Announcement

Collapse
No announcement yet.

Linux Patch Posted For Cross-Hyperthread Spectre Mitigation With STIBP

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Linux Patch Posted For Cross-Hyperthread Spectre Mitigation With STIBP

    Phoronix: Linux Patch Posted For Cross-Hyperthread Spectre Mitigation With STIBP

    The latest Linux kernel patch coming to light in the Spectre space is by SUSE's Jiri Kosina for enabling cross-hyperthreaded Spectre V2 STIBP mitigation...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    Too bad that this patch cannot possibly help against L1TF, so Intel CPU owners will still need to disable hyperthreading if they want to be safe.

    Comment


    • #3
      Originally posted by phoronix View Post
      What STIBP provides on supported CPUs/microcodes is from indirect branch predictions from being controlled by the sibling hyper-thread.
      I feel like there is a typo...

      Comment


      • #4
        Originally posted by dwagner View Post
        Too bad that this patch cannot possibly help against L1TF, so Intel CPU owners will still need to disable hyperthreading if they want to be safe.
        Too bad that this patch cannot possibly help against the other thousand Intel vulnerabilities to be discovered, so Intel CPU owners will still need to disable their processors and buy AMD if they want to be safe.

        Comment


        • #5
          This doesn't sound specific to hyperthreading, but does sound specific to SMT (of which hyperthread qualifies). Does this mean AMD is vulnerable? Does it mean that other architectures with SMT are vulnerable? Ie, IBM POWER, Sun/Oracle Niagra chips, and so on?

          Comment

          Working...
          X