News Zen 5 CPU performance is unaffected by Inception mitigation

KraakBal

Reputable
May 23, 2020
69
42
4,560
Probably the case that it is worked around in microcode, so it does not matter if the user is turning it on or off, and probably still means zen5 would still have been faster if the problem didn't exist
 

rluker5

Distinguished
Jun 23, 2014
901
574
19,760
Unfortunately AMD does suffer performance loss with all sorts of other security mitigations, even basic ones like not being a hidden administrator, UAC control, windows defender, etc. HWUnboxed just had a video testing different Windows versions to find the good ones and they were turning off all sorts of stuff.
I also wonder how long before Zen 5 lands on the vulnerable to SQUIP list. I think it took Zen 4 the better part of a year before they admitted it.
 

Thunder64

Distinguished
Mar 8, 2016
199
282
18,960
Unfortunately AMD does suffer performance loss with all sorts of other security mitigations, even basic ones like not being a hidden administrator, UAC control, windows defender, etc. HWUnboxed just had a video testing different Windows versions to find the good ones and they were turning off all sorts of stuff.
I also wonder how long before Zen 5 lands on the vulnerable to SQUIP list. I think it took Zen 4 the better part of a year before they admitted it.

:rolleyes: Clearly you hate AMD.
 

Pierce2623

Prominent
Dec 3, 2023
483
366
560
Unfortunately AMD does suffer performance loss with all sorts of other security mitigations, even basic ones like not being a hidden administrator, UAC control, windows defender, etc. HWUnboxed just had a video testing different Windows versions to find the good ones and they were turning off all sorts of stuff.
I also wonder how long before Zen 5 lands on the vulnerable to SQUIP list. I think it took Zen 4 the better part of a year before they admitted it.
I love the smell of hate and jealousy in the morning. Did you read that Intel had to raise Arrow Lake prices 8% over Raptor Lake’s already exorbitant prices since they quit making their own chips?
 
  • Like
Reactions: Makaveli

rluker5

Distinguished
Jun 23, 2014
901
574
19,760
:rolleyes: Clearly you hate AMD.
The recent recommendations of turning off of security features to help AMD performance have been an awful lot since Zen 5 was released. More than I can remember seeing. I don't recommend turning off Windows Defender or UAC or just running your PC with maximum unchecked privileges btw. That is basic stuff. I'm old enough to remember the times before them when you hoped your antivirus would be good enough but it usually wasn't.

Choosing to not mitigate some extremely unlikely side channel attack on your personal system is a different matter, but there should still be explanation of what that mitigation is. And when it comes to SQUIP, if someone is concerned enough to want to mitigate that vulnerability with similar risks as spectre, they should know that ordinary folks have to turn off SMT. But like all side channel attacks, exploitation of nobodies is very unlikely. These other side channels have mitigations and have their performance impact tested, and SQUIP has one as well that nobody talks about or tests.

If Intel just ignored a legitimate vulnerability because the mitigation sucked, people should know about that as well.

It is good that Zen 5 doesn't take a performance hit mitigating inception. But being isolated from the rest just makes this article seem like a fluff piece trying to make Zen look totally secure when there are a bunch of shenanigans afoot.
 
Last edited:
Mar 10, 2020
417
378
5,070
The recent recommendations of turning off of security features to help AMD performance have been an awful lot since Zen 5 was released. More than I can remember seeing. I don't recommend turning off Windows Defender or UAC or just running your PC with maximum unchecked privileges btw. That is basic stuff. I'm old enough to remember the times before them when you hoped your antivirus would be good enough but it usually wasn't.

Choosing to not mitigate some extremely unlikely side channel attack on your personal system is a different matter, but there should still be explanation of what that mitigation is. And when it comes to SQUIP, if someone is concerned enough to want to mitigate that vulnerability with similar risks as spectre, they should know that ordinary folks have to turn off SMT. But like all side channel attacks, exploitation of nobodies is very unlikely. These other side channels have mitigations and have their performance impact tested, and SQUIP has one as well that nobody talks about or tests.

If Intel just ignored a legitimate vulnerability because the mitigation sucked, people should know about that as well.

It is good that Zen 5 doesn't take a performance hit mitigating inception. But being isolated from the rest just makes this article seem like a fluff piece trying to make Zen look totally secure when there are a bunch of shenanigans afoot.
Re paragraph one, No reviewer has recommended running without mitigations, what has been demonstrated is that windows has an inefficient and unpredictable branch prediction system, hopefully fixed for Win 11.
Re paragraph two, your own words “extremely unlikely”. Run a decent antivirus, dont click dodgy links, dont give some hacker remote control of your PC… use it like a normal person and you will likely be ok.
Re paragraph three, they ignored hardware faults and deflected for the past 18 months, arguably worse. They can’t really ignore software reports, Google will hammer them.
Re paragraph 4. No hardware is totally secure but the vulnerabilities are becoming more and more obscure. None of the recent disclosures have been “simple” to exploit, at least from the descriptions. All any chip maker can do is attempt to cover off the existing vulnerabilities at design stage, verify that they don’t expose worse and play catchup for the product’s life cycle.