Message boards : Number crunching : performance loss through patches against Meltdown and Spectre
Author | Message |
---|---|
what I am very curious about is how much the CPU performance loss through the patches against Meltdown and Spectre, which for Windows will be published shortly, and for Linux allegedly have been distributed already, will affect GPUGRID crunching. | |
ID: 48650 | Rating: 0 | rate: / Reply Quote | |
So far, the tests I have seen show almost no performance loss in typical computer workloads. Some performance loss, about 3% in synthetic benchmarks for certain tests. Most of the performance loss will be in the datacenters. | |
ID: 48652 | Rating: 0 | rate: / Reply Quote | |
patches against Meltdown and SpectreFYI: there are at least one kind of Spectre attacks, which in theory (therefore in practice) can't be fixed by software patches, as these attacks exploit the effects on the cache of the "out of order execution" scheme of the CPU (which is hardwired to the chip). It means that these CPUs are basically doomed. There are mayor breakdowns ahead of us in every area of our lives. | |
ID: 48664 | Rating: 0 | rate: / Reply Quote | |
...It means that these CPUs are basically doomed. There are mayor breakdowns ahead of us in every area of our lives. nice to read :-) | |
ID: 48665 | Rating: 0 | rate: / Reply Quote | |
From the smiley I think that the severity of this bug is simply too unthinkable, but one app reading the other app's memory without any software or hardware could detect it is simply the end of any kind of cyber security. No passwords, financial records, PIN codes, nothing is safe from now on. That is basically the end of the world as we know it....It means that these CPUs are basically doomed. There are mayor breakdowns ahead of us in every area of our lives.nice to read :-) | |
ID: 48667 | Rating: 0 | rate: / Reply Quote | |
That is basically the end of the world as we know it. Does this mean that "out of order execution" can't be used at all, or just needs to be implemented differently? It sounds like a good opportunity for AMD and Intel to sell more chips. | |
ID: 48669 | Rating: 0 | rate: / Reply Quote | |
Does this mean that "out of order execution" can't be used at all, or just needs to be implemented differently?There are CPUs without "out of order execution" which are safe - those are the slowest, cheapest ones (some older Atom CPUs for example), so the first part is true. The present implementation of the "out of order execution" with a little addition (=new CPUs) would be safe from the present implementation of Spectre attacks, but the present architecture thought to be safe for more than 20 years. No one can tell how long it takes to "hack" the modified architecture as well. It sounds like a good opportunity for AMD and Intel to sell more chips.Provided that there will be anybody to buy it. | |
ID: 48670 | Rating: 0 | rate: / Reply Quote | |
Provided that there will be anybody to buy it. It is a strange way for civilization to end: The Out of Order Apocalypse. | |
ID: 48671 | Rating: 0 | rate: / Reply Quote | |
Reposting from SETI: Spectre vulnerability affects Nvidia cards It isn't just CPUs, apparently. | |
ID: 48673 | Rating: 0 | rate: / Reply Quote | |
I am just reading something rather worrrying in the LHC forums, with regards to the Meltdown/Spectre patches: | |
ID: 48679 | Rating: 0 | rate: / Reply Quote | |
It is a strange way for civilization to end: The Out of Order Apocalypse. Well, it is alarming indeed. On the other hand, we should not overrate Spectre. If one (malignant) application can access some memory content of another by reading the pre-fetch, it basically means that you must have that malware on your computer already. And if so, you could already do a lot of other bad (but already existing) things, which are cheaper to implement, installing keyloggers for example. So Spectre is not necessarily the end of days ... but it's the large attack surface which makes it grievous and will cause us some headache for the next couple of months. Well, I guess both NSA and KGB know a few gaps other than that, which are not known yet but also inherent to the architecture. And if a powerful organisation really wants to know your online banking password, they will contrive ways and means, be sure about that! All that protects us ordinary people is our unimportance and relatively low bank balance. It is a cold comfort, I know. ____________ I would love to see HCF1 protein folding and interaction simulations to help my little boy... someday. | |
ID: 48681 | Rating: 0 | rate: / Reply Quote | |
If one (malignant) application can access some memory content of another by reading the pre-fetch, it basically means that you must have that malware on your computer already. And if so, you could already do a lot of other bad (but already existing) things, which are cheaper to implement, installing keyloggers for example. Sure. The AV software should offer us ordinary users the usual degree of protection. Whether it is so easy to protect servers I don't know, but they will think of something. | |
ID: 48683 | Rating: 0 | rate: / Reply Quote | |
Some further information: | |
ID: 48684 | Rating: 0 | rate: / Reply Quote | |
The only problem I have had related to those possible threats is that the ubuntu "fix" for it in kernel 4.13.0.32 broke the nVidia CUDA OpenCL package. I had to revert back to my original 4.13.0.19.generic to get my CUDA cards crunching again. I found a complaint at the nVidia github where developers complained that too many changes went into the 32 kernel which caused their code to fail. | |
ID: 48805 | Rating: 0 | rate: / Reply Quote | |
Message boards : Number crunching : performance loss through patches against Meltdown and Spectre