Originally posted by starshipeleven
View Post
Announcement
Collapse
No announcement yet.
L1d Flushing Patches Revived After It Was Rejected From Linux 5.8 As "Beyond Stupid"
Collapse
X
-
Originally posted by skeevy420 View PostBut it really isn't though. For people like us, worst case scenario is we update our kernel command lines to force disable any l1d flushing.
I've been bitten enough times by situations where you need to be a sysadmin with 10 years of experience to operate a fucking PC without it blowing up unexpectedly, and I am some form of IT guy with 20+ years of experience. I understand if someone isn't cheering for the introduction of more stuff you must know beforehand so you can work around it.
- Likes 2
Comment
-
Originally posted by starshipeleven View PostYeah, me, you and a few others, most others won't know and it will blow up in their face if stupid distros like Ubuntu enable this by default (I'm confident OpenSUSE won't).
I've been bitten enough times by situations where you need to be a sysadmin with 10 years of experience to operate a fucking PC without it blowing up unexpectedly, and I am some form of IT guy with 20+ years of experience. I understand if someone isn't cheering for the introduction of more stuff you must know beforehand so you can work around it.
- Likes 1
Comment
-
Originally posted by Isedonde View PostWell, quite a few phoronix users seem to be "beyond stupid", as the article clearly states in the second paragraph: "The overall concept of this new L1d flushing work remains the same is [sic] that it's entirely opt-in". Yet, someone was stupid enough to demand that this feature should be opt-in, not opt-out, and 6 people were stupid enough to like that comment.
- Likes 1
Comment
-
Originally posted by starshipeleven View Postkernel ignores mitigation code if the CPU isn't in the list of CPUs that need it. The kernel checks CPU ID.
None should worry about it, the kernel can read CPU ID on its own.
Comment
-
Originally posted by DanL View Post
Users? They should be the last ones worrying about this kind of technicality. Developers, kernel distributors, and server admins (in respective order of preference) should be worrying about this.
https://www.kernel.org/doc/html/late...ted-processors
Comment
-
Originally posted by Azrael5 View PostDo you think that they prefer a whole potential CPU or a CPU affected by many vulnerabilities which hurt the performance of their machine?
Comment
Comment