LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Hardware
User Name
Password
Linux - Hardware This forum is for Hardware issues.
Having trouble installing a piece of hardware? Want to know if that peripheral is compatible with Linux?

Notices


Reply
  Search this Thread
Old 01-05-2018, 06:53 AM   #1
Sol33t303
Member
 
Registered: Jul 2017
Posts: 94

Rep: Reputation: Disabled
I just heard about Intels "Meltdown", how badly will this affect Linux CPU usage?


I have heard that it will increase usage by up to 30%, but I haven't heard anything about Linux in particular and I assume they were talking about Windows. Will this have less or more of an affect for CPUs running Linux?
 
Old 01-05-2018, 08:04 AM   #2
hydrurga
LQ Guru
 
Registered: Nov 2008
Location: Pictland
Distribution: Linux Mint 19.1 MATE
Posts: 8,016
Blog Entries: 5

Rep: Reputation: 2861Reputation: 2861Reputation: 2861Reputation: 2861Reputation: 2861Reputation: 2861Reputation: 2861Reputation: 2861Reputation: 2861Reputation: 2861Reputation: 2861
This article may be of interest.

http://www.zdnet.com/article/how-lin...n-and-spectre/

In particular, this link within that article ("Initial Benchmarks Of The Performance Impact Resulting From Linux's x86 Security Changes"):

https://www.phoronix.com/scan.php?pa...5-x86pti&num=1
 
1 members found this post helpful.
Old 01-05-2018, 11:37 AM   #3
Soadyheid
Senior Member
 
Registered: Aug 2010
Location: Near Edinburgh, Scotland
Distribution: Cinnamon Mint 17.3 (Netbook) and 18.3 (Desktop)
Posts: 1,422

Rep: Reputation: 338Reputation: 338Reputation: 338Reputation: 338
Have these vulnerabilities not existed in various CPUs since 1995 without anybody exploiting them? (Nothing that has come to light that is.) Now that they've been flagged up and made public, the bad boys are aware and can now see what havoc they can cause! Aaarrgggh! DON'T PANIC!!! Scary that x86 Intel, AMD, Power8 and 9, System Z and ARM architectures are all vulnerable to some extent, what's the single point of failure that's common to them all? Surely they were designed independently, but to all make the same cock up...

Play Bonny!

 
Old 01-05-2018, 02:36 PM   #4
_roman_
Member
 
Registered: Dec 2017
Location: _Austro_Bavaria_
Distribution: gentoo / linux mint
Posts: 433

Rep: Reputation: 29
The issue is riding a dead horse.

Everything has to be down compatible to Spyware 3.1 aka the x86 architecture

Intel should have focused on itanium and trashed the x86 route

I also blame SpywareXP beeing such long available with security patchsets. So guys kept using their pentium II / III / IV and such.

--

It is more likely with those virtualisation stuff mostly used on linux these days, there was something discovered. And intel delayed it for quite a while until it was now made public to the masses

some companies do not put out any fixes until you make public certain "flaws". Spysoft is the best example for it

--

worst impact i have read so far speaks up to 60 percent penalty. the 5 percent penalty is more a marketing speech to keep the public masses low on anger. It depends on the software design. But you can expect much worse software efficiency now to work around those issues.

Last edited by _roman_; 01-05-2018 at 02:37 PM.
 
Old 01-05-2018, 03:42 PM   #5
jeremy
root
 
Registered: Jun 2000
Distribution: Debian, Red Hat, Slackware, Fedora, Ubuntu
Posts: 13,020

Rep: Reputation: 3749Reputation: 3749Reputation: 3749Reputation: 3749Reputation: 3749Reputation: 3749Reputation: 3749Reputation: 3749Reputation: 3749Reputation: 3749Reputation: 3749
_roman_, I explicitly asked you to refrain from this earlier today.

--jeremy
 
Old 01-05-2018, 04:06 PM   #6
cynwulf
Senior Member
 
Registered: Apr 2005
Location: /dev/planet2
Distribution: OpenBSD
Posts: 2,333
Blog Entries: 6

Rep: Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634
Quote:
Originally Posted by Soadyheid View Post
Scary that x86 Intel, AMD, Power8 and 9, System Z and ARM architectures are all vulnerable to some extent, what's the single point of failure that's common to them all? Surely they were designed independently, but to all make the same cock up...
"speculative execution"

Though I don't know if Power is vulnerable to the intel specific CVE (seems doubtful?) or just the two Intel/AMD/ARM specific ones, which has the potential to affect many CPUs from many different vendors: https://www.ibm.com/blogs/psirt/pote...-power-family/

https://spectreattack.com/spectre.pdf
 
1 members found this post helpful.
Old 01-06-2018, 05:14 AM   #7
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 12,471
Blog Entries: 9

Rep: Reputation: 3377Reputation: 3377Reputation: 3377Reputation: 3377Reputation: 3377Reputation: 3377Reputation: 3377Reputation: 3377Reputation: 3377Reputation: 3377Reputation: 3377
i have the patched kernel since lat upgrade, have not noticed any performance degradation.
i was told that 30% is exaggerated, and mostly applies to virtualization. have not yet tried that with the patched kernel.

