TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Initial Performance Benchmarks of Linux's x86 Security Changes

163 pointsby chowyuncatover 7 years ago

7 comments

lathiatover 7 years ago
Really glad to see some more useful benchmarks here from Phoronix!<p>Anyone who has done a lot of storage, or NFS, etc.. knows that the du usecase is pathological and likely the worst case.<p>Staying tuned for additional updates, for example he could use the boot flags to disable&#x2F;enable the support for this in order to eliminate other changes within the kernel.
adrianNover 7 years ago
Is it possible to sue Intel if you need ~30% more web servers because Intel built faulty processors? The argument would be that you had bought AMD if you had known about the flaw.
评论 #16061119 未加载
评论 #16058732 未加载
cypherpunks01over 7 years ago
Historical context:<p>&quot;The mysterious case of the Linux Page Table Isolation patches&quot;<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16046636" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=16046636</a>
derekp7over 7 years ago
With what is known about this bug so far, wouldn&#x27;t it be possible to mitigate it by locking the kernel to one CPU core, and run user processes on the other cores?<p>Also, if this bug lets the kernel leak data to user processes, would it also not be the case that different processes would leak data to each other? If that is true, then it seems that just isolating the kernel wouldn&#x27;t be enough.
评论 #16059762 未加载
评论 #16057756 未加载
评论 #16057658 未加载
评论 #16057685 未加载
评论 #16059228 未加载
评论 #16057631 未加载
bredrenover 7 years ago
It is interesting to see how posts and comments are written in a way that so far hides or downplays the severity and owner of this flaw.
评论 #16058691 未加载
keldarisover 7 years ago
So, as I understand it, the only way to avoid the rather huge performance hit is to use the pti=off switch, in effect opting out of KASLR on any Intel CPU newer than Pentium. Is this correct?
Sephrover 7 years ago
These cache vulnerabilities can probably be mitigated with lower performance penalties on CPUs with Intel CAT. It&#x27;s only available on Intel&#x27;s Xeon SKUs though.