Alex Ionescu - ismert security szakértő - miközben első AMD Ryzen rendszerét tesztelgette, észrevette, hogy az "AMD PCI driver" nem egészen PCI driver:
Playing around with my first AMD Ryzen system. Turns out the "AMD PCI Driver" isn't actually a PCI Driver... at all.
Here's a few fun facts:
1) It registers a process creation notify routine, and checks all process names against a list of 19 hashed names.
AMD and @XilinxInc announce an agreement for AMD to acquire Xilinx—expanding our rapidly growing data center business and creating the industry’s leading high performance computing company.
Linus tegnap kiadta az 5.7-es kernel hetedik prepatchét. Bejelentő levelében arról írt, hogy elsődleges gépében ~ 15 év után dobta az Intel CPU-t és AMD Threadripper 3970x processzorra váltott. A váltással az "allmodconfig" tesztfordításai háromszor gyorsabban futnak le, ami következő beolvasztási időablakban komoly előrelépést jelent majd számára.
In fact, the biggest excitement this week for me was just that I upgraded my main machine, and for the first time in about 15 years, my desktop isn't Intel-based. No, I didn't switch to ARM yet, but I'm now rocking an AMD Threadripper 3970x. My 'allmodconfig' test builds are now three times faster than they used to be, which doesn't matter so much right now during the calming down period, but I will most definitely notice the upgrade during the next merge window.
AMD’s future as the leader in high-performance technology is brighter than ever. Happy #AMD50 and thank you to our employees, industry partners, customers and fans for 50 years of innovation — here’s to many more! https://t.co/7C7Dnc7yJnpic.twitter.com/rTMVfTdMA5
Az AMD frissítette, a január 3-án kiadott, CPU bugokkal kapcsolatos állásfoglalását. A vállalat bővebben kifejtette az egyes hibavariánsokkal kapcsolatos érintettségét és "finomított" a közlemény nyelvezetén. Így lett például a korábban "Zero AMD vulnerability"-ből "We believe AMD processors are not susceptible"...
Resolved by software / OS updates to be made available by system vendors and manufacturers. Negligible performance impact expected.
Variant Two
Branch Target Injection
Differences in AMD architecture mean there is a near zero risk of exploitation of this variant. Vulnerability to Variant 2 has not been demonstrated on AMD processors to date.
Variant Three
Rogue Data Cache Load
Zero AMD vulnerability due to AMD architecture differences.