Jump to content

Call Depth Tracking with Linux 6.2 on Skylake cpu's


abarbarian

Recommended Posts

Linux 6.2 Performance Option Helps Extend The Longevity Of Intel Skylake Era PCs

 

Quote

One of the new features introduced with Linux 6.2 is Call Depth Tracking and it can help extend the useful service life of Intel Skylake through Coffeelake era processors in providing better performance than is otherwise found out-of-the-box on Linux.

 

Quote

Call Depth Tracking was merged for Linux 6.2 and needs the "CALL_DEPTH_TRACKING" Kconfig build option enabled. Additionally, it's not used by default unless the "retbleed=stuff" option is passed to the kernel when booting the system.

 

Arch linux has the "CALL_DEPTH_TRACKING" Kconfig build option enabled. It shows up on my pc " Retbleed:Mitigation; IBRS ".

 

 Put brain in gear before pressing enter11:16:29-->Thu Feb 02-->~
-->lscpu
Architecture:            x86_64
  CPU op-mode(s):        32-bit, 64-bit
  Address sizes:         39 bits physical, 48 bits virtual
  Byte Order:            Little Endian
CPU(s):                  8
  On-line CPU(s) list:   0-7
Vendor ID:               GenuineIntel
  Model name:            Intel(R) Core(TM) i7-6700K CPU @ 4.00GHz
Vulnerabilities:         
  Itlb multihit:         KVM: Mitigation: VMX disabled
  L1tf:                  Mitigation; PTE Inversion; VMX conditional cache flushe
                         s, SMT vulnerable
  Mds:                   Mitigation; Clear CPU buffers; SMT vulnerable
  Meltdown:              Mitigation; PTI
  Mmio stale data:       Mitigation; Clear CPU buffers; SMT vulnerable
  Retbleed:              Mitigation; IBRS
  Spec store bypass:     Mitigation; Speculative Store Bypass disabled via prctl
  Spectre v1:            Mitigation; usercopy/swapgs barriers and __user pointer
                          sanitization
  Spectre v2:            Mitigation; IBRS, IBPB conditional, RSB filling, PBRSB-
                         eIBRS Not affected

 

Am I correct in thinking that I can add " retbleed=stuff " to my boot loader like so ?

 

Quote

"Boot using default options" "root=PARTUUID=eb3de75a-01c4-4821-9de5-65d233f3154e  retbleed=stuff  rw initrd=intel-ucode.img  initrd=initramfs-%v.img"

 

More info on Retbleed

 

🤔

Edited by abarbarian
  • Like 1
Link to comment
Share on other sites

On 2/2/2023 at 9:49 PM, securitybreach said:

Sorry, I have no clue but it might work. May as well try it..

 

 

Well as far as I can see it is a kernel boot option so I think I have it in the right place. Can not seem to find any information on how to test before and after to see if it does make a difference though. 😎

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...