Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262475AbVEMSiF (ORCPT ); Fri, 13 May 2005 14:38:05 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262476AbVEMSiF (ORCPT ); Fri, 13 May 2005 14:38:05 -0400 Received: from clock-tower.bc.nu ([81.2.110.250]:58314 "EHLO lxorguk.ukuu.org.uk") by vger.kernel.org with ESMTP id S262475AbVEMShw (ORCPT ); Fri, 13 May 2005 14:37:52 -0400 Subject: Re: Hyper-Threading Vulnerability From: Alan Cox To: Andi Kleen Cc: Gabor MICSKO , Linux Kernel Mailing List In-Reply-To: References: <1115963481.1723.3.camel@alderaan.trey.hu> Content-Type: text/plain Content-Transfer-Encoding: 7bit Message-Id: <1116009347.1448.489.camel@localhost.localdomain> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.4.6 (1.4.6-2) Date: Fri, 13 May 2005 19:35:48 +0100 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 744 Lines: 18 > This is not a kernel problem, but a user space problem. The fix > is to change the user space crypto code to need the same number of cache line > accesses on all keys. You actually also need to hit the same cache line sequence on all keys if you take a bit more care about it. > Disabling HT for this would the totally wrong approach, like throwing > out the baby with the bath water. HT for most users is pretty irrelevant, its a neat idea but the benchmarks don't suggest its too big a hit - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/