Originally posted by davidbepo
View Post
Announcement
Collapse
No announcement yet.
Retpoline Backported To Linux 4.9, Linux 4.14 Kernels
Collapse
X
-
-
Originally posted by numacross View Post
Shouldn't it be "yesspectre_v2" instead? It's supposed to disable the anti-spectre v2 measures after allLast edited by dungeon; 15 January 2018, 04:45 PM.
Comment
-
Originally posted by -MacNuke- View PostSince Retpoline seems to be ineffective on Skylake an up (found this via Google: https://lwn.net/Articles/743019/ ), what is the connection between Google Retpoline and Intels IBRS Microcode enhancements + patches? What is merged and what not? Should someone use IBRS or Retpoline? Does the Kernel pick the right way or do I have to do something?
Eventually IBRS should be default on skylake+, with user having option to go back to retpoline.
- Likes 1
Comment
-
Originally posted by tpruzina View Post
According to intel it works, but IBRS should be a way forward (on the other hand it needs microcode update). IBRS isn't merged yet, patches are still being discussed.
Eventually IBRS should be default on skylake+, with user having option to go back to retpoline.
It's a bit more complex to deploy (you need to also change your compiler) so not everyone can easily do it, but if you can do that, it's by far the preferred method.
Comment
-
Originally posted by arjan_intel View Post
Working for Intel... Retpoline is by far the preferred method.
It's a bit more complex to deploy (you need to also change your compiler) so not everyone can easily do it, but if you can do that, it's by far the preferred method.
Edit: https://newsroom.intel.com/wp-conten...e-Channels.pdf
Was largely working with the comment
Originally posted by David Woodhouse @ LKMLLater CPUs are intended to have an 'IBRS all the time' feature which is set-and-forget, and will perform much better, I believe. If we find we're running on a CPU with that, we'll turn off the retpoline with alternatives.Last edited by Guest; 19 January 2018, 07:05 PM.
Comment
Comment