RISC-V Enabling Generic CPU Vulnerabilities Reporting

Written by Michael Larabel in RISC-V on 8 September 2024 at 06:37 AM EDT. 6 Comments
RISC-V
While RISC-V processors don't need to worry about Meltdown and Spectre or have any other severe CPU vulnerabilities at the moment, with the upcoming Linux 6.12 kernel the RISC-V code is set to enable the generic CPU vulnerabilities support.

The generic CPU vulnerabilities support reports the various vulnerabilities and whether the running system/CPU is affected by the vulnerabilities and if so the mitigation status. This is conveniently exposed under /sys/devices/system/cpu/vulnerabilities across x86/x86_64, ARM, AArch64, and other architectures. But so far hasn't been exposed under RISC-V.

As RISC-V adoption rises there will likely be more security researchers poking at RISC-V processors in looking for security vulnerabilities. There's been some hardware/implementation specific ones already like the recent GhostWrite vulnerability. So with time it's pretty inevitable that some security issues for RISC-V needing software mitigations will come to light.

sysfs generic vulnerabilities example


Plus enabling the generic CPU vulnerabilities support now will at least make it clear to users that they are not affected by the current batch of CPU vulnerabilities. "Not affected" will be conveyed to the users when running Linux 5.12+ with the current vulnerabilities exposed under this generic CPU vulnerability reporting.

The patch has made it into RISC-V's "for-next" Git branch this week and thus destined for the upcoming Linux 6.12 merge window barring any last minute change of course.
Related News
About The Author
Michael Larabel

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 20,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter, LinkedIn, or contacted via MichaelLarabel.com.

Popular News This Week