frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

Disabling Intel Graphics Security Mitigation Boosts GPU Compute Performance 20%

https://www.phoronix.com/news/Disable-Intel-Gfx-Security-20p
37•rcarmo•3h ago

Comments

rurban•2h ago
And re-enables CVE-2019-0155?

Intel researchers discovered that Intel graphics processors allowed userspace to modify page table entries via writes to MMIO from the Blitter Command Streamer and exposed kernel memory information, resulting in possible privilege escalation and information disclosure vulnerabilities. A local user could use this issue to escalate their privileges on the local machine.

It's i915.mitigations

Lindby•2h ago
They mention that there are mitigations in the kernel nowadays, so the mitigations they turned off here are now redundant. But I'm uncertain if that refers to the same cve that you mention.
simoncion•2h ago
> It's i915.mitigations

Since you're doing the research, you tell us. Is NEO_DISABLE_MITIGATIONS (the flag mentioned in TFA) related to i915.mitigations, and if so, how?

TFA mentions that Intel ships prebuilt driver packages with this NEO_... flag set, and that Canonical and Intel programmers talked at some length about the flag.

jeroenhd•2h ago
Based on the comments and the article, it seems like Intel is relying on a patched kernel so that the mitigations at the GPU driver stack are no longer necessary. You get security warnings if you try to run the unpatched GPU stack without a patched kernel.

If my interpretation is correct, that means as long as you're using an up-to-date, patched kernel with standard mitigations enabled, the extra security layer Intel added is no longer necessary. It could expose another bug not yet covered by patches, though, as the heavy-handed patch probably also prevented more security issues.

phoronixrly•1h ago
> After discussion between Intel and Canonical’s security teams, we are in agreement that Spectre no longer needs to be mitigated for the GPU at the Compute Runtime level. At this point, Spectre has been mitigated in the kernel...
CjHuber•1h ago
Is it not a known fact that these mitigations cause a significant performance drop? I have never heard anyone assuming otherwise
bilekas•46m ago
That's not debated and nobody mentioned that it's a 'surprise' there is a perf hit.

The topic is related to now being the time to disable it as there seems to be no need for it anymore due to a kernel patch, as well as Intel themselves publishing upstream without these.

> Intel themselves have enabled this flag in their builds available on their Github release page upstream."

> At this point, Spectre has been mitigated in the kernel, and a clear warning from the Compute Runtime build serves as a notification for those running modified kernels without those patches.

phoronixrly•1h ago
Source if you wish to skip the clickbait, blogspam and toxic comments: https://bugs.launchpad.net/ubuntu/+source/intel-compute-runt...

I also propose the title here be changed to 'Security mitigations in intel-compute-runtime no longer needed, disabling brings 20% boost' because as it currently is it misleads that Canonical is reopening the Spectre vulnerability in the GPU for performance's sake. It's not. While there, I'd say update the link to point to the source.

Relevant quote:

> After discussion between Intel and Canonical’s security teams, we are in agreement that Spectre no longer needs to be mitigated for the GPU at the Compute Runtime level. At this point, Spectre has been mitigated in the kernel...

Mechanical Watch: Exploded View

https://fellerts.no/projects/epoch.html
915•fellerts•19h ago•102 comments

New Linux udisks flaw lets attackers get root on major Linux distros

https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/
106•smig0•3d ago•48 comments

I wrote my PhD Thesis in Typst

https://fransskarman.com/phd_thesis_in_typst.html
350•todsacerdoti•13h ago•208 comments

Python can run Mojo now

https://koaning.io/posts/giving-mojo-a-spin/
174•cantdutchthis•2d ago•84 comments

Using Home Assistant, adguard home and an $8 smart outlet to avoid brain rot

https://www.romanklasen.com/blog/beating-brainrot-by-button/
236•remuskaos•13h ago•122 comments

EU rules for durable, energy-efficient and repairable smartphones and tablets

https://single-market-economy.ec.europa.eu/news/new-eu-rules-durable-energy-efficient-and-repairable-smartphones-and-tablets-start-applying-2025-06-20_en
25•robin_reala•1h ago•20 comments

