Announcement

Collapse
No announcement yet.

Linux Prepares Straight Line Speculation "SLS" Mitigation For x86/x86_64 CPUs

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Linux Prepares Straight Line Speculation "SLS" Mitigation For x86/x86_64 CPUs

    Phoronix: Linux Prepares Straight Line Speculation "SLS" Mitigation For x86/x86_64 CPUs

    Last month I reported on activity around Straight Line Speculation "SLS" mitigation for x86_64 CPUs, similar to the work carried out by Arm last year on their SLS vulnerability. That work on the x86 (x86_64 inclusive) side has now been merged to GCC 12 Git and a kernel patch is expected to come shortly that will flip it on as the latest CPU security protection...

    https://www.phoronix.com/scan.php?pa...SLS-Mitigation

  • #2
    I wouldn't expect this to hurt performance. Every speculative thread that blows past an unconditional change is wrong. Terminating them early with INT3 might even free up resources in the uarch. I don't expect that blowing past the stops anyway would have much benefit as far as memory readahead goes.

    Comment

    Working...
    X