While you're here, please consider supporting GamingOnLinux on:
Reward Tiers: Patreon. Plain Donations: PayPal.
This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!
You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
Reward Tiers: Patreon. Plain Donations: PayPal.
This ensures all of our main content remains totally free for everyone! Patreon supporters can also remove all adverts and sponsors! Supporting us helps bring good, fresh content. Without your continued support, we simply could not continue!
You can find even more ways to support us on this dedicated page any time. If you already are, thank you!
Login / Register
- Fedora KDE gets approval to be upgraded to sit alongside Fedora Workstation
- Steam gets new tools for game devs to offer players version switching in-game
- Palworld dev details the patents Nintendo and The Pokemon Company are suing for
- GOG launch their Preservation Program to make games live forever with a hundred classics being 're-released'
- Sony say their PSN account requirement on PC is so you can enjoy their games 'safely'
- > See more over 30 days here
-
Civilization VI, Civilization V, lots of DLC and other …
- Pompesdesky -
Mesa 24.2.7 out now and Mesa 24.3 may come sooner than …
- KROM -
Classic Unreal Tournament and Unreal now easier to down…
- _wojtek -
The latest from Prime Gaming - November 14 edition - lo…
- MrDerby -
EA Anti-Cheat arrives for Battlefield 1 breaking it on …
- Scattershot - > See more comments
- Steam and offline gaming
- Snak30 - Does Sinden Lightgun work?
- helloCLD - No more posting on X / Twitter
- Liam Dawe - Weekend Players' Club 10/11/2024
- Pengling - Upped the limit on article titles
- eldaking - See more posts
View PC info
Some more info here:
https://threatpost.com/intel-in-security-hot-seat-over-serious-cpu-design-flaw/129289/
Microsoft, Apple and Linux kernel developers are already working on Operating System patching to minimise the problem from the software side. But until this is done, an exploit could take advantage of all those systems.
Also noting that the OS software fix is going to slow down systems running Intel chips, estimated to be 7% to 23% slower as a result. (Won't be a problem for AMD.) Imagine your First Person Shooter game loses 10 frames per second.
Lots of news, all over the internet about this, right now.
I would be carefully with the "won't be a problem for AMD" statement. In the first iteration of the patch all are affected. In the second iteration some changes will exclude some AMD cpus.
However the original security issue describes also attacks for AMD and ARM devices including nearly all Android phones. (iPhone/iPad?). Therefore i personally would deny your statment.
Overall the performance influcence is imho not worth to discuss about. For games usually in the arrea of messurement toloerances/faiulures.
What I'm wondering about is, that there is a security hole in nearly every CPU of the last decade that requires imedidate updates on all critical system (include nucelar power plants, trains, banking servers, stock exchanges, hospitals etc..) and instead of discussing how to efficiently patch critical infrastucture and how to get out patching hell people in forums discuss about minor performance impacts on realistic workloads instead of the risks not patching the systems.
This incident has the potential to turn down any cloud/containerized/virtualisation based business.
Instead of moarning we should be very thankfull towards the people spending the year-end-days to provide the patch.
BR
Mad
View PC info
pti=off
with your boot options I doubt that i would be any less secure than running windows :PFor my servers tho.. I foresee meetings of the "pin the bill" variety in my near future :(
It's kind of amusing that they "just happen" to be able to use a 6 month old patch (KAISER) to fix the issue, when did google claim they discovered the problem again? ;)
View PC info
As for AMD... It seems that there are two or more different attacks... For the "Meltdown" attack, it appears as if AMD is not vulnerable to this method. However, AMD *may* be vulnerable to "Spectre."
From Meltdown and Spectre website:
View PC info
nopti
should work also
6 month old KAISER work, wasn't this done because of intel management engine security issues? the one that intel still havent patched yet afaik?
also i saw somewhere that this issue was reported in june or july this year already, but it was embargoed by intel to not cause any media fuss about it i guess.
anyway seems AMD, Intel and most of the ARM is affected with the smaller problem called "Spectre", which is super hard to patch out, but its also super hard to use it for hacks, because you need to guess the cpu first and flush some commands into it to get some info out of it and on top of that you need to get your code into the machine first. But the "Meltdown" is only Intel issue and this can be patched with the Page table isolation. That issue is also more insecure afaik, so the patches are rolling in for that.. Some ARM supposedly has this issue also, its the Branch predictor design those CPUs use.
Anyway it seems media made bigger fuss about it than the issue actually is. More testing needs to be done though, specially those older CPUs that doesnt have Process-Context Identifiers, aka CPUs before haswell iirc.
View PC info
As for performance, might be placebo cause tests didn't reveal anything but i felt my desktop was a bit slower compared to usual speeds when my cpu was marked with cpu_insecure. Then again, no hard evidence, might be the Disk I/O thingy that took small hit with that.
View PC info
View PC info
View PC info
View PC info
Odd
I am on Antergos , same kernel and same CPU you have.
What Nvidia card do you have ?
View PC info
980 GTX driver ver 387.34