pastebin - collaborative debugging tool
rovema.kpaste.net RSS


Disable Spectre mitigations to improve latency
Posted by Anonymous on Fri 5th Nov 2021 09:40
raw | new post
view followups (newest first): Disable Spectre mitigations to improve latency by Anonymous

  1. # apt-get install intel-microcode
  2. ...
  3.  
  4. # cat /sys/devices/system/cpu/vulnerabilities/*
  5. KVM: Mitigation: VMX disabled
  6. Mitigation: PTE Inversion; VMX: conditional cache flushes, SMT disabled
  7. Mitigation: Clear CPU buffers; SMT disabled
  8. Mitigation: PTI
  9. Mitigation: Speculative Store Bypass disabled via prctl and seccomp
  10. Mitigation: usercopy/swapgs barriers and __user pointer sanitization
  11. Mitigation: Full generic retpoline, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling
  12. Mitigation: Microcode
  13. Not affected
  14.  
  15.  
  16. # diff -u /etc/default/grub.original /etc/default/grub
  17. --- /etc/default/grub.original  2021-11-05 10:22:24.093178208 +0100
  18. +++ /etc/default/grub   2021-11-05 10:25:07.332995434 +0100
  19. @@ -6,8 +6,8 @@
  20.  GRUB_DEFAULT=0
  21.  GRUB_TIMEOUT=5
  22.  GRUB_DISTRIBUTOR=`lsb_release -i -s 2> /dev/null || echo Debian`
  23. -GRUB_CMDLINE_LINUX_DEFAULT="quiet"
  24. -GRUB_CMDLINE_LINUX=""
  25. +GRUB_CMDLINE_LINUX_DEFAULT="quiet mitigations=off"
  26. +GRUB_CMDLINE_LINUX="mitigations=off"
  27.  
  28.  # Uncomment to enable BadRAM filtering, modify to suit your needs
  29.  # This works with Linux (no patch required) and with any kernel that obtains
  30. # update-grub
  31. Generating grub configuration file ...
  32. Found background image: /usr/share/images/desktop-base/desktop-grub.png
  33. Found linux image: /boot/vmlinuz-5.10.0-8-rt-686-pae
  34. Found initrd image: /boot/initrd.img-5.10.0-8-rt-686-pae
  35. Found linux image: /boot/vmlinuz-5.10.0-8-686-pae
  36. Found initrd image: /boot/initrd.img-5.10.0-8-686-pae
  37. done
  38.  
  39. # reboot
  40.  
  41. # cat /sys/devices/system/cpu/vulnerabilities/*
  42. KVM: Mitigation: VMX disabled
  43. Mitigation: PTE Inversion; VMX: vulnerable, SMT disabled
  44. Vulnerable; SMT disabled
  45. Vulnerable
  46. Vulnerable
  47. Vulnerable: __user pointer sanitization and usercopy barriers only; no swapgs barriers
  48. Vulnerable, IBPB: disabled, STIBP: disabled
  49. Vulnerable
  50. Not affected

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at