Desktop (all platforms), Chrome 63: Full Site Isolation can be turned on by enabling a flag found at chrome://flags/#enable-site-per-process. 0785Socket7742018/01/05(金) 02:27:08.84ID:5rFdT/xM 261 Socket774 2018/01/05(金) 01:46:32.78 ID:BpIL/4iQ やっとダウンロードとパッチ当て終わったので、うちのゲーム専用機でベンチ回した 7900X 定格 / DDR4-3200 8GB×4 / GTX 1080 Ti / SSD M8Pe 512GB
3DMark Time Spy 前 9989 Graphic score 9839 Graphic test 1 62.54 FPS Graphic test 2 57.70 FPS CPU score 10938 CPU test 36.75 FPS 後 10028 Graphic score 9891 Graphic test 1 63.28 FPS Graphic test 2 57.67 FPS CPU score 10885 CPU test 36.57 FPS
CINEBENCH R15 前 CPU 2214 cb 後 CPU 2201 cb 0786Socket7742018/01/05(金) 02:27:34.96ID:5rFdT/xM 812 7862018/01/05(金) 01:31:44.35 ID:6jaIgEvV >>.787 お待たせ。Optane 900Pのパッチ前後比較。32GiBで5回。 https://dotup.org/uploda/dotup.org1431454.png
Speculation control settings for CVE-2017-5715 [branch target injection] Hardware support for branch target injection mitigation is present: True Windows OS support for branch target injection mitigation is present: True Windows OS support for branch target injection mitigation is enabled: True
Speculation control settings for CVE-2017-5754 [rogue data cache load] Hardware requires kernel VA shadowing: True Windows OS support for kernel VA shadow is present: True Windows OS support for kernel VA shadow is enabled: True Windows OS support for PCID optimization is enabled: True
Speculation control settings for CVE-2017-5715 [branch target injection] Hardware support for branch target injection mitigation is present: False Windows OS support for branch target injection mitigation is present: True Windows OS support for branch target injection mitigation is enabled: False Windows OS support for branch target injection mitigation is disabled by system policy: False Windows OS support for branch target injection mitigation is disabled by absence of hardware support: True
Speculation control settings for CVE-2017-5754 [rogue data cache load] Hardware requires kernel VA shadowing: True Windows OS support for kernel VA shadow is present: True Windows OS support for kernel VA shadow is enabled: True Windows OS support for PCID optimization is enabled: True
gtx970のなんちゃって4Gの時とおんなじだねw 0818Socket7742018/01/05(金) 07:03:46.58ID:PLrLl7hF 俺のwin10はまだぱっちこないわけだが 0819Socket7742018/01/05(金) 07:10:57.31ID:XM9UWesL>>817 残念ながら性能低下僅かでRyzenに完勝したままで終わった 0820Socket7742018/01/05(金) 07:12:28.51ID:CSHJTCpg パッチ当てたらAisuite3が動かなくなったわ 性能低下はベンチちょろっと回したが若干だけど落ちてるね 0821Socket7742018/01/05(金) 07:16:00.72ID:cGiHVCAN Meltdownに関してはGoogle Project Zeroからリンクの貼られてる https://cyber.wtf/2017/07/28/negative-result-reading-kernel-memory-from-user-mode/ が分かりやすい。 CPUアーキテクチャについてほんの少し知識があればおおよそ理解できると思う その中の All said and done there are a few assumptions I made about Intels implementation of Tomasulo’s algorithm: 1) Speculative execution continues despite interrupt flag 2) I can win the race condition between speculative execution and retirement 3) I can load caches during speculative execution 4) Data is provided despite interrupt flag 要するにインテルの投機的実行の実装がクソでサイドチャネル攻撃に無防備だった 0822Socket7742018/01/05(金) 07:16:25.15ID:/zUguoyh>>819 https://newsroom.intel.com/news-releases/intel-issues-updates-protect-systems-security-exploits/