On January 2, 2018 4:56:48 PM PST, Michael Butler <i...@protected-networks.net> 
>On 01/02/18 19:20, Cy Schubert wrote:
>> This Linux commit gives us a hint.
>> https://lkml.org/lkml/2017/12//27/2
>Sadly, the articles I've read to date make no mention of which Intel
>silicon revs are vulnerable. However, the use of the PCID feature,
>is only available on more recent CPUs, does seem to afford a slightly
>lesser performance hit when completely splitting the kernel and user
>address space mappings :-(
>       imb


You can see if your cpu supports pcid using cpuinfo from ports. Then look at 
input line 0x07 in the hexdump.  Bit 0x0a of rbx will indicate if invpcid is 
available. We simply need to manipulate a copy of cr3 and reload it.

My amd gear in my basement isn't affected but my laptop is. It supports pcid 
but not invpcid.

There will be a performance hit. Looking at the Linux patch, looks like the 
workaround is optional. I would suspect not through a sysctl, that would be 

Cy Schubert
<cy.schub...@cschubeet.com> or <c...@freebsd.org>
-- small keyboard in use, apologies for typos and autocorrect --
freebsd-current@freebsd.org mailing list
To unsubscribe, send any mail to "freebsd-current-unsubscr...@freebsd.org"

Reply via email to