Friday, August 11th 2023
"Downfall" Intel CPU Vulnerability Can Impact Performance By 50%
Intel has recently revealed a security vulnerability named Downfall (CVE-2022-40982) that impacts multiple generations of Intel processors. The vulnerability is linked to Intel's memory optimization feature, exploiting the Gather instruction, a function that accelerates data fetching from scattered memory locations. It inadvertently exposes internal hardware registers, allowing malicious software access to data held by other programs. The flaw affects Intel mainstream and server processors ranging from the Skylake to Rocket Lake microarchitecture. The entire list of affected CPUs is here. Intel has responded by releasing updated software-level microcode to fix the flaw. However, there's concern over the performance impact of the fix, potentially affecting AVX2 and AVX-512 workloads involving the Gather instruction by up to 50%.
Phoronix tested the Downfall mitigations and reported varying performance decreases on different processors. For instance, two Xeon Platinum 8380 processors were around 6% slower in certain tests, while the Core i7-1165G7 faced performance degradation ranging from 11% to 39% in specific benchmarks. While these reductions were less than Intel's forecasted 50% overhead, they remain significant, especially in High-Performance Computing (HPC) workloads. The ramifications of Downfall are not restricted to specialized tasks like AI or HPC but may extend to more common applications such as video encoding. Though the microcode update is not mandatory and Intel provides an opt-out mechanism, users are left with a challenging decision between security and performance. Executing a Downfall attack might seem complex, but the final choice between implementing the mitigation or retaining performance will likely vary depending on individual needs and risk assessments.
Source:
Phoronix
Phoronix tested the Downfall mitigations and reported varying performance decreases on different processors. For instance, two Xeon Platinum 8380 processors were around 6% slower in certain tests, while the Core i7-1165G7 faced performance degradation ranging from 11% to 39% in specific benchmarks. While these reductions were less than Intel's forecasted 50% overhead, they remain significant, especially in High-Performance Computing (HPC) workloads. The ramifications of Downfall are not restricted to specialized tasks like AI or HPC but may extend to more common applications such as video encoding. Though the microcode update is not mandatory and Intel provides an opt-out mechanism, users are left with a challenging decision between security and performance. Executing a Downfall attack might seem complex, but the final choice between implementing the mitigation or retaining performance will likely vary depending on individual needs and risk assessments.
162 Comments on "Downfall" Intel CPU Vulnerability Can Impact Performance By 50%
:toast:
Or will you be forced to download the microcode patch through a Windows update regardless? no way to avoid the performance loss? will it make stuff like world of warcraft run slower on say a 11th gen intel cpu? or will it only make like productivity loads run slower?
@AleksandarK do you know where do you download the microcode update and how do you opt out of it? asking my niece's gaming laptop i gave her which has kaby lake, all she does is play games, so no reason to hinder performance. I want to opt out
On linux AMD's 7000 series runs worse with the mitigations disabled, than enabled - sometimes it's far more complex than it first seems. Those are preliminary results for security critical setups that MUST have the fixes done immediately, with performance fixes coming back in later.
Windows mitigations usually take longer, but they've had more time to minimise performance losses too (learning from what's been found out in the linux world, usually)
Specs
I5 10400f
Rtx 3060
16gb 3000mhz ram
How did I miss this lol
Well remote access I've always disabled this nonsense along with hyperV in features if it weren't for microsoft reinstalling the remote access app I guess I'd be a lot safer :laugh:
But yeah I've used Inspectre since it came out even on win-7 and the bugger man hasn't shown up yet so I agree this is yet again another nothing burger for population unless they work for some large company worth hacking.
GRC | InSpectre
Good point though mbam says I'm crushing it so it must be true :laugh: