svn commit: r328625 - in head/sys: amd64/amd64 amd64/ia32 amd64/include dev/cpuctl i386/i386 x86/include x86/x86

Rodney W. Grimes freebsd at pdx.rh.CN85.dnsmgr.net
Wed Jan 31 18:05:18 UTC 2018


> On Wed, Jan 31, 2018 at 02:56:24PM +0000, Bjoern A. Zeeb wrote:
> > On 31 Jan 2018, at 14:36, Konstantin Belousov wrote:
> > 
> > > Author: kib
> > > Date: Wed Jan 31 14:36:27 2018
> > > New Revision: 328625
> > > URL: https://svnweb.freebsd.org/changeset/base/328625
> > >
> > > Log:
> > >   IBRS support, AKA Spectre hardware mitigation.
> > 
> > >   For existing processors, you need a microcode update which adds IBRS
> > >   CPU features, and to manually enable it by setting the 
> > > tunable/sysctl
> > >   hw.ibrs_disable to 0.  Current status can be checked in sysctl
> > >   hw.ibrs_active.  The mitigation might be inactive if the CPU feature
> > 
> > Can you change the tunable/sysctl to hw.ibrs_enable[d] (and toggle the 
> > default setting along).
> This is done consistently with the hw.clflush_disable.
> Anyway, the intent is that the knob will be used for disabling,
> since defaults are going to be changed in the near future.

I thought we had something some place that said negative assertions
should be avoided if possible.  

> > I find it highly confusing to have two different sysctls ???disable??? 
> > and ???active??? and a lot
> > of people (and cultures) have trouble with the double negative.
> > Also the ???enable[d]??? variant seems to be pre-dominant in the kernel.
> > 
> > Also can we spell IBRS in the sysctl description as ???Indirect Branch 
> > Restricted Speculation (IBRS)????
> Will do in half a hour.


-- 
Rod Grimes                                                 rgrimes at freebsd.org


More information about the svn-src-all mailing list