Meltdown and Spectre bugs: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
Line 1: Line 1:
{{Draft}}
<languages />


<translate>
Meltdown and Spectre are bugs related to speculative execution in a variety of CPU architectures developed during the past ten to fifteen years and which affect in particular processors from Intel and AMD, including those in use on Compute Canada clusters. A detailed discussion of the two bugs can be found on [https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-every-modern-processor-has-unfixable-security-flaws/ this page]. Compute Canada personnel are currently patching systems deemed sensitive to this vulnerability.  
Meltdown and Spectre are bugs related to speculative execution in a variety of CPU architectures developed during the past ten to fifteen years and which affect in particular processors from Intel and AMD, including those in use on Compute Canada clusters. A detailed discussion of the two bugs can be found on [https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-every-modern-processor-has-unfixable-security-flaws/ this page]. Compute Canada personnel are currently patching systems deemed sensitive to this vulnerability.  


Line 32: Line 33:
# [https://medium.com/implodinggradients/meltdown-c24a9d5e254e The Meltdown bug and the KPTI patch: How does it impact ML performance?]
# [https://medium.com/implodinggradients/meltdown-c24a9d5e254e The Meltdown bug and the KPTI patch: How does it impact ML performance?]
# [https://www.ellexus.com/wp-content/uploads/2018/01/180107-Meltdown-and-Spectre-white-paper.pdf Ellexus whitepaper explaining HPC performance issues]
# [https://www.ellexus.com/wp-content/uploads/2018/01/180107-Meltdown-and-Spectre-white-paper.pdf Ellexus whitepaper explaining HPC performance issues]
</translate>
Bureaucrats, cc_docs_admin, cc_staff
2,915

edits

Navigation menu