Announcement

Collapse
No announcement yet.

Linux Kernel Patches Updated for x86/x86_64 SLS Mitigation

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Linux Kernel Patches Updated for x86/x86_64 SLS Mitigation

    Phoronix: Linux Kernel Patches Updated for x86/x86_64 SLS Mitigation

    With GCC 12 having added a new option to enable Straight Line Speculation "SLS" mitigation for x86/x86_64 CPUs, Linux kernel developers are preparing to enable this new compiler feature for further reducing undesirable speculation exposure...

    https://www.phoronix.com/scan.php?pa...6-SLS-Patch-Up

  • #2
    Performance?

    Comment


    • #3
      INT3? That's a debug breakpoint. I'm not nearly as knowledgeable as the people working on this mitigation, but using something like INT3 for this seems a bit hacky...

      Comment


      • #4
        Originally posted by milkylainen View Post
        Performance?
        As I understand it, it's not actually changing any code that executes, just adding dummy INT3s to prevent speculative execution of anything beyond. So there should be no performance impact.

        Comment

        Working...
        X