rsnt_translations
56,420
edits
(add link to RH tool) |
No edit summary |
||
Line 31: | Line 31: | ||
== References == <!--T:10--> | == References == <!--T:10--> | ||
* Other general information about Spectre and Meltdown is available on the [https://www.us-cert.gov/ncas/alerts/TA18-004A US-CERT web site]. | |||
:* Includes comprehensive links to vendor patch sites. | |||
* [https://www.phoronix.com/scan.php?page=article&item=linux-415-x86pti&num=2 Initial Benchmarks Of The Performance Impact Resulting From Linux's x86 Security Changes] | |||
* [https://www.phoronix.com/scan.php?page=article&item=linux-more-x86pti&num=1 Further Analyzing The Intel CPU "x86 PTI Issue" On More Systems] | |||
* [https://medium.com/implodinggradients/meltdown-c24a9d5e254e The Meltdown bug and the KPTI patch: How does it impact ML performance?] | |||
* [https://www.ellexus.com/wp-content/uploads/2018/01/180107-Meltdown-and-Spectre-white-paper.pdf Ellexus whitepaper explaining HPC performance issues] | |||
* [https://security.web.cern.ch/security/advisories/spectre-meltdown/spectre-meltdown.shtml Advisory and tools from CERN Computer Security group] | |||
* [https://access.redhat.com/articles/3311301 Controlling the Performance Impact of Microcode and Security Patches for CVE-2017-5754 CVE-2017-5715 and CVE-2017-5753 using Red Hat Enterprise Linux Tunables] | |||
* [https://access.redhat.com/labs/speculativeexecution/ Redhat's Spectre And Meltdown Detector tool] | |||
</translate> | </translate> |