剛剛回家,想說電腦怎麼有重開機過了,還以為是又當機?
結果是下午的時候有更新,也就是4月的累積更新
點進去看更新資訊,才發現其中一個條目
Provides support to control usage of Indirect Branch Prediction Barrier
(IBPB) within some AMD processors (CPUs) for mitigating CVE-2017-5715,
Spectre Variant 2 when switching from user context to kernel context (See AMD
Architecture Guidelines around Indirect Branch Control and AMD Security
Updates for more details).
Follow instructions outlined in KB4073119 for
Windows Client (IT Pro) guidance to enable usage of IBPB within some AMD
processors (CPUs) for mitigating Spectre Variant 2 when switching from user
context to kernel context.
重點已標成黃字
簡單來說就是這次更新已針對AMD CPU的Spectre Variant 2漏洞進行修補
同時AMD也釋出了相關白皮書,有興趣的可以點進去看看
但目前這樣的修補是否對效能造成影響還不得而知,需要做一些測試才知道
--
標題 [三國] 三國11,自創武將下野?!?!?! #1C_nVjV5 (Koei)
自創武將當君主
怎麼會玩著玩著,他就下野了
只是他流浪到那個城市,首都就換到那個城市了....
--
結果是下午的時候有更新,也就是4月的累積更新
點進去看更新資訊,才發現其中一個條目
Provides support to control usage of Indirect Branch Prediction Barrier
(IBPB) within some AMD processors (CPUs) for mitigating CVE-2017-5715,
Spectre Variant 2 when switching from user context to kernel context (See AMD
Architecture Guidelines around Indirect Branch Control and AMD Security
Updates for more details).
Follow instructions outlined in KB4073119 for
Windows Client (IT Pro) guidance to enable usage of IBPB within some AMD
processors (CPUs) for mitigating Spectre Variant 2 when switching from user
context to kernel context.
重點已標成黃字
簡單來說就是這次更新已針對AMD CPU的Spectre Variant 2漏洞進行修補
同時AMD也釋出了相關白皮書,有興趣的可以點進去看看
但目前這樣的修補是否對效能造成影響還不得而知,需要做一些測試才知道
--
標題 [三國] 三國11,自創武將下野?!?!?! #1C_nVjV5 (Koei)
自創武將當君主
怎麼會玩著玩著,他就下野了
只是他流浪到那個城市,首都就換到那個城市了....
推 grant790110:你是不是創了蔣介石 XDDDDD
--
All Comments