Attack Vector Controls Land In Linux 6.17 To Better Control CPU Security Mitigations (www.phoronix.com)
from KarnaSubarna@lemmy.ml to linux@lemmy.ml on 02 Aug 08:30
https://lemmy.ml/post/34047329

#linux

threaded - newest

Shimitar@downonthestreet.eu on 02 Aug 11:00 next collapse

Title make little sense to me.

wewbull@feddit.uk on 02 Aug 21:05 collapse

A lot of the security fixes since spectre have focused on exploiting speculative execution (a key CPU performance feature) to cross security boundaries. Defeating speculative execution when switching from user to kernel space (for example) adds a lot of overhead.

The new kernel add controls so that machines that don’t need to worry about these exploits to disable the performance killing fixes.

Shimitar@downonthestreet.eu on 07 Aug 06:21 collapse

I get the concept. Title is written so badly that’s really unreadable make no sense and confuses even people who know a bit on the subject.

The word “land” should be relaces, because it stck with controls and lose its meaning. Also, repeating control again adds to the mess.

wewbull@feddit.uk on 07 Aug 07:35 collapse

Agreed. The headline is terrible. Headline Case Doesn’t Help Either.

ravenaspiring@sh.itjust.works on 02 Aug 11:49 collapse

The Attack Vector Controls work is now in Linux 6.17 for those new tuning knobs worked on by AMD engineer David Kaplan to make it more straight-forward for Linux server administrators and power users to more easily select the CPU security mitigations relevant to their system(s) and intended workloads

Title makes more sense in context of the first couple paragraphs.