ATI HDMI
Mouse Logitech MX518
Keyboard Razer
Software A lot.
Benchmark Scores Its fast. Enough.
How is Intel faster at IPC?

No cache security, allowing for faster and more precise timing, at the expense of security. I would speculate but the time all the security is in place, or what could be in place to make it as secure as competing products IPC will be within 2-3% of each other.
 
Joined
Oct 17, 2013
Messages
121 (0.03/day)
Was there any verified info of a 15% loss in vm performance via intel patches? I saw 3% to 5% on average, but even so. IT professionals spec their vm's above what they can handle on purpose. This allows for expandability. The only companies that are going to notice performance drops on that scale are the top 10% in the industry or corporations pushing their servers beyond their means. What does the average company require for server rooms? Physical servers, virtual machines, domain controllers, DHCP, file server, sql server, windows server, office, email, core switch, etc. It doesn't take much involving server hardware needed to run the basics. Only people severely pushing their machines will ever notice the performance loss. The biggest latency that I've seen in vm's is mechanical hard drives I/O limits. I've never once been concerned with our cpu's performance range for our vm's at work, because we have more then enough to run what is needed. So when I hear people complaining. All I see is lack of planning.
 

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
How is Intel faster at IPC?

No cache security, allowing for faster and more precise timing, at the expense of security. I would speculate but the time all the security is in place, or what could be in place to make it as secure as competing products IPC will be within 2-3% of each other.

I see what you did there ...
 
Joined
Sep 15, 2007
Messages
3,944 (0.65/day)
Location
Police/Nanny State of America
Processor OCed 5800X3D
Motherboard Asucks C6H
Cooling Air
Memory 32GB
Video Card(s) OCed 6800XT
Storage NVMees
Display(s) 32" Dull curved 1440
Case Freebie glass idk
Audio Device(s) Sennheiser
Power Supply Don't even remember
Was there any verified info of a 15% loss in vm performance via intel patches? I saw 3% to 5% on average, but even so. IT professionals spec their vm's above what they can handle on purpose. This allows for expandability. The only companies that are going to notice performance drops on that scale are the top 10% in the industry or corporations pushing their servers beyond their means. What does the average company require for server rooms? Physical servers, virtual machines, domain controllers, DHCP, file server, sql server, windows server, office, email, core switch, etc. It doesn't take much involving server hardware needed to run the basics. Only people severely pushing their machines will ever notice the performance loss. The biggest latency that I've seen in vm's is mechanical hard drives I/O limits. I've never once been concerned with our cpu's performance range for our vm's at work, because we have more then enough to run what is needed. So when I hear people complaining. All I see is lack of planning.

I guess people like to get ripped off. Those cost a pretty penny and now they've been slaughtered in perf.
 

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
Was there any verified info of a 15% loss in vm performance via intel patches? I saw 3% to 5% on average, but even so. IT professionals spec their vm's above what they can handle on purpose. This allows for expandability. The only companies that are going to notice performance drops on that scale are the top 10% in the industry or corporations pushing their servers beyond their means. What does the average company require for server rooms? Physical servers, virtual machines, domain controllers, DHCP, file server, sql server, windows server, office, email, core switch, etc. It doesn't take much involving server hardware needed to run the basics. Only people severely pushing their machines will ever notice the performance loss. The biggest latency that I've seen in vm's is mechanical hard drives I/O limits. I've never once been concerned with our cpu's performance range for our vm's at work, because we have more then enough to run what is needed. So when I hear people complaining. All I see is lack of planning.

https://forums.anandtech.com/thread...oducts-into-2021.2548918/page-2#post-39465241
 
Joined
Oct 17, 2013
Messages
121 (0.03/day)

So you link me a forum about a guy talking about performance decreases way above 15% depending on the generation of the processor with 0% proof of what he said. No screenshots. Before and after patch updates. I want verified details, reviews, etc. Even the link he included didn't verify his findings. Also, those were once again based off of benchmarks not real world performance.

2018-08-15_1342.png
 

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
So you link me a forum about a guy talking about performance decreases way above 15% depending on the generation of the processor with 0% proof of what he said. No screenshots. Before and after patch updates. I want verified details, reviews, etc. Even the link he included didn't verify his findings. Also, those were once again based off of benchmarks not real world performance.

View attachment 105373

I don't rely on the neither Intel's nor AMD's claims of the performance impact as they are naturally biased for their own products.

The link i gave in the previous reply was of a user (moderator, even) @ Anandtech, but fair enough: here's a link for you:

https://www.pcworld.com/article/325...spectre-patches-drag-down-older-hardware.html --- notice the date: what do you think will happen with all the other mitigations since that date on top?
 
Joined
Oct 2, 2004
Messages
13,791 (1.93/day)
3% here, 5% there, 8% somewhere else and in the end you're not really using the CPU you bought it in the beginning based on certain performance metrics displayed by it at the time of purchase...
 

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
Last edited:
Joined
Oct 17, 2013
Messages
121 (0.03/day)
I don't rely on the neither Intel's nor AMD's claims of the performance impact as they are naturally biased for their own products.

The link i gave in the previous reply was of a user (moderator, even) @ Anandtech, but fair enough: here's a link for you:

https://www.pcworld.com/article/325...spectre-patches-drag-down-older-hardware.html --- notice the date: what do you think will happen with all the other mitigations since that date on top?


The article is interesting. I wish they would have used a better cpu for reference than a mobile intel 5200u. I'd prefer a higher end desktop or server as the test. It is specifying dragging down certain older gen chips in certain applications. Not all applications and that was still a benchmark environment. I'm more interested in the IT pros that actually got seriously effected or noticed the difference after the update. I wish I would have documented the performance differences before we upgraded our servers. I can only go off of memory and our overall usage. It honestly has changed very little for us. We required no modifications to our vm setups, but I always over spec mine by a good 25% above requirements.
 
  • Like
Reactions: HTC

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
The article is interesting. I wish they would have used a better cpu for reference than a mobile intel 5200u. I'd prefer a higher end desktop or server as the test. It is specifying dragging down certain older gen chips in certain applications. Not all applications and that was still a benchmark environment. I'm more interested in the IT pros that actually got seriously effected or noticed the difference after the update. I wish I would have documented the performance differences before we upgraded our servers. I can only go off of memory and our overall usage. It honestly has changed very little for us. We required no modifications to our vm setups, but I always over spec mine by a good 25% above requirements.

Totally agree, there: a more recent CPU would have been preferred.

I've seen somewhere that meltdown / spectre affect greatly both registry manipulations as well as storage access but unfortunately, i'm not finding where i read that :(
 
Joined
Feb 16, 2017
Messages
476 (0.18/day)
I'm not going to go burn down Intel's HQ and can recognize no chip is perfectly secure but they've earned the distrust over all this.
 
Last edited:
Joined
Apr 12, 2013
Messages
6,750 (1.67/day)
To be fair, AMD is also affected, mainly by spectre variant attacks. While most of these attacks don't hit the general user much, it leaves big companies subject to performance losses due to mitigations and those losses are adding up.

That said, BOTH companies need to address these issues, on a hardware level, as soon as possible.
SGX is Intel only, likewise meltdown kind of attacks that also rely on speculative execution.
3% here, 5% there, 8% somewhere else and in the end you're not really using the CPU you bought it in the beginning based on certain performance metrics displayed by it at the time of purchase...
Next they'll show how whatever Lake is remaining is x% better than SKL because the latter took a substantial hit after patching these vulnerabilities.

Lastly, can you trust Intel that they'll optimize these patches with OS vendors so that the performance impact is minimal on existing servers. I mean they are in the business of selling servers after all, the cynic in me says that they likely won't and would rather sell you a brand new chip.
 
Last edited:
Joined
Apr 30, 2011
Messages
2,652 (0.56/day)
Location
Greece
Processor AMD Ryzen 5 5600@80W
Motherboard MSI B550 Tomahawk
Cooling ZALMAN CNPS9X OPTIMA
Memory 2*8GB PATRIOT PVS416G400C9K@3733MT_C16
Video Card(s) Sapphire Radeon RX 6750 XT Pulse 12GB
Storage Sandisk SSD 128GB, Kingston A2000 NVMe 1TB, Samsung F1 1TB, WD Black 10TB
Display(s) AOC 27G2U/BK IPS 144Hz
Case SHARKOON M25-W 7.1 BLACK
Audio Device(s) Realtek 7.1 onboard
Power Supply Seasonic Core GC 500W
Mouse Sharkoon SHARK Force Black
Keyboard Trust GXT280
Software Win 7 Ultimate 64bit/Win 10 pro 64bit/Manjaro Linux
To be fair, AMD is also affected, mainly by spectre variant attacks. While most of these attacks don't hit the general user much, it leaves big companies subject to performance losses due to mitigations and those losses are adding up.

That said, BOTH companies need to address these issues, on a hardware level, as soon as possible.
AMD addressed their 1-2 vulnerabilities and it's done for months now, whereas Intel CPUs are found vulnerable in a new weakpoint of their arch almost monthly. And for servers and high end users, system latency is worsening with every new patch, returning them to 2-3 previous cpu gens, and making their hw losing value. And simple customers as all of us should care for pc security also and never excuse such bad cpus from a security side.
 

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
AMD addressed their 1-2 vulnerabilities and it's done for months now, whereas Intel CPUs are found vulnerable in a new weakpoint of their arch almost monthly. And for servers and high end users, system latency is worsening with every new patch, returning them to 2-3 previous cpu gens, and making their hw losing value. And simple customers as all of us should care for pc security also and never excuse such bad cpus from a security side.

While true, for the most part (i think it's more then just 1 or 2), the fact is AMD is still susceptible to spectre like variants and those are only being mitigated in software @ a performance cost: to get rid of them completely, a hardware fix is required, such as removing the speculative execution part in the chips altogether.

Furthermore, there's no guarantee that there won't be found any more spectre like variants to which AMD's chips end up being susceptible to, which means all the more reason to fix these @ a hardware level then @ software level.

Intel has it worse because it's affected by spectre and meltdown like attacks, which means they definitely need to fix this @ a hardware level.

EDIT (these were originally two different posts but auto-merge "begged to differ")

Well: it seems worse then 1st thought.

The head of the OpenBSD project, Theo de Raadt, has warned that more flaws related to speculative execution in Intel CPUs are likely to be found and that the two vulnerabilities found by Intel, as a result of examining the Foreshadow bug — found by two independent teams — are cause for much worry.

"On a side note, AMD CPUs are not vulnerable to this problem. Currently it is believed their address translation layer works according to spec," de Raadt said.

Full info here:

https://www.itwire.com/security/840...-more-intel-cpu-flaws-likely-to-be-found.html
 
Last edited:

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
Joined
Apr 30, 2011
Messages
2,652 (0.56/day)
Location
Greece
Processor AMD Ryzen 5 5600@80W
Motherboard MSI B550 Tomahawk
Cooling ZALMAN CNPS9X OPTIMA
Memory 2*8GB PATRIOT PVS416G400C9K@3733MT_C16
Video Card(s) Sapphire Radeon RX 6750 XT Pulse 12GB
Storage Sandisk SSD 128GB, Kingston A2000 NVMe 1TB, Samsung F1 1TB, WD Black 10TB
Display(s) AOC 27G2U/BK IPS 144Hz
Case SHARKOON M25-W 7.1 BLACK
Audio Device(s) Realtek 7.1 onboard
Power Supply Seasonic Core GC 500W
Mouse Sharkoon SHARK Force Black
Keyboard Trust GXT280
Software Win 7 Ultimate 64bit/Win 10 pro 64bit/Manjaro Linux

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
So, HT needs to be disabled for Intel CPUs to be safe. i7s delegating to i5s ading up to the previous performance losses and to anyone other in future. They already are below the i5s when they went on sale. I would hate to have one of those bought for so much money, honestly.

It seems, in a quest for superior performance, Intel chose to skip some security checks within the architecture.

This should really be thoroughly investigated and, if any neglect were to be found, Intel should really be punished for it.
 

cadaveca

My name is Dave
Joined
Apr 10, 2006
Messages
17,232 (2.61/day)
This should really be thoroughly investigated and, if any neglect were to be found, Intel should really be punished for it.
The thing is with that is that these problems aren't new. That's why they persist through many generations of hardware. Those with actual knowhow have been using these vulnerabilities for years to access your system. The way this all works is that it's really hard for engineers to predict how things like this will be manipulated, and that's why they already have a kind of predetermined way of disclosure and fixing such problems, and why they offer financial bounties for those who disclose in the right way. There are people who make a living doing only that.

Intel and AMD both say "We might have bugs. Help us find them, and we'll pay you", yet suddenly when a bug is found, these guys are culpable? That's quite an interesting thought. I guess you never read the paper that comes in your CPU boxes?
 

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
The thing is with that is that these problems aren't new. That's why they persist through many generations of hardware. Those with actual knowhow have been using these vulnerabilities for years to access your system. The way this all works is that it's really hard for engineers to predict how things like this will be manipulated, and that's why they already have a kind of predetermined way of disclosure and fixing such problems, and why they offer financial bounties for those who disclose in the right way. There are people who make a living doing only that.

Intel and AMD both say "We might have bugs. Help us find them, and we'll pay you", yet suddenly when a bug is found, these guys are culpable? That's quite an interesting thought. I guess you never read the paper that comes in your CPU boxes?

The difference is Intel seems to have known they were taking a shortcut to "more performance" but they did it anyway. If true, they should be held accountable.

We believe Intel CPUs do almost no security checks up-front, but defer checks until instruction retire. As a result we believe similar issues will be coming in the future.

The quote above is from here.

SMT is fundamentally broken because it shares resources between the two
cpu instances and those shared resources lack security differentiators.

Some of these side channel attacks aren't trivial, but we can expect
most of them to eventually work and leak kernel or cross-VM memory in
common usage circumstances, even such as javascript directly in a
browser.

There will be more hardware bugs and artifacts disclosed. Due to the
way SMT interacts with speculative execution on Intel cpus, I expect SMT
to exacerbate most of the future problems.

The quote above is from the link in post #42.
 

cadaveca

My name is Dave
Joined
Apr 10, 2006
Messages
17,232 (2.61/day)
The difference is Intel seems to have known they were taking a shortcut to "more performance" but they did it anyway. If true, they should be held accountable.
Most of these issues are not remote-active yet, so its not as bad as some might want to portray it.
 

HTC

Joined
Apr 1, 2008
Messages
4,604 (0.78/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 2600X
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Nitro+ Radeon RX 480 OC 4 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 19.04 LTS
Most of these issues are not remote-active yet, so its not as bad as some might want to portray it.

If it were a fellow forum member i might agree but this OpenBSD dude is not just some tech forum dude, and he's not the only one: perhaps the most vocal, though!

I'm sure this OpenBSD dude knows more about these security issues then all the "regular forum members" combined, which is why his views on this matter carry a heck of a lot more weight.
 

cadaveca

My name is Dave
Joined
Apr 10, 2006
Messages
17,232 (2.61/day)
If it were a fellow forum member i might agree but this OpenBSD dude is not just some tech forum dude, and he's not the only one: perhaps the most vocal, though!

I'm sure this OpenBSD dude knows more about these security issues then all the "regular forum members" combined, which is why his views on this matter carry a heck of a lot more weight.
Oh, I'm not saying that it isn't a problem, but the fact remains that this is a problem for VMs, not Windows clients, and most users here are not running VMs on their mainstream CPUs. People running VMs are a minority, meaning it's a minority of home-based users that are affected by this. For enterprise clients doing things like cloud-based stuff, this can have a big impact for sure, but again, disabling HT in some scenarios for VMs actually results in a performance boost. That might seem odd, removing threads gets better performance, but that's why I said it's not as bad as some are making it out to be. Over the years I have literally seen thousands on posts by users here on TPU claiming that disabling HT was their choice, for gaming performance, for lowering heat, etc... Those types of users have ZERO impact from such a problem. That's guys like @Solaris17 , who does use VMs, IIRC.

The idea that threads on separate cores share cache, and thereby that cache may be vulnerable, isn't a new idea, either. That in and of itself is how these are related to Spectre/Meltdown, but there's still far more to yet be disclosed.
 
  • Like
Reactions: HTC
Top