Hello. I would like to note, that "Meltdown" mitigation - for i386
architecture - among others improvements, is already available in
OpenBSD 6.4 release (see "Security improvements" section [in:]
https://www.openbsd.org/64.html).

Best regards.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1790688

Title:
  x86/pti: 32-bit x86 systems support already available.

Status in linux package in Ubuntu:
  Triaged

Bug description:
  Hello.

  This is a very good news: 'PTI' support for x86-32 architecture is
  available. Linux kernel v4.19 release candidate, finally have Kernel
  Page-Table Isolation ('PTI', previously known as 'KAISER') support. As
  we know, 'PTI' provides protection against attack, known as the
  "Meltdown" (CVE-2017-5754), that breaks isolation between user
  applications and the operating system etc. However, this protection -
  needed for "Meltdown" mitigation - wasn't available on 32-bit x86
  systems. Until now.

  So, I would like to ask a question: are there any plans to backport
  Kernel Page-Table Isolation patches for Linux kernels available in
  "Trusty"/14.04, "Xenial"/16.04 and "Bionic"/18.04 releases etc.? I'm
  asking, because it seems, that pretty much no developers run 32-bit
  any more. However, there still are many 32-bit users out there.

  For more informations about how 'PTI' was implemented, created for 32
  bit x86 architecture, please check - for example - commit
  '7757d607c6b31' ("x86/pti: Allow CONFIG_PAGE_TABLE_ISOLATION for
  x86_32") and these messages on lkml mailing list and lwn.net website
  (which contains summary of the first half of the 4.19 kernel merge
  window):

  ✗ http://lkml.iu.edu/hypermail/linux/kernel/1807.2/02790.html ('PTI' on 
x86-32; PATCH v.8)
  ✗ https://lwn.net/Articles/762566/ (See "Architecture-specific" changes)

  I would like to send a big "Thank You" to Mr Joerg Roedel (and Others,
  of course) for his amazing work - a whole raft of measures and patches
  to make this possible - to enable 'PTI' mitigation on x86-32
  architecture etc.

  Thanks, best regards.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1790688/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to