Announcement

Collapse
No announcement yet.

Linux Readying Spectre V2 Userspace-Userspace Protection

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Linux Readying Spectre V2 Userspace-Userspace Protection

    Phoronix: Linux Readying Spectre V2 Userspace-Userspace Protection

    While the Linux kernel has been patched for months (and updated CPU microcode available) to mitigate Spectre Variant Two "Branch Target Injection" this has been focused on kernel-space protection while patches are pending now for userspace-userspace protection...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    I hope the hardware fixes will be available in the not too distant future to make all of this performance reducing work obsolete. Considering all of the time and effort (costs) going into these mitigations which could have been spend on performance improvements instead makes me a little sad.

    Comment


    • #3
      What a mess.

      Comment


      • #4
        Can we opt-out of the whole spectre/meltdown fixes when we update the kernel?

        they don't help and only slow things down, this is based on experimentation i made with spectre in previous versions...

        It is useless to fight back, Only new architecture will help.

        Comment


        • #5
          Originally posted by Illasera View Post
          Can we opt-out of the whole spectre/meltdown fixes when we update the kernel?
          You can always tell your kernel to not to use these fixes with boot parameters. You can find it easily by searching internet but for your convenience, here is what Michael wrote about it a short while ago:
          Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite


          I don't know if there is config option for disabling these in case you are compiling your own kernels. I imagined that you use some prepackaged kernel of distribution of your choice since you had to ask here.

          Comment


          • #6
            Note that, as of today, Intel are the only CPUs where the spectre-v2 address table poisoning has been demonstrated successfully.

            There are a few AMD the could in theory be affected (they to indirect branch prediction speculation) but it apparently it's much more complicated to actually pull an exploit.

            Comment

            Working...
            X