Intel Secretly Firefighting a Major CPU Bug Affecting Datacenters?
There are ominous signs that Intel may be secretly fixing a major security vulnerability affecting its processors, which threatens to severely damage its brand equity among datacenter and cloud-computing customers. The vulnerability lets users of a virtual machine (VM) access data of another VM on the same physical machine (a memory leak). Amazon, Google, and Microsoft are among the big three cloud providers affected by this vulnerability, and Intel is reportedly in embargoed communications with engineers from the three, to release a software patch that fixes the bug. Trouble is, the patch inflicts an unavoidable performance penalty ranging between 30-35%, impacting the economics of using Intel processors versus AMD ones. https://www.techpowerup.com/240174/intel-secretly-firefighting-a-major-cpu-bug-affecting-datacenters
https://spectreattack.com/spectre.pdf We have also verified the attack’s applicability to AMD Ryzen CPUs. Finally, we have also successfully mounted Spectre attacks on several Samsung and Qualcomm processors (which use an ARM architecture) found in popular mobile phones. 0642名無しさん@1周年2018/01/04(木) 11:02:14.22ID:bXxPqbMc0 「インテル入ってる」の俺死亡 車なら完全にリコール扱いやろ 無償修理早よ 0643名無しさん@1周年2018/01/04(木) 11:03:01.04ID:RIdrMCub0 関係ないベンチマーク貼りまくってる奴はなんなのか? 0644名無しさん@1周年2018/01/04(木) 11:03:03.61ID:SVERdna20>>641 AMDもダメならPS4やXBox Oneもダメなのか 0645名無しさん@1周年2018/01/04(木) 11:03:11.09ID:fRUBr/L20>>635 2枚目、high sierra同士で比較して落ちてるぞ 0646名無しさん@1周年2018/01/04(木) 11:03:22.27ID:KMs+nf+w0>>641 蓋を開けたら共通技術の部分がアウトで軒並み全滅まであると俺は思ってるけどね この分野なんて根幹部分はパクリパクラレだろうからな 0647名無しさん@1周年2018/01/04(木) 11:03:22.87ID:GBge0g1j0>>613 システムコールがくっと落ちてて草 0648名無しさん@1周年2018/01/04(木) 11:03:28.87ID:sQRjoG1W0>>578 なるなる 0649名無しさん@1周年2018/01/04(木) 11:03:29.87ID:YvADolSp0>>636 Intel工作員必死だなw >>606見ろよwwww 0650名無しさん@1周年2018/01/04(木) 11:03:47.08ID:8BQVjaeT0 intelがこの報道は間違いだと発表してますよ 0651名無しさん@1周年2018/01/04(木) 11:03:57.98ID:nW44IDfY0 Haswell世代だけど新春特売でPC買ったばかりだっつの 0652発毛たけし ◆ayiO.z1dnU 2018/01/04(木) 11:03:58.30ID:CGCC4EJ70>>631
Similar translation tables exist on modern ARM (Cortex-A) processors too, with small differences in size and property bits. One significant difference to x86-64 is that ARM CPUs have two registers to store physical addresses of translation tables (TTBR0 and TTBR1). Typically, one is used to map the user address space (lower half) whereas the other is used to map the kernel address space (upper half). Gruss et al. [6] speculated that this might be one of the reasons why the attack does not work on ARM processors. As x86-64 has only ← ★ one translation-table register (CR3), it is used for both user and kernel address space. Consequently, to perform privilege checks upon a memory access, the actual page translation tables have to be checked.