Search the Community
Showing results for tags 'depth tracking'.
-
Call Depth Tracking with Linux 6.2 on Skylake cpu's
abarbarian posted a topic in Bruno's All Things Linux
Linux 6.2 Performance Option Helps Extend The Longevity Of Intel Skylake Era PCs Arch linux has the "CALL_DEPTH_TRACKING" Kconfig build option enabled. It shows up on my pc " Retbleed:Mitigation; IBRS ". Put brain in gear before pressing enter11:16:29-->Thu Feb 02-->~ -->lscpu Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Address sizes: 39 bits physical, 48 bits virtual Byte Order: Little Endian CPU(s): 8 On-line CPU(s) list: 0-7 Vendor ID: GenuineIntel Model name: Intel(R) Core(TM) i7-6700K CPU @ 4.00GHz Vulnerabilities: Itlb multihit: KVM: Mitigation: VMX disabled L1tf: Mitigation; PTE Inversion; VMX conditional cache flushe s, SMT vulnerable Mds: Mitigation; Clear CPU buffers; SMT vulnerable Meltdown: Mitigation; PTI Mmio stale data: Mitigation; Clear CPU buffers; SMT vulnerable Retbleed: Mitigation; IBRS Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Spectre v2: Mitigation; IBRS, IBPB conditional, RSB filling, PBRSB- eIBRS Not affected Am I correct in thinking that I can add " retbleed=stuff " to my boot loader like so ? More info on Retbleed