Announcement

Collapse
No announcement yet.

A Batch Of x86 Speculation Fixes Headed To The Linux 4.19 Kernel

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • A Batch Of x86 Speculation Fixes Headed To The Linux 4.19 Kernel

    Phoronix: A Batch Of x86 Speculation Fixes Headed To The Linux 4.19 Kernel

    Thomas Gleixner has submitted a batch of x86 fixes today to the Linux 4.19 kernel, which include several changes around the speculative execution vulnerability mitigations...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    Typo:

    Originally posted by phoronix View Post
    around the Kernel Address Sanitizier (KASAN), preventing kernel

    Comment


    • #3
      Originally posted by tildearrow View Post
      Typo:
      A Sanitizier is the new title for sanitation engineer overseers.

      Comment


      • #4
        Gosh there sure are a lot these.

        Comment


        • #5
          Hi,
          I've got couple of questions.
          1.Are there any known attacks based on this ?
          2. Say for example if you've verified that Speculative Store Bypass is loading at boot time(dmesg) and operative in desktop(cat command) and apport kicks out reporting a vulnerable thread. Does anyone know how quickly the information gets passed to the proper channels?
          Those who would give up Essential Liberty to purchase a little Temporary Safety,deserve neither Liberty nor Safety.
          Ben Franklin 1755

          Comment

          Working...
          X