Meltdown and Spectre bugs: Difference between revisions

Jump to navigation Jump to search
no edit summary
(add link to RH tool)
No edit summary
Line 31: Line 31:


== References == <!--T:10-->
== References == <!--T:10-->
# Other general information about Spectre and Meltdown is available on the [https://www.us-cert.gov/ncas/alerts/TA18-004A US-CERT web site].
* Other general information about Spectre and Meltdown is available on the [https://www.us-cert.gov/ncas/alerts/TA18-004A US-CERT web site].
#* Includes comprehensive links to vendor patch sites.
:* Includes comprehensive links to vendor patch sites.
# [https://www.phoronix.com/scan.php?page=article&item=linux-415-x86pti&num=2 Initial Benchmarks Of The Performance Impact Resulting From Linux's x86 Security Changes]
* [https://www.phoronix.com/scan.php?page=article&item=linux-415-x86pti&num=2 Initial Benchmarks Of The Performance Impact Resulting From Linux's x86 Security Changes]
# [https://www.phoronix.com/scan.php?page=article&item=linux-more-x86pti&num=1 Further Analyzing The Intel CPU "x86 PTI Issue" On More Systems]
* [https://www.phoronix.com/scan.php?page=article&item=linux-more-x86pti&num=1 Further Analyzing The Intel CPU "x86 PTI Issue" On More Systems]
# [https://medium.com/implodinggradients/meltdown-c24a9d5e254e The Meltdown bug and the KPTI patch: How does it impact ML performance?]
* [https://medium.com/implodinggradients/meltdown-c24a9d5e254e The Meltdown bug and the KPTI patch: How does it impact ML performance?]
# [https://www.ellexus.com/wp-content/uploads/2018/01/180107-Meltdown-and-Spectre-white-paper.pdf Ellexus whitepaper explaining HPC performance issues]
* [https://www.ellexus.com/wp-content/uploads/2018/01/180107-Meltdown-and-Spectre-white-paper.pdf Ellexus whitepaper explaining HPC performance issues]
# [https://security.web.cern.ch/security/advisories/spectre-meltdown/spectre-meltdown.shtml Advisory and tools from CERN Computer Security group]
* [https://security.web.cern.ch/security/advisories/spectre-meltdown/spectre-meltdown.shtml Advisory and tools from CERN Computer Security group]
# [https://access.redhat.com/articles/3311301 Controlling the Performance Impact of Microcode and Security Patches for CVE-2017-5754 CVE-2017-5715 and CVE-2017-5753 using Red Hat Enterprise Linux Tunables]
* [https://access.redhat.com/articles/3311301 Controlling the Performance Impact of Microcode and Security Patches for CVE-2017-5754 CVE-2017-5715 and CVE-2017-5753 using Red Hat Enterprise Linux Tunables]
# [https://access.redhat.com/labs/speculativeexecution/ Redhat's Spectre And Meltdown Detector tool]
* [https://access.redhat.com/labs/speculativeexecution/ Redhat's Spectre And Meltdown Detector tool]
</translate>
</translate>
rsnt_translations
57,772

edits

Navigation menu