While you're here, please consider supporting GamingOnLinux on:
Reward Tiers: Patreon. Plain Donations: PayPal.
This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!
You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
Reward Tiers: Patreon. Plain Donations: PayPal.
This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!
You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
Login / Register
- GE-Proton 9-3 and 9-4 released with a new option to help with modded games
- MineClone2, inspired by Minecraft, gets renamed to VoxeLibre
- Bazzite v2.5 has fixes for Lenovo Legion Go and ASUS ROG Ally, plus smoother installs
- Half-Life remake Black Mesa has a big upgrade with DXVK 2.3.1, optimizations and bug fixes
- OpenTTD 14.0 brings a scalable font, a new ship pathfinder, social platform integration
- > See more over 30 days here
-
Former Nouveau driver lead joins NVIDIA and sent a mass…
- slaapliedje -
Team Fortress 2 64bit support released, plus Vulkan for…
- chickenb00 -
Phantom Fury gets Steam Deck Verified ahead of release
- Phlebiac -
Stardew Valley 1.6.4 brings even more new free content
- Philadelphus -
Stardew Valley 1.6.4 brings even more new free content
- Purple Library Guy - > See more comments
Latest Forum Posts
- Weekend Players' Club 4/19/2024
- Pengling - The Evercade Outpost!
- Pengling - What sorta display and audio setup do you folks got?
- Shmerl - Weekend Players' Club 4/12/2024
- Pengling - Deus Ex GOTY Weird Resolution Issue on Steam But Not GOG…
- Vortex_Acherontic - See more posts
View PC info
Some more info here:
https://threatpost.com/intel-in-security-hot-seat-over-serious-cpu-design-flaw/129289/
Microsoft, Apple and Linux kernel developers are already working on Operating System patching to minimise the problem from the software side. But until this is done, an exploit could take advantage of all those systems.
Also noting that the OS software fix is going to slow down systems running Intel chips, estimated to be 7% to 23% slower as a result. (Won't be a problem for AMD.) Imagine your First Person Shooter game loses 10 frames per second.
Lots of news, all over the internet about this, right now.
I would be carefully with the "won't be a problem for AMD" statement. In the first iteration of the patch all are affected. In the second iteration some changes will exclude some AMD cpus.
However the original security issue describes also attacks for AMD and ARM devices including nearly all Android phones. (iPhone/iPad?). Therefore i personally would deny your statment.
Overall the performance influcence is imho not worth to discuss about. For games usually in the arrea of messurement toloerances/faiulures.
What I'm wondering about is, that there is a security hole in nearly every CPU of the last decade that requires imedidate updates on all critical system (include nucelar power plants, trains, banking servers, stock exchanges, hospitals etc..) and instead of discussing how to efficiently patch critical infrastucture and how to get out patching hell people in forums discuss about minor performance impacts on realistic workloads instead of the risks not patching the systems.
This incident has the potential to turn down any cloud/containerized/virtualisation based business.
Instead of moarning we should be very thankfull towards the people spending the year-end-days to provide the patch.
BR
Mad
View PC info
pti=off
with your boot options I doubt that i would be any less secure than running windows :PFor my servers tho.. I foresee meetings of the "pin the bill" variety in my near future :(
It's kind of amusing that they "just happen" to be able to use a 6 month old patch (KAISER) to fix the issue, when did google claim they discovered the problem again? ;)
View PC info
As for AMD... It seems that there are two or more different attacks... For the "Meltdown" attack, it appears as if AMD is not vulnerable to this method. However, AMD *may* be vulnerable to "Spectre."
From Meltdown and Spectre website:
View PC info
nopti
should work also
6 month old KAISER work, wasn't this done because of intel management engine security issues? the one that intel still havent patched yet afaik?
also i saw somewhere that this issue was reported in june or july this year already, but it was embargoed by intel to not cause any media fuss about it i guess.
anyway seems AMD, Intel and most of the ARM is affected with the smaller problem called "Spectre", which is super hard to patch out, but its also super hard to use it for hacks, because you need to guess the cpu first and flush some commands into it to get some info out of it and on top of that you need to get your code into the machine first. But the "Meltdown" is only Intel issue and this can be patched with the Page table isolation. That issue is also more insecure afaik, so the patches are rolling in for that.. Some ARM supposedly has this issue also, its the Branch predictor design those CPUs use.
Anyway it seems media made bigger fuss about it than the issue actually is. More testing needs to be done though, specially those older CPUs that doesnt have Process-Context Identifiers, aka CPUs before haswell iirc.
It's yet to be seen if is has zero effect in AMD CPUs. Although they are immune to Meltdown they are not completely immune to some variants of Spectre.
Recently to my surprise Suse commit some patches to the kernel firmware to "disable branch prediction on Ryzen CPUs" (on their own words)
https://lists.opensuse.org/opensuse-updates/2018-01/msg00000.html
Some AMD PR guys are saying that the description is not correct.
There are a lot of speculation on reddit and other similar sites of what this patch actually does some say it just exposes the branch prediction to the kernel, some says that in only disables branch prediction for the kernel and others say it actually disables indirect branch prediction.
Someone on AMD needs to clarify this other than giving the standard marketing cheap chat.
On the other hand I've applied those Suse updates and I haven't seen any noticeable slowdown but I haven't done that much tests anyway.
View PC info
As for performance, might be placebo cause tests didn't reveal anything but i felt my desktop was a bit slower compared to usual speeds when my cpu was marked with cpu_insecure. Then again, no hard evidence, might be the Disk I/O thingy that took small hit with that.
View PC info
to my understanding the spectre patches for AMD the only thing they do is throttle the syscalls to milliseconds instead of nanoseconds which make timed attacks take hours instead of minutes. Like someone said in another forum is like placing a big excavator to obstruct the entrance of a construction site while you go and build a real door. You are still left vulnerable because there are known javascript exploits and it's not uncommon to leave a webpage for hours on your web browser.
View PC info
View PC info