this post was submitted on 25 Jun 2025
104 points (100.0% liked)

Linux

11450 readers
193 users here now

Welcome to c/linux!

Welcome to our thriving Linux community! Whether you're a seasoned Linux enthusiast or just starting your journey, we're excited to have you here. Explore, learn, and collaborate with like-minded individuals who share a passion for open-source software and the endless possibilities it offers. Together, let's dive into the world of Linux and embrace the power of freedom, customization, and innovation. Enjoy your stay and feel free to join the vibrant discussions that await you!

Rules:

  1. Stay on topic: Posts and discussions should be related to Linux, open source software, and related technologies.

  2. Be respectful: Treat fellow community members with respect and courtesy.

  3. Quality over quantity: Share informative and thought-provoking content.

  4. No spam or self-promotion: Avoid excessive self-promotion or spamming.

  5. No NSFW adult content

  6. Follow general lemmy guidelines.

founded 2 years ago
MODERATORS
top 12 comments
sorted by: hot top controversial new old
[–] 9tr6gyp3@lemmy.world 25 points 1 day ago (3 children)

This is fine for single user systems. If your system allows more than 1 users, this is probably not something you want to do.

[–] oce@jlai.lu 18 points 1 day ago (1 children)

The point is the Linux Kernel is covering the same security mitigations which make the CPU level ones redundant. If all users are using the Linux Kernel, why would it be an issue?

[–] 9tr6gyp3@lemmy.world 9 points 1 day ago* (last edited 1 day ago) (1 children)

Depends on how you use your system if you have multiple users. CPU mitigations wont protect GPU workloads, and vice versa. If your CPU was mitigating GPU workloads, that would probably be a massive performance loss.

[–] Cypher@lemmy.world 11 points 1 day ago* (last edited 1 day ago) (1 children)

That’s not how this works.

The vulnerability is all on the CPU side. The GPU workloads being referenced are only vulnerable on the CPU instruction set used to pass workloads to the GPU.

Talking about CPU and GPU workloads as entirely separate in this context is misleading as the vulnerability is with CPU code execution that passes tasks to the GPU.

The GPU is not vulnerable to this particular attack, only the CPU is.

As you can see here impacted hardware is all CPU side, you can also read about how the proposed attacks work.

https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/spectre.html

[–] 9tr6gyp3@lemmy.world 3 points 1 day ago* (last edited 1 day ago)

Forgive me. Just trying to understand. How does the kernel flag NEO_DISABLE_MITIGATIONS have any affect on the CPU? Seems to be targeted towards OpenCL and Level Zero, which are APIs to access GPU hardware directly.

[–] catloaf@lemm.ee 5 points 1 day ago (1 children)

Or if you run untrusted code. Including code that might be susceptible to a compromised developer or a supply chain attack.

[–] possiblylinux127@lemmy.zip 1 points 1 day ago

Or you use a web browser

[–] bjoern_tantau@swg-empire.de 4 points 1 day ago (1 children)

I read in another comment about this that the safeguards in the kernel would still remain. The hardware just wouldn't do it by itself.

[–] 9tr6gyp3@lemmy.world 2 points 1 day ago

The kernel mitigations would be for the CPU, not the GPU.

[–] hedgehog@ttrpg.network 15 points 1 day ago

One thing Ubuntu users should know is that the change will only provide performance boosts when GPUs are handling workloads running the OpenCL framework or the OneAPI Level Zerointerface. That likely means that people using games and similar apps will see no benefit.

[–] deadcatbounce@reddthat.com -1 points 20 hours ago

Think of all that money that they could have saved by even looking for those security issues once reported.

Fuck you Ubuntu people, typical crap corporate move. Is it even not opt-in?

Why is Ubuntu actually dying now?