PS:
http://news.softpedia.com/news/linux...w-519215.shtml
 
Old 01-06-2018, 06:25 AM   #8
beachboy2
Senior Member
 
Registered: Jan 2007
Location: Wild West Wales, UK
Distribution: Linux Mint 18.3 MATE, MX-18.3
Posts: 2,462
Blog Entries: 10

Rep: Reputation: 888Reputation: 888Reputation: 888Reputation: 888Reputation: 888Reputation: 888Reputation: 888
As the late Michael Winner remarked in his Esure advert, “Calm down dear”:

https://www.youtube.com/watch?v=efl5pFTFnBU

In the same vein, Jon Masters of Red Hat adds a dose of realism to some of the recent media reports on Meltdown and Spectre flaws which predict the end of the world is arriving soon:

http://www.datacenterknowledge.com/m...e-cpu-meltdown

Ubuntu security updates will be released very soon:
https://wiki.ubuntu.com/SecurityTeam...treAndMeltdown

Last edited by beachboy2; 01-06-2018 at 06:37 AM.
 
Old 01-06-2018, 06:41 AM   #9
Shadow_7
Senior Member
 
Registered: Feb 2003
Distribution: debian
Posts: 3,928
Blog Entries: 1

Rep: Reputation: 832Reputation: 832Reputation: 832Reputation: 832Reputation: 832Reputation: 832Reputation: 832
It doesn't affect amd as it doesn't do the speculative execution. Up to 30% slower which I would assume would be something like databases and ZFS which does a lot of stuff in RAM. So it's a big deal to big business, especially with the intel tax of sorts. Paying more to be the underdog, relatively overnight. I liked lunduke's comment on his podcast. 30% slower with an update, it's almost like you're running windows.
 
Old 01-06-2018, 07:19 AM   #10
cynwulf
Senior Member
 
Registered: Apr 2005
Location: /dev/planet2
Distribution: OpenBSD
Posts: 2,333
Blog Entries: 6

Rep: Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634Reputation: 1634
Quote:
Originally Posted by Shadow_7 View Post
It doesn't affect amd as it doesn't do the speculative execution.
Incorrect. I suggest reading the google papers on this issue. (Links are all over this site.)
 
Old 01-06-2018, 09:01 AM   #11
Soadyheid
Senior Member
 
Registered: Aug 2010
Location: Near Edinburgh, Scotland
Distribution: Cinnamon Mint 17.3 (Netbook) and 18.3 (Desktop)
Posts: 1,422

Rep: Reputation: 338Reputation: 338Reputation: 338Reputation: 338
Quote:
"speculative execution"

Though I don't know if Power is vulnerable to the intel specific CVE (seems doubtful?) or just the two Intel/AMD/ARM specific ones, which has the potential to affect many CPUs from many different vendors: https://www.ibm.com/blogs/psirt/pote...-power-family/

https://spectreattack.com/spectre.pdf
Thanks for the clarification cynwulf.
Play Bonny!

 
Old 01-06-2018, 09:22 AM   #12
hazel
Senior Member
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 3,384
Blog Entries: 9

Rep: Reputation: 1893Reputation: 1893Reputation: 1893Reputation: 1893Reputation: 1893Reputation: 1893Reputation: 1893Reputation: 1893Reputation: 1893Reputation: 1893Reputation: 1893
Apparently database packages are very much slowed down because they make a lot of kernel calls. I've seen postgreSQL mentioned a few times. Most other programs seem to be OK.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] [Fedora 16] "ls --color=yes" freezes and drives up CPU usage Raveolution Linux - Software 9 04-08-2012 10:08 PM
How might I restore kmail folders/mail/settings from a "badly" saved "home"? deh6 Linux - Software 5 03-08-2008 09:25 PM
"us" CPU usage in "TOP" bastupungen Linux - Server 6 11-04-2006 07:02 AM
high cpu usage on process "event/0" rioch Linux - Laptop and Netbook 6 05-03-2006 03:03 PM
"top" cpu usage edgjerp Mandriva 2 11-12-2005 05:21 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Hardware

All times are GMT -5. The time now is 03:37 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration