Home > News content

Linux fix kernel: Intel patching performance crazy, AMD is not affected

via:快科技     time:2018/1/4 17:36:08     readed:728

AMD first wants everyone to understand two points:

1. The loophole has not entered any public domain, that is, it has not been damaged in the real world.

2, all the characterization and destructive power of vulnerabilities are based on the laboratory level. Currently, those who are able to do all these invasive operations are experienced programmers who are familiar with electronic engineering.

AMD again, three attacks on Google Project Zero team simulation form based on the AMD processor to form 3 to form 2 almost completely immune, as immune (theory of attack, has been successfully simulated) on the morphology by OS, 1 level update to fill, and will not cause the loss of energy.

At the same time, the father of Linux is also not affected by the AMD processor on the Gihub.

Because the Linux 4.15 (candidate version) kernel restores Meltdown vulnerability, forcing the patch of kernel Page Table Isolation (kernel page table isolation, KPTI or PTI) to x86 processor, resulting in a significant decrease in performance. Linus Torvalds has made a close correction to the PTI processor.

Linux kernel development Tom Lendacky also tells HOP that the AMD processor is harmed by Intel. Because of different architecture, AMD processor does not allow memory reference class operation, otherwise it will cause page errors, so it is completely immune to Meltdown vulnerabilities.

At present, the Linux kernel 4.14, 4.9, 4.4, 3.16, 3.18, 3.12 LTS all repair the Meltdown vulnerability.

China IT News APP

Download China IT News APP

Please rate this news

The average score will be displayed after you score.

Post comment

Do not see clearly? Click for a new code.

User comments