Article 6Y9SJ Canonical to Remove GPU Exploit Mitigation to Gain 20% Performance Boost

Canonical to Remove GPU Exploit Mitigation to Gain 20% Performance Boost

by
janrinok
from SoylentNews on (#6Y9SJ)

An Anonymous Coward writes:

https://distrowatch.com/dwres.php?resource=showheadline&story=20013

Typically open source operating systems work to close off avenues for potential bugs and exploits, but sometimes, in the quest for convenience or performance, security takes a lower priority. We see an example of this in Canonical disabling a vulnerability mitigation for Intel GPUs in order to gain a 20% performance boost. The issue report on Launchpad states: "After discussion between Intel and Canonical's security teams, we are in agreement that Spectre no longer needs to be mitigated for the GPU at the Compute Runtime level.

At this point, Spectre has been mitigated in the kernel, and a clear warning from the Compute Runtime build serves as a notification for those running modified kernels without those patches. For these reasons, we feel that Spectre mitigations in Compute Runtime no longer offer enough security impact to justify the current performance trade-off."

Original Submission

Read more of this story at SoylentNews.

External Content
Source RSS or Atom Feed
Feed Location https://soylentnews.org/index.rss
Feed Title SoylentNews
Feed Link https://soylentnews.org/
Feed Copyright Copyright 2014, SoylentNews
Reply 0 comments