Announcement

Collapse
No announcement yet.

Linux Lands Mitigations For Spectre-BHB / BHI On Intel & Arm, Plus An AMD Change Too

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Linux Lands Mitigations For Spectre-BHB / BHI On Intel & Arm, Plus An AMD Change Too

    Phoronix: Linux Lands Mitigations For Spectre-BHB / BHI On Intel & Arm, Plus An AMD Change Too

    Within minutes of the BHI speculative execution vulnerability going public, patches were merged into the mainline Linux kernel Git tree for mitigating this offshoot from Spectre V2. The Intel and Arm processors affected by BHI (also referred to as Spectre-BHB) have mitigation work plus a change also impacts AMD processors too...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    Are any of the *BSDs affected? I looked it up and eBPF looks like a Linux specific feature.

    Comment


    • #3
      Originally posted by kylew77 View Post
      eBPF looks like a Linux specific feature.
      The vulnerability has nothing to do with eBPF. It was just used to show the vulnerability, but in theory it can be vulnerable without eBPF

      Edit: see under "So, is disabling unprivileged eBPF sufficient?" [0]
      [0] https://www.vusec.net/projects/bhi-spectre-bhb/
      Last edited by CTTY; 08 March 2022, 08:22 PM.

      Comment


      • #4
        Originally posted by kylew77 View Post
        Are any of the *BSDs affected? I looked it up and eBPF looks like a Linux specific feature.
        This vulnerability is not in the kernel interface called eBPF, but instead on a proessor level, affecting any system using the vulnerable CPUs (ARM and Intel)

        Comment


        • #5
          Do I understand it correctly, that systems saying `Full generic retpoline` in `/sys/devices/system/cpu/vulnerabilities/spectre_v2` are NOT vulnerable? (Since Full generic retpoline are applied)

          Comment


          • #6
            Originally posted by CTTY View Post
            Do I understand it correctly, that systems saying `Full generic retpoline` in `/sys/devices/system/cpu/vulnerabilities/spectre_v2` are NOT vulnerable? (Since Full generic retpoline are applied)
            Those CPU's already using (or forced to use) full reptolines are (mostly) considered not vulnerable. as the LFENCE and eIBRS mitigations are no longer considered sufficient.

            Comment


            • #7
              Why this sudden change of amd's spectre_v2? I thought that his new cpu vulnerability does not affect the amd side.

              Comment


              • #8
                One more useless evil mitigation for one more bullshit "vulnerability". Pray that Linus will keep the possibility to switch this crap off.

                Comment


                • #9
                  Originally posted by bezirg View Post
                  Why this sudden change of amd's spectre_v2? I thought that his new cpu vulnerability does not affect the amd side.
                  AMD is vulnerable to some (not all) speculation vulns
                  Code:
                  $ grep $ /sys/devices/system/cpu/vulnerabilities/*
                  /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
                  /sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
                  /sys/devices/system/cpu/vulnerabilities/mds:Not affected
                  /sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
                  /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl
                  /sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
                  /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Full AMD retpoline, IBPB: conditional, STIBP: conditional, RSB filling
                  /sys/devices/system/cpu/vulnerabilities/srbds:Not affected
                  /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected

                  Comment


                  • #10
                    Originally posted by asriel View Post
                    One more useless evil mitigation for one more bullshit "vulnerability". Pray that Linus will keep the possibility to switch this crap off.
                    I have disabled all mitigations on my systems. These are "bullshit vulnerabilities" as you said. After years of being disclosed there is still to appear a working exploit.

                    Comment

                    Working...
                    X