lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CABXGCsNoNaGLsuvHLRA7aG9FCckQpnXaXWoUGvRwzfRKNB4xzA@mail.gmail.com>
Date:   Sun, 13 Aug 2023 14:17:25 +0500
From:   Mikhail Gavrilov <mikhail.v.gavrilov@...il.com>
To:     Borislav Petkov <bp@...en8.de>
Cc:     Linux List Kernel Mailing <linux-kernel@...r.kernel.org>,
        x86@...nel.org
Subject: Re: [regression/bisected] Add IBPB decreases performance in two times

On Sun, Aug 13, