• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.
  • The forums have been upgraded with support for dark mode. By default it will follow the setting on your system/browser. You may override it by scrolling to the end of the page and clicking the gears icon.

Yet another Intel speculation vulnerability: Side Channel L1 Terminal Fault

Status
Not open for further replies.

HTC

Joined
Apr 1, 2008
Messages
4,698 (0.75/day)
Location
Portugal
System Name HTC's System
Processor Ryzen 5 5800X3D
Motherboard Asrock Taichi X370
Cooling NH-C14, with the AM4 mounting kit
Memory G.Skill Kit 16GB DDR4 F4 - 3200 C16D - 16 GTZB
Video Card(s) Sapphire Pulse 6600 8 GB
Storage 1 Samsung NVMe 960 EVO 250 GB + 1 3.5" Seagate IronWolf Pro 6TB 7200RPM 256MB SATA III
Display(s) LG 27UD58
Case Fractal Design Define R6 USB-C
Audio Device(s) Onboard
Power Supply Corsair TX 850M 80+ Gold
Mouse Razer Deathadder Elite
Software Ubuntu 20.04.6 LTS
Oh not again. :rolleyes:
 
Since AMD is also affected by some speculative execution security issues, i've no idea if this particular issue also affects them.

If anyone knows more about this, please leave your input and i'll update the OP accordingly.
 
Hasn't this been found in vt-x already?
 
No. This appears new. And yes, largely affects VM hosts.
Another good reason to turn it off in the BIOS unless needed.
 
Another good reason to turn it off in the BIOS unless needed.

I mean the fix has literally no performance impact to native code. You don't need to turn anything off.

You could read the linked article. It's all in there.
 
I mean the fix has literally no performance impact to native code. You don't need to turn anything off.

You could read the linked article. It's all in there.
I have read it, and also have no need for virtualisation, so can turn it off ;)
 
I have read it, and also have no need for virtualisation, so can turn it off

I mean, it appears the perfomance impacting code for even VMs is opt-in in the first place, so have at I guess? You literally can only do nothing for your use case messing in the bios.
 
So the latest Windows 10 Cumulative Update addresses this. Which I've installed and verified the mitigation for it is enabled. I don't want it enabled. So I need the PowerShell script used to disable it. Which I can't find anywhere. If anybody knows what it is, and/or where to find it, I'd be grateful if you could drop a link or do a copy-paste of it here for me.

Thanks!
 
So the latest Windows 10 Cumulative Update addresses this. Which I've installed and verified the mitigation for it is enabled. I don't want it enabled. So I need the PowerShell script used to disable it. Which I can't find anywhere. If anybody knows what it is, and/or where to find it, I'd be grateful if you could drop a link or do a copy-paste of it here for me.

Thanks!

There probably isn't a shutoff simply because there isn't a performance penalty for non guest OSes.

You guys seriously need to quit worrying. It isn't costing you an inkling of performance. Benches actaully went UP in one figure post mitigation.
 
And they'll never stop finding more ways to exploit it until it is fixed (speculation eliminated?) in silicon.
 
Last edited:
There probably isn't a shutoff simply because there isn't a performance penalty for non guest OSes.

You guys seriously need to quit worrying. It isn't costing you an inkling of performance. Benches actaully went UP in one figure post mitigation.

can confirm this. at least in my case. i get an extra 10 points with my system in cpuz.
 
What could a quad core Atom do running at 5GHz?
 
What could a quad core Atom do running at 5GHz?
If all the cores can run concurrently, just over 1200% increase in performance.
Unless using Infinity Fabric then scaling wont be linear ..... k, enough trying to keep a straight face :p
 
There's another topic for this issue on the news section: i suggest this topic to be locked and the discussion be moved there instead.
 
Status
Not open for further replies.
Back
Top