Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Bug Intel Linux

How Do Spectre/Meltdown Fixes Affect The Linux Kernel? (phoronix.com) 29

"Using the newly minted Linux 4.19 feature code, fresh benchmarks were carried out looking at the performance cost of Spectre/Meltdown/Foreshadow mitigations on Intel Xeon v. AMD EPYC CPUs," writes an anonymous Slashdot reader: Workloads affected by these CPU vulnerabilities mainly deal with I/O and frequent kernel calls while CPU bound tests are still found to be minimally impacted. When toggling these mitigations on Linux 4.19, Intel Xeon CPUs were found to be 10~15% slower with the default kernel while AMD EPYC CPUs dropped to about 5% slower.
This discussion has been archived. No new comments can be posted.

How Do Spectre/Meltdown Fixes Affect The Linux Kernel?

Comments Filter:
  • Local exploits are a lot harder to pull off than remote exploits. The primary gatekeeper of the worlds IT device is Secure Shell. I just have one simple question: If this shit is so catastrophic and bad like we've been hearing, then where the fuck are the OpenSSH remote root exploits? Bullshit flag thrown. Now point me to the exploit code that returns a root prompt and I'll drink your security Chicken Little kool-aid. Until then *yawn*.

If you think the system is working, ask someone who's waiting for a prompt.

Working...