We do often include affiliate links to earn us some pennies. See more here.

More processor news today, as AMD has released a fair bit of information from their plans including Zen 2 and Zen+. Firstly, they've announced a price-cut for existing Ryzen processors, although that does depend on what store you go with. I've checked a few UK stores today and their prices have not yet been adjusted.

AMD has confirmed that the Zen CPU core (known as Ryzen) is moving to 12nm with samples now shipping. They are planning to launch these Zen+ 12nm CPUs in April of this year and they confirmed they will be clocked higher and come with "Precision Boost 2". Since this is only a refresh, there shouldn't be massive differences other than AMD tweaking the design to get the most out of it. AMD confirmed Zen+ will continue to use the AM4 socket, but they will also launch the X470 chipset optimized for Zen+.

Moving onto Zen 2, this 7nm design is now "complete", although they aren't giving out a date for that yet. Most likely launching next year, it's quite surprising that they've finalised it so quickly, it seems AMD are firmly back on top-form with their processors now so it's going to be a fun two years for AMD fans.

A little further out, but Zen 3 using 7nm+ is currently planned to be release in 2020, although very little information is available on that.

They will be releasing the Ryzen 5 2400G (4 cores, 8 threads) and Ryzen 3 2200G (4 cores, 4 threads) APUs which will both come with Radeon RX Vega graphics. These should be launching February 12th this year along with mobile processors that will also come with Vega graphics.

Also, AMD will be releasing Radeon Vega Mobile GPU through this year, which will be primarily aimed at ultra-thin notebooks.

See more details here.

Fun fact: Some of the press slides I was sent, had a picture of the Ataribox in it.

Article taken from GamingOnLinux.com.
Tags: AMD, Hardware
6 Likes
About the author -
author picture
I am the owner of GamingOnLinux. After discovering Linux back in the days of Mandrake in 2003, I constantly checked on the progress of Linux until Ubuntu appeared on the scene and it helped me to really love it. You can reach me easily by emailing GamingOnLinux directly.
See more from me
The comments on this article are closed.
25 comments
Page: 1/3»
  Go to:

Eike Jan 8, 2018
View PC info
  • Supporter Plus
I wonder if immunity against Spectre and Meltdown can be built into chips and when the first CPUs having it will be announced.

Anyway, I might replace my i3570K with some Ryzen+ this year.
Brisse Jan 8, 2018
Quoting: EikeI wonder if immunity against Spectre and Meltdown can be built into chips and when the first CPUs having it will be announced.

Anyway, I might replace my i3570K with some Ryzen+ this year.

Ryzen is already said to be immune against Meltdown, and while it is hypothetically vulnerable to one of the two Spectre variants, it hasn't been demonstrated in practice.

And yes of course you could make a chip completely immune. Just get rid of speculative execution, as that's what these attacks exploit. That will come at a performance cost however.


Last edited by Brisse on 8 January 2018 at 12:06 pm UTC
Eike Jan 8, 2018
View PC info
  • Supporter Plus
Quoting: BrisseAnd yes of course you could make a chip completely immune. Just get rid of speculative execution, as that's what these attacks exploit. That will come at a performance cost however.

Of course, with 90's architecture, you can... ;)
minj Jan 8, 2018
7nm+ or 7nm-? :)

I can't seem to find many laptops shipping with Ryzen APUs. HP Envy was the first and now Acer Swift 3. Don't find these appetizing.
Samsai Jan 8, 2018
Quoting: BrisseAnd yes of course you could make a chip completely immune. Just get rid of speculative execution, as that's what these attacks exploit. That will come at a performance cost however.
I don't think the speculative execution has to be entirely removed to make CPUs immune. I am not an expert but from what I gathered the issue is that after code has been speculatively executed the result is stored in the cache even if the CPU guessed wrong and ran the wrong code, not to mention code that it didn't even have privileges to run. If these results were cleared from the cache when the CPU takes a wrong turn it would at least protect data that isn't supposed to be in the cache right now. And obviously the speculative execution must follow security protocol and not rush ahead and think of the privileges later (looking at you, Intel).

Overall I think this is a point where CPU engineers need to start thinking in terms of "smart" and not purely in the terms of "fast". And if it can't be made smart then make it simple so that you know what the CPU is doing and what it's capable of doing.
Liam Dawe Jan 8, 2018
Quoting: minj7nm+ or 7nm-? :)
7nm+, as stated. It's the accepted term to use.
Eike Jan 8, 2018
View PC info
  • Supporter Plus
Quoting: SamsaiI am not an expert but from what I gathered the issue is that after code has been speculatively executed the result is stored in the cache even if the CPU guessed wrong and ran the wrong code, not to mention code that it didn't even have privileges to run.

AFAICT, it's not stored in the cache, but by accessing some memory, this is loaded into the cache, and by checking afterwards how fast you can access the same meory (memory you're allowed to read), you can tunnel data through from the illegitimate code to legitimate code. (Nice technique that is...) Even if you would flush all cache touched by speculatively executed code, you probably could do it the other way around: Prefetch into cache, make speculative execution, and if the data vanishes from cache, you've got information from the dark side.


Last edited by Eike on 8 January 2018 at 12:11 pm UTC
Brisse Jan 8, 2018
@Samsai Yeah, I just wanted to say that there's a simple way to create immune CPU's. Obviously they will want to come up with a more clever solution in the end.
sr_ls_boy Jan 8, 2018
They should have waited a day. How fitting it would have been on
the day when these NDA's that Intel forced on everyone are to
expire, AMD announces a new CPU architecture that is immune.


Last edited by sr_ls_boy on 8 January 2018 at 12:24 pm UTC
Samsai Jan 8, 2018
Quoting: EikeAFAICT, it's not stored in the cache, but by accessing some memory, this is loaded into the cache, and by checking afterwards how fast you can access the same meory (memory you're allowed to read), you can tunnel data through from the illegitimate code to legitimate code. (Nice technique that is...) Even if you would flush all cache touched by speculatively executed code, you probably could do it the other way around: Prefetch into cache, make speculative execution, and if the data vanishes from cache, you've got information from the dark side.
Obviously cache was a mistake.
While you're here, please consider supporting GamingOnLinux on:

Reward Tiers: Patreon. Plain Donations: PayPal.

This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!

You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
The comments on this article are closed.