Greg Kroah-Hartman, the stable Linux kernel maintainer, could have prefaced his Open Source Summit Europe keynote speech, MDS, Fallout, Zombieland, and Linux, by paraphrasing Winston Churchill: I have nothing to offer but blood sweat and tears for dealing with Intel CPU's security problems.
Or as a Chinese developer told him recently about these problems: "This is a sad talk." The sadness is that the same Intel CPU speculative execution problems, which led to Meltdown and Spectre security issues, are alive and well and causing more trouble.
The problem with how Intel designed speculative execution is that, while anticipating the next action for the CPU to take does indeed speed things up, it also exposes data along the way. That's bad enough on your own server, but when it breaks down the barriers between virtual machines (VM)s in cloud computing environments, it's a security nightmare.
(Score: 5, Funny) by DannyB on Wednesday October 30 2019, @04:02PM (1 child)
Mr. Dahmer gives this ride service five thumbs up!
The lower I set my standards the more accomplishments I have.
(Score: 0) by Anonymous Coward on Wednesday October 30 2019, @07:41PM
"you don't mind if Mr. Dahmer joins us for the ride, do you?"
Hopefully there aren't many around, but you might not care if you are of like mind.
Don''t share with your enemies, but if another thread is already sharing the same address space, then sharing the CPU pair might be just fine.
A multicore app should be able to take advantage of these cores.