On Fri, 2005-05-13 at 20:03 +0200, Andi Kleen wrote: > This is not a kernel problem, but a user space problem. The fix > is to change the user space crypto code to need the same number of cache line > accesses on all keys. > > Disabling HT for this would the totally wrong approach, like throwing > out the baby with the bath water. > > -Andi Why? It's certainly reasonable to disable it for the time being and even prudent to do so. -- Richard F. Rebel cat /dev/null > `tty`
Attachment:
signature.asc
Description: This is a digitally signed message part
- Follow-Ups:
- Re: Hyper-Threading Vulnerability
- From: Jim Crilly <[email protected]>
- Re: Hyper-Threading Vulnerability
- From: Andi Kleen <[email protected]>
- Re: Hyper-Threading Vulnerability
- References:
- Hyper-Threading Vulnerability
- From: Gabor MICSKO <[email protected]>
- Re: Hyper-Threading Vulnerability
- From: Andi Kleen <[email protected]>
- Hyper-Threading Vulnerability
- Prev by Date: Re: Hyper-Threading Vulnerability
- Next by Date: Re: Hyper-Threading Vulnerability
- Previous by thread: Re: Hyper-Threading Vulnerability
- Next by thread: Re: Hyper-Threading Vulnerability
- Index(es):