It is no secret any more that all modern CPUs released are affected to some extent by a serious issue because of their fundamental design of doing aggressive speculative execution. Specially malformed code can be used to steal the private data of other processes, including sensitive data like passwords, security keys and so on. In this article, we will see how to disable the Meltdown Fix on AMD CPUs After Installing KB4056892.
If you are not aware about the Meltdown and Spectre vulnerabilities, we have covered them in these two articles:
- Microsoft is rolling out emergency fix for Meltdown and Spectre CPU flaws
- Here are Windows 7 and 8.1 fixes for Meltdown and Spectre CPU flaws
In short, both Meltdown and Spectre vulnerabilities allow a process to read the private data of any other process, even from outside a virtual machine. This is possible due to the implementation of how their CPUs prefetch data. Meltdown affects Intel CPUs whereas Spectre affects all CPUs. This is not some vulnerability that can only be fixed by patching the OS. The fix involves updating the OS kernel, as well as a CPU microcode update which would be done by a UEFI/BIOS/firmware update for most devices, to fully mitigate the exploits.
Recent research indicates that some ARM CPUs are affected as well by these vulnerabilities, related to speculative execution.
Microsoft has already released a set of fixes for all supported operating systems. Mozilla has issued an updated version of Firefox 57, and Google will protect Chrome users with version 64.
For the current version of Google Chrome, you can enable extra protection by enabling Full Site Isolation.
The Meltdown vulnerability and AMD CPUs
AMD CPUs are not affected by the Meltdown vulnerability. However, depending on the usage scenario, the fixes released to the operating system can cause notable performance slow down. Also, there are reports coming from AMD CPU users that the Windows patch, KB4056892 is causing serious issues for them.
While one can quickly uninstall the appropriate update package, which is KB4056892, there is also a Registry tweak you can apply to disable the Meltdown fix.
This could improve your computer's performance.
Disable the Meltdown fix on AMD CPUs
- Open the Registry Editor app.
- Go to the following Registry key.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management
See how to go to a Registry key with one click.
- On the right, create a new 32-Bit DWORD value FeatureSettingsOverride.
Note: Even if you are running 64-bit Windows you must still create a 32-bit DWORD value.
Set its value data to 3 in decimals.
- Now create a new 32-Bit DWORD value FeatureSettingsOverrideMask and set it to 3, too.
- Restart Windows 10.
Now, you can use the PowerShell script to see the protection state as described in the article:
In the output, see the following lines:
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: False
The line "VA shadow is enabled" should be False.
Winaero greatly relies on your support. You can help the site keep bringing you interesting and useful content and software by using these options: