Originally posted by Stenka
View Post
Announcement
Collapse
No announcement yet.
MDS: The Newest Speculative Execution Side-Channel Vulnerability
Collapse
X
-
- Likes 1
Comment
-
-
Originally posted by gamerk2 View PostTo be fair, this sounds like a simple fix (clear the damn buffers!) that shouldn't cost much if anything in performance.
Oh no, they gave it a name, and custom logo, and dedicated website.
- Likes 1
Comment
-
Originally posted by flower View Postwell we have a new kernel now. does anybody know how to disable the mitigation?
So, mds=off
- Likes 1
Comment
-
Chrome OS 74 disables HyperThreading on Intel CPUs due to these vulnerabilities:
https://www.aboutchromebooks.com/new...ties-security/
It seems vindication for OpenBSD's decision last year to do away with this sort of thing.
https://www.phoronix.com/scan.php?pa...-Disabling-SMT
Edit:
Erm, so according to https://www.kernel.org/doc/html/late...-vuln/mds.html
Code:mds=full
Code:mds=full,nosmt
Then why call this "full" (instead of auto/recommended/basic/generic/balanced/etc.)? That is just disingenuous.Last edited by chithanh; 14 May 2019, 07:27 PM.
- Likes 3
Comment
Comment