By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Linux Flips Around Its Behavior For Spectre-BHB Handling On ARM64
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Linux Flips Around Its Behavior For Spectre-BHB Handling On ARM64
Computing

Linux Flips Around Its Behavior For Spectre-BHB Handling On ARM64

News Room
Last updated: 2025/03/28 at 7:48 AM
News Room Published 28 March 2025
Share
SHARE

All of the ARM64 changes were merged this week to the Linux 6.15 kernel for enhancing the 64-bit ARM processor support.

Linux 6.15 on the ARM64 architecture side adds SMT run-time controls for those running the rare ARM processors that support Simultaneous Multi-Threading. Now like x86_64 and other architectures, the SMT status can be toggled at run-time thanks to that work by HiSilicon.

ARM vulnerable

With a change made by a Google engineer, Linux ARM64 will now assume AArch64 processors are vulnerable to the Spectre-BHB (Branch History Injection) vulnerability by default if they are unknown or aren’t otherwise marked as safe from Spectre-BHB. As explained in the prior patch series that is now merged for Linux 6.15:

“The code for detecting CPUs that are vulnerable to Spectre BHB was based on a hardcoded list of CPU IDs that were known to be affected. Unfortunately, the list mostly only contained the IDs of standard ARM cores. The IDs for many cores that are minor variants of the standard ARM cores (like many Qualcomm Kyro CPUs) weren’t listed. This led the code to assume that those variants were not affected.

Flip the code on its head and instead list CPU IDs for cores that are known to be _not_ affected. Now CPUs will be assumed vulnerable until added to the list saying that they’re safe.

As of right now, the only CPU IDs added to the “unaffected” list are ARM Cortex A35, A53, and A55. This list was created by looking at older cores listed in cputype.h that weren’t listed in the “affected” list previously.

Unfortunately, while this solution is better than what we had before, it’s still an imperfect solution. Specifically there are two ways to mitigate Spectre BHB and one of those ways is parameterized with a “k” value indicating how many loops are needed to mitigate. If we have an unknown CPU ID then we’ve got to guess about how to mitigate it. Since more cores seem to be mitigated by looping (and because it’s unlikely that the needed FW code will be in place for FW mitigation for unknown cores), we’ll choose looping for unknown CPUs and choose the highest “k” value of 32.

The downside of our guessing is that some CPUs may now report as “mitigated” when in reality they should need a firmware mitigation. We’ll choose to put a WARN_ON splat in the logs in this case any time we had to make a guess since guessing the right mitigation is pretty awful. Hopefully this will encourage CPU vendors to add their CPU IDs to the list.”

This Spectre-BHB change for ARM64 cores is also marked for back-porting to existing Linux kernel stable series pre-6.15. For more background reading on the topic: Some Qualcomm CPUs Left Exposed To Spectre Vulnerabilities On Mainline Linux.

The ARM64 code for Linux 6.15 also adds Arm “Rainier” CPU PMU support, support for partial virtualization of the Apple M1 PMU, MOPS memcpy/memset support for uaccess routines, and CPU type information reporting for some Qualcomm Kryo cores. More details for those interested via this pull.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Xgimi’s new projector screen will massively upgrade my outdoor movie nights | Stuff
Next Article Android Auto’s latest beta brings full Android game support
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Apple is rumored to be picking one of these two new colors for the iPhone 17
Software
Here’s how I extend my Samsung Galaxy’s battery life
News
2 days left to save up to $210 on your TC All Stage pass | News
News
Asia-LatAm Forum explores regional collaborative opportunities · TechNode
Computing

You Might also Like

Computing

Asia-LatAm Forum explores regional collaborative opportunities · TechNode

5 Min Read
Computing

BEYOND EXPO 2024 | Navigating the future of innovation in cross-border e-commerce · TechNode

2 Min Read
Computing

Unlocking opportunities and embracing the unknown in the Middle East · TechNode

4 Min Read
Computing

BEYOND EXPO 2024 | Empowering a greener world with AI and the metaverse · TechNode

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?