While you're here, please consider supporting GamingOnLinux on:
Reward Tiers:
Patreon. Plain Donations:
PayPal.
This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!
You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
Reward Tiers:
This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!
You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
Login / Register
- Nexus Mods retire their in-development cross-platform app to focus back on Vortex
- Windows compatibility layer Wine 11 arrives bringing masses of improvements to Linux
- GOG plan to look a bit closer at Linux through 2026
- European Commission gathering feedback on the importance of open source
- Hytale has arrived in Early Access with Linux support
- > See more over 30 days here
- Venting about open source security.
- LoudTechie - Weekend Players' Club 2026-01-16
- Mustache Gamer - Welcome back to the GamingOnLinux Forum
- simplyseven - A New Game Screenshots Thread
- JohnLambrechts - Will you buy the new Steam Machine?
- mr-victory - See more posts
How to setup OpenMW for modern Morrowind on Linux / SteamOS and Steam Deck
How to install Hollow Knight: Silksong mods on Linux, SteamOS and Steam Deck
View PC info
Some more info here:
[https://threatpost.com/intel-in-security-hot-seat-over-serious-cpu-design-flaw/129289/](https://threatpost.com/intel-in-security-hot-seat-over-serious-cpu-design-flaw/129289/)
Microsoft, Apple and Linux kernel developers are already working on Operating System patching to minimise the problem from the software side. But until this is done, an exploit could take advantage of all those systems.
Also noting that the OS software fix is going to slow down systems running Intel chips, estimated to be 7% to 23% slower as a result. (Won't be a problem for AMD.) Imagine your First Person Shooter game loses 10 frames per second.
Lots of news, all over the internet about this, right now.
I would be carefully with the "won't be a problem for AMD" statement. In the first iteration of the patch all are affected. In the second iteration some changes will exclude some AMD cpus.
However the original security issue describes also attacks for AMD and ARM devices including nearly all Android phones. (iPhone/iPad?). Therefore i personally would deny your statment.
Overall the performance influcence is imho not worth to discuss about. For games usually in the arrea of messurement toloerances/faiulures.
What I'm wondering about is, that there is a security hole in nearly every CPU of the last decade that requires imedidate updates on all critical system (include nucelar power plants, trains, banking servers, stock exchanges, hospitals etc..) and instead of discussing how to efficiently patch critical infrastucture and how to get out patching hell people in forums discuss about minor performance impacts on realistic workloads instead of the risks not patching the systems.
This incident has the potential to turn down any cloud/containerized/virtualisation based business.
Instead of moarning we should be very thankfull towards the people spending the year-end-days to provide the patch.
BR
Mad
pti=offwith your boot options I doubt that i would be any less secure than running windows :PFor my servers tho.. I foresee meetings of the "pin the bill" variety in my near future :(
It's kind of amusing that they "just happen" to be able to use a 6 month old patch (KAISER) to fix the issue, when did google claim they discovered the problem again? ;)
As for AMD... It seems that there are two or more different attacks... For the "Meltdown" attack, it appears as if AMD is not vulnerable to this method. However, AMD *may* be vulnerable to "Spectre."
From [Meltdown and Spectre website](https://meltdownattack.com/):
View PC info
noptishould work also
6 month old KAISER work, wasn't this done because of intel management engine security issues? the one that intel still havent patched yet afaik?
also i saw somewhere that this issue was reported in june or july this year already, but it was embargoed by intel to not cause any media fuss about it i guess.
anyway seems AMD, Intel and most of the ARM is affected with the smaller problem called "Spectre", which is super hard to patch out, but its also super hard to use it for hacks, because you need to guess the cpu first and flush some commands into it to get some info out of it and on top of that you need to get your code into the machine first. But the "Meltdown" is only Intel issue and this can be patched with the Page table isolation. That issue is also more insecure afaik, so the patches are rolling in for that.. Some ARM supposedly has this issue also, its the Branch predictor design those CPUs use.
Anyway it seems media made bigger fuss about it than the issue actually is. More testing needs to be done though, specially those older CPUs that doesnt have Process-Context Identifiers, aka CPUs before haswell iirc.
View PC info
As for performance, might be placebo cause tests didn't reveal anything but i felt my desktop was a bit slower compared to usual speeds when my cpu was marked with cpu_insecure. Then again, no hard evidence, might be the Disk I/O thingy that took small hit with that.
View PC info
I am on Antergos , same kernel and same CPU you have.
What Nvidia card do you have ?
Odd one , I must admit.
Did you switch to Fedora in the meantime ? Does it work better for you ?