![]() This is also one of the main reasons M1 has such amazing single threaded performance since it isn’t limited by the decoder. The x86 ISA should die already. Micro-ops are fixed length and shouldn’t require much caching unlike Intel/AMD. The memory model of ARM makes these types of attacks more difficult. Since Apple's ARM SoC cores don't use SMT, it looks like they are safe from this. ![]() Someone with more knowledge of Arm CPU Architecture should chime in.Įdit: And apparently SMT (also known as hyper-threading) is involved. In general RISC CPUs have much simpler decoding so it is possible that micro-ops aren't cached at all or the cache structure is much simpler. The caching of micro-ops is the source of this vulnerability. The company informs that the exploits use "speculative execution." Project Zero researchers had previously noted that the technique is used by most modern CPUs to optimise performance.I know that Apple's Arm CPUs use micro-ops but I don't know anything about if or how they are cached. "We continue to develop and test further mitigations for these issues and will release them in upcoming updates of iOS, macOS, tvOS, and watchOS," the company says. Additionally, Apple says that iOS 11.2, macOS 10.13.2, and tvOS 11.2 updates have mitigations to protect against Meltdown.Īpple in its note also assures that its Apple Watch is not affected by Meltdown and that it plans to release mitigations in Safari to defend against Spectre. It added that for the exploits to actually do any damage, it requires a malicious app to be downloaded on you Mac or iOS device, and the company urges its users to download apps only through verified source like the App Store. In a note to its consumers, Apple confirmed that the exploits are present in its Mac and iOS devices, but there hasn't been any reports of it affecting customers as of now. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |