Tuesday, April 10th 2018

AMD Announces Steps, Resources for Spectre Mitigations

AMD today announced, via a security blog post penned by their own Mark Papermaster, that they're beginning deployment of mitigations and resources for AMD processors affected by the Spectre exploits. In the blog post, AMD reiterates how exploits based on version 1 of Spectre exploits (GPZ 1 - Google Project Zero Flaw 1) have already been covered by AMD's partners. At the same time, AMD reiterates how their processors are invulnerable to Meltdown exploits (GPZ3), and explains how mitigations for GPZ2 (Spectre) will occur.

These mitigations require a combination of processor microcode updates from OEM and motherboard partners, as well as running the current and fully up-to-date version of Windows. For Linux users, AMD-recommended mitigations for GPZ Variant 2 were made available to Linux partners and have been released to distribution earlier this year.
AMD further related how difficult they expect exploits of the GPZ Variant 2 to be on their CPUs, but say that they have nonetheless worked with customers and partners in order to provide full coverage from such scenarios, by a "combination of operating system patches and microcode updates for AMD processors to further mitigate the risk." A whitepaper detailing the AMD recommended mitigation for Windows is available, as well as links to ecosystem resources for the latest updates.

Operating System Updates for GPZ Variant 2/Spectre
Microsoft is releasing an operating system update containing Variant 2 (Spectre) mitigations for AMD users running Windows 10 (version 1709) today. Support for these mitigations for AMD processors in Windows Server 2016 is expected to be available following final validation and testing.

AMD Microcode Updates for GPZ Variant 2/Spectre
In addition, microcode updates with our recommended mitigations addressing Variant 2 (Spectre) have been released to our customers and ecosystem partners for AMD processors dating back to the first "Bulldozer" core products introduced in 2011. Users should eventually be able to install the microcode patches by downloading BIOS updates provided by PC and server manufacturers and motherboard providers.
Source: AMD Security Bulletin
Add your own comment

27 Comments on AMD Announces Steps, Resources for Spectre Mitigations

#26
sutyi
lexluthermiesterNot surprising. The biggest impact to performance is going to be ram/storage access. Did you benchmark your ram and drive access before and after the patch?
Only thing I can give you AIDA64 Cache & Memory before and after. Earlier one is on AGESA PR 1.0.0.0a, the current one is on AGESA PR 1.0.0.1a and somewhat looser timings. It seems pretty much the same to me although I probably can't fully replicate the conditions as I have no clue what was running in the back ground back then. CPU clock is the same.


Really old - AGESA SR 1.0.0.6:


Before patch - AGESA PR 1.0.0.0a:


After patch - AGESA PR 1.0.0.1a:
Posted on Reply
#27
lexluthermiester
sutyiOnly thing I can give you AIDA64 Cache & Memory before and after. Earlier one is on AGESA PR 1.0.0.0a, the current one is on AGESA PR 1.0.0.1a and somewhat looser timings. It seems pretty much the same to me although I probably can't fully replicate the conditions as I have no clue what was running in the back ground back then. CPU clock is the same.


Really old - AGESA SR 1.0.0.6:


Before patch - AGESA PR 1.0.0.0a:


After patch - AGESA PR 1.0.0.1a:
Looks like minimal effect to me.
Posted on Reply
Add your own comment
Nov 25th, 2024 16:57 EST change timezone

New Forum Posts

Popular Reviews

Controversial News Posts