Show HN: Ariadne – A Rust implementation of aperiodic cryptography

https://codeberg.org/CipherNomad/Ariadne
28•ciphernomad-org•6h ago•23 comments

Spectroscopic Classification of ASASSN-25cm as a Classical Nova

https://www.astronomerstelegram.org/?read=17228
14•tzury•3h ago•4 comments

Finding a billion factorials in 60 ms with SIMD

https://codeforces.com/blog/entry/143279
118•todsacerdoti•11h ago•9 comments

Polystate: Composable Finite State Machines

https://github.com/sdzx-1/polystate
62•goless•8h ago•30 comments

Klein Bottle Amazon Brand Hijacking (2021)

https://www.kleinbottle.com/Amazon_Brand_Hijacking.html
237•sebg•15h ago•104 comments

Cataphract: Medieval-fantasy roleplaying wargame, in the Black-Sea C. 1300

https://samsorensen.blot.im/cataphracts-design-diary-1
4•vidro3•3d ago•0 comments

Show HN: Lego Island Playable in the Browser

https://isle.pizza
97•foxtacles•11h ago•25 comments

The Tandy Corporation

https://www.abortretry.fail/p/the-tandy-corporation-part-1
34•rbanffy•2d ago•17 comments

Verlet Integration and Cloth Physics Simulation

https://pikuma.com/blog/verlet-integration-2d-cloth-physics-simulation
10•atan2•2d ago•2 comments

The X Window System didn't immediately have X terminals

https://utcc.utoronto.ca/~cks/space/blog/unix/XTerminalsNotImmediate
38•zdw•6h ago•15 comments

Tensor Manipulation Unit (TMU): Reconfigurable, Near-Memory, High-Throughput AI

https://arxiv.org/abs/2506.14364
37•transpute•8h ago•5 comments

Using Wave Function Collapse to solve puzzle map generation at scale

https://sublevelgames.github.io/blogs/2025-06-22-nurikabe-map-gen-with-wfc/
49•greentec•9h ago•12 comments

Claude Code for VSCode

https://marketplace.visualstudio.com/items?itemName=anthropic.claude-code
21•tosh•2h ago•10 comments

Radio Garden

https://radio.garden/?2025
100•LeoPanthera•12h ago•18 comments

Disabling Intel Graphics Security Mitigation Boosts GPU Compute Performance 20%

https://www.phoronix.com/news/Disable-Intel-Gfx-Security-20p
37•rcarmo•3h ago•8 comments

Optifye.ai (YC W25) – Founding Back End Engineer

1•Vivaan_Baid•9h ago

Hawaii Highways

http://www.hawaiihighways.com/
57•yakattak•11h ago•21 comments

Cross-Account and Cross-Region Backups with AWS Backup (and Friends)

https://tylerrussell.dev/2025/06/20/cross-account-and-region-backups-with-aws-backup-and-friends/
35•terussell85•2d ago•11 comments

2048 with only 64 bits of state

https://github.com/izabera/bitwise-challenge-2048
140•todsacerdoti•3d ago•34 comments

The cultural decline of literary fiction

https://oyyy.substack.com/p/the-cultural-decline-of-literary
169•libraryofbabel•18h ago•297 comments

2025 Alonzo Church Award: Paul Blain Levy for Call-by-Push-Value (CBPV)

https://siglog.org/winner-of-the-2025-alonzo-church-award/
35•matt_d•2d ago•6 comments

We’ve had a Denisovan skull since the 1930s, only nobody knew

https://arstechnica.com/science/2025/06/the-controversial-dragon-man-skull-was-a-denisovan/
87•Bluestein•4d ago•26 comments

Interview with Francine Prose on early-1970s San Francisco [audio]

https://www.laphamsquarterly.org/content/episode-3-francine-prose
52•keiferski•14h ago•8 comments

The largest map of the universe reveals over 800k galaxies

https://newatlas.com/space/largest-map-universe-reveals-800000-galaxies/
5•thunderbong•44m ago•1 comments