this post was submitted on 25 Jun 2025
104 points (100.0% liked)

Linux

11472 readers
96 users here now

Welcome to c/linux!

Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!

Rules:

  1. Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.

  2. Be respectful: Treat fellow community members with respect and courtesy.

  3. Quality over quantity: Share informative and thought-provoking content.

  4. No spam or self-promotion: Avoid excessive self-promotion or spamming.

  5. No NSFW adult content

  6. Follow general lemmy guidelines.

founded 2 years ago
MODERATORS
top 12 comments
sorted by: hot top controversial new old
[–] 9tr6gyp3@lemmy.world 25 points 2 days ago (3 children)

This is fine for single user systems. If your system allows more than 1 users, this is probably not something you want to do.

[–] oce@jlai.lu 18 points 2 days ago (1 children)

The point is the Linux Kernel is covering the same security mitigations which make the CPU level ones redundant. If all users are using the Linux Kernel, why would it be an issue?

[–] 9tr6gyp3@lemmy.world 9 points 2 days ago* (last edited 2 days ago) (1 children)

Depends on how you use your system if you have multiple users. CPU mitigations wont protect GPU workloads, and vice versa. If your CPU was mitigating GPU workloads, that would probably be a massive performance loss.

[–] Cypher@lemmy.world 11 points 2 days ago* (last edited 2 days ago) (1 children)

That’s not how this works.

The vulnerability is all on the CPU side. The GPU workloads being referenced are only vulnerable on the CPU instruction set used to pass workloads to the GPU.

Talking about CPU and GPU workloads as entirely separate in this context is misleading as the vulnerability is with CPU code execution that passes tasks to the GPU.

The GPU is not vulnerable to this particular attack, only the CPU is.

As you can see here impacted hardware is all CPU side, you can also read about how the proposed attacks work.

https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/spectre.html

[–] 9tr6gyp3@lemmy.world 3 points 2 days ago* (last edited 2 days ago)

Forgive me. Just trying to understand. How does the kernel flag NEO_DISABLE_MITIGATIONS have any affect on the CPU? Seems to be targeted towards OpenCL and Level Zero, which are APIs to access GPU hardware directly.

[–] catloaf@lemm.ee 4 points 2 days ago (1 children)

Or if you run untrusted code. Including code that might be susceptible to a compromised developer or a supply chain attack.

[–] possiblylinux127@lemmy.zip 1 points 2 days ago

Or you use a web browser

[–] bjoern_tantau@swg-empire.de 4 points 2 days ago (1 children)

I read in another comment about this that the safeguards in the kernel would still remain. The hardware just wouldn't do it by itself.

[–] 9tr6gyp3@lemmy.world 2 points 2 days ago

The kernel mitigations would be for the CPU, not the GPU.

[–] hedgehog@ttrpg.network 15 points 2 days ago

One thing Ubuntu users should know is that the change will only provide performance boosts when GPUs are handling workloads running the OpenCL framework or the OneAPI Level Zerointerface. That likely means that people using games and similar apps will see no benefit.

Why is Ubuntu actually dying now?

[–] deadcatbounce@reddthat.com -1 points 1 day ago

Think of all that money that they could have saved by even looking for those security issues once reported.

Fuck you Ubuntu people, typical crap corporate move. Is it even not opt-in?