Linux kernel has merged patches to protect RISC-V processors against Spectre V1 microarchitectural attacks. The fix addresses branch predictor poisoning vulnerabilities in out-of-order RISC-V cores by implementing array_index_nospec() to clamp syscall indices after bounds checking, matching existing protections already deployed on x86_64 and ARM64 architectures. This demonstrates that RISC-V processors face similar speculative execution vulnerabilities as other modern CPU architectures.

1m read timeFrom phoronix.com
Post cover image

Sort: