Announcement

Collapse
No announcement yet.

Linux Developers Continue Discussing "SLS" Mitigation For The Kernel

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Linux Developers Continue Discussing "SLS" Mitigation For The Kernel

    Phoronix: Linux Developers Continue Discussing "SLS" Mitigation For The Kernel

    Disclosed by Arm last summer was the Straight Line Speculation (SLS) vulnerability and they were quick to introduce new safeguards against SLS in the GCC and LLVM compilers. The compiler-based mitigations to straight-line speculation involves adding speculation barrier sequences around the vulnerable instructions to prevent speculatively executing instructions around changes in control flow. While compiler developers were quick to add the options, so far the Linux kernel developers are in disagreement still over its importance and the proposed patches that would flip on this option when compiling the ARM Linux kernel...

    https://www.phoronix.com/scan.php?pa...Arm-v6-Patches

  • #2
    They should add it to vulnerabilities first;
    HTML Code:
    C4> cd /sys/devices/system/cpu/vulnerabilities/ && grep . *
    itlb_multihit:Not affected
    l1tf:Not affected
    mds:Not affected
    meltdown:Not affected
    spec_store_bypass:Not affected
    spectre_v1:Mitigation: __user pointer sanitization
    spectre_v2:Not affected
    srbds:Not affected
    tsx_async_abort:Not affected
    C4> uname -r
    5.4.103-rc1-dirty
    Last edited by elatllat; 06 March 2021, 02:57 PM.

    Comment

    Working...
    X