瀏覽單個文章
野口隆史
Elite Member
 
野口隆史的大頭照
 

加入日期: Mar 2001
您的住址: Rivia
文章: 7,036
引用:
作者deanhu
根據AMD自己發出來的消息,Linux Kernel 4.15的PTI patch已將AMD CPU排除在外。AMD這麼有把握?

你可以自己看整個merge的patches
https://github.com/torvalds/linux/c...40663af75f64R99

看起來其實這些寫patches的人根本無法說出AMD一定沒問題
只是單純相信AMD確認沒問題是真的沒問題

不過在PTI patches裡面也提到AMD有另外一個問題
在這裡順便修正
引用:
User space process size. This is the first address outside the user range.
There are a few constraints that determine this:
+ *
On Intel CPUs, if a SYSCALL instruction is at the highest canonical
address, then that syscall will enter the kernel with a
non-canonical return address, and SYSRET will explode dangerously.
We avoid this particular problem by preventing anything executable
from being mapped at the maximum canonical address.
+ *
On AMD CPUs in the Ryzen family, there's a nasty bug in which the
CPUs malfunction if they execute code from the highest canonical page.
They'll speculate right off the end of the canonical space, and
bad things happen. This is worked around in the same way as the
Intel problem.

看起來是引發問題的原因 I 跟 A 兩者本質上不同
只是導致的結果同樣可以來利用
__________________
Folding@home with GPGPU集中討論串

Unix Review: ArchLinuxSabayonOpenSolaris 2008.5Ubuntu 8.10
AVs Review: GDTCAntiVir SSESSKIS 09NIS 09Norton 360 V3

I Always Get What I Want.
舊 2018-01-04, 01:19 PM #29
回應時引用此文章
野口隆史離線中