Subscribe to this thread
Home - General / All posts - Performance effects of Meltdown and Spectre mitigations
tjhb

7,603 post(s)
online
#12-Jan-18 00:57

Providers are falling over themselves to work around the speculative execution bugs announced a week or so ago.

Supposedly full patches are now available for some systems, including Windows patches for Meltdown and CPU microcode revisions to reduce vulnerability to Spectre. (How far back the microcode revisions will stretch seems an open question so far.)

Only one of my systems so far has the full set (an HP ZBook 15). Before I update it I thought I should run some Manifold 9 tests, to compare performance afterwards to see how deeply the Radian engine is affected.

So this is a bookmark for results, and also a suggestion in case anyone else wants to do the same.

We could test some transport-heavy queries (a simple UPDATE, say, and a SELECT INTO using GROUP and/or CASE) as well as some heavier geometry work that utilises multiple threads.

If I sort out some suitable test data and queries (that's the intention) then I'll post them here.

tjhb

7,603 post(s)
online
#13-Jan-18 13:50

Best explanation of Meltdown and Spectre I have read so far is by Peter Bright in Ars Technica.

adamw


7,444 post(s)
#14-Jan-18 09:39

A more technical explanation:

Reading privileged memory with a side-channel

adamw


7,444 post(s)
#14-Jan-18 09:36

These attacks are truly next-level. The implications from the fixes are pretty horrible and the performance is only part of the picture.

There is a bit of a bright spot in that the attacker has to research what it attacks extensively and he has to work with the constraints of the attacked code. This takes time and effort and the success is not guaranteed. Furthermore, patches and updates erase a significant part or even all of the work put into creating an attack. This should limit feasible targets of these attacks significantly (basically to the OSes - which are already being patched, and to the most popular versions of the most popular apps = browsers - which are starting to take measures against the attacks as well).

lionel
249 post(s)
#14-Jan-18 17:07

ALL pc layers are concern even the main problem is the CPU/architecture/manufacturer ( intel AMD ARM qualcomm...)

article for consumer : https://www.theguardian.com/technology/2018/jan/04/meltdown-spectre-worst-cpu-bugs-ever-found-affect-computers-intel-processors-security-flaw

history https://meltdownattack.com/

0) clound service

use patch from OS, cpu

amazon aws EC2

azure office 365 https://techcommunity.microsoft.com/t5/Office-365/Office-365-Meltdown-and-Spectre-CPU-bugs/td-p/141735

1)browser ( site isolation)

general https://react-etc.net/entry/exploiting-speculative-execution-meltdown-spectre-via-javascript

chromium base wait 23 january the new 63 version so for now use chrome://flags/#enable-site-per-process then enable restart

Mozilla

Microsot edge https://blogs.windows.com/msedgedev/2018/01/03/speculative-execution-mitigations-microsoft-edge-internet-explorer/

webkit ( safari) https://webkit.org/blog/8048/what-spectre-and-meltdown-mean-for-webkit/

2) OS

Microsoft OS use powwershell https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in

Apple https://support.apple.com/en-us/HT208394

Android

red hathttps://access.redhat.com/security/vulnerabilities/speculativeexecution

2) motherboard

msinfo32 ll give us the name of motherboard

gigabyte https://www.gigabyte.com/Press/News/1586

asus https://www.asus.com/News/V5urzYAT6myCC1o2

4) BIOS

--ami https://ami.com/en/tech-blog/navigating-the-meltdown-and-spectre-attacks/ Aptio_V_AMI_Firmware_Update_Utility.zip

--Phoenix Technologies https://www.phoenixtechnologyit.com/blog/what-you-need-to-know-about-meltdown-and-spectre/

--Dell https://www.dell.com/support/article/us/en/04/sln308587/microprocessor-side-channel-vulnerabilities-cve-2017-5715-cve-2017-5753-cve-2017-5754-impact-on-dell-products?lang=en

--Gateway--IBM https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/

5) CPU

intel https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html#2

AMD https://www.amd.com/en/corporate/speculative-execution

Regard's

NB color support in edit mode not in view mode

Attachments:
chrome_Speculative Execution_site_isolation.png
georeference_color.png
windows10_Speculative Execution_powershell.png

Manifold User Community Use Agreement Copyright (C) 2007-2017 Manifold Software Limited. All rights reserved.