Joined: 12 May 2008 Posts: 2190 Location: N.E. USA
Posted: Sat 13 Jun 2020, 12:55 Post subject:
Special Register Buffer Data Sampling Subject description: Newer Intel MPU/CPU
Theres a warning and patches available for the subject SPECTRE/MELTDOWN offense. From the Linux Kernel Org site:
SRBDS is an MDS-like speculative side channel that can leak bits from the
random number generator (RNG) across cores and threads. New microcode
serializes the processor access during the execution of RDRAND and
RDSEED. This ensures that the shared buffer is overwritten before it is
released for reuse.
While it is present on all affected CPU models, the microcode mitigation
is not needed on models that enumerate ARCH_CAPABILITIES[MDS_NO] in the
cases where TSX is not supported or has been disabled with TSX_CTRL.
The newest kernel series dated on or after 6/10/2020 have automated the activation of a mitigation. Intel has listed thee affected processor series HERE
In addition to the kernel update for the mitigation, there are several patches for x86 and ext4. All longterm kernels are updated.
Developers please take note.
8Geee _________________ Linux user #498913 "Some people need to reimagine their thinking."
"Zuckerberg: a large city inhabited by mentally challenged people."
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum You cannot attach files in this forum You can download files in this forum