Home
last modified time | relevance | path

Searched hist:"80 e4c1cd42fff110bfdae8fce7ac4f22465f9664" (Results 1 – 3 of 3) sorted by relevance

/linux/arch/x86/include/asm/
H A Ddisabled-features.hdiff 80e4c1cd42fff110bfdae8fce7ac4f22465f9664 Thu Sep 15 13:11:19 CEST 2022 Thomas Gleixner <tglx@linutronix.de> x86/retbleed: Add X86_FEATURE_CALL_DEPTH

Intel SKL CPUs fall back to other predictors when the RSB underflows. The
only microcode mitigation is IBRS which is insanely expensive. It comes
with performance drops of up to 30% depending on the workload.

A way less expensive, but nevertheless horrible mitigation is to track the
call depth in software and overeagerly fill the RSB when returns underflow
the software counter.

Provide a configuration symbol and a CPU misfeature bit.

Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220915111147.056176424@infradead.org
H A Dcpufeatures.hdiff 80e4c1cd42fff110bfdae8fce7ac4f22465f9664 Thu Sep 15 13:11:19 CEST 2022 Thomas Gleixner <tglx@linutronix.de> x86/retbleed: Add X86_FEATURE_CALL_DEPTH

Intel SKL CPUs fall back to other predictors when the RSB underflows. The
only microcode mitigation is IBRS which is insanely expensive. It comes
with performance drops of up to 30% depending on the workload.

A way less expensive, but nevertheless horrible mitigation is to track the
call depth in software and overeagerly fill the RSB when returns underflow
the software counter.

Provide a configuration symbol and a CPU misfeature bit.

Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220915111147.056176424@infradead.org
/linux/arch/x86/
H A DKconfigdiff 80e4c1cd42fff110bfdae8fce7ac4f22465f9664 Thu Sep 15 13:11:19 CEST 2022 Thomas Gleixner <tglx@linutronix.de> x86/retbleed: Add X86_FEATURE_CALL_DEPTH

Intel SKL CPUs fall back to other predictors when the RSB underflows. The
only microcode mitigation is IBRS which is insanely expensive. It comes
with performance drops of up to 30% depending on the workload.

A way less expensive, but nevertheless horrible mitigation is to track the
call depth in software and overeagerly fill the RSB when returns underflow
the software counter.

Provide a configuration symbol and a CPU misfeature bit.

Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220915111147.056176424@infradead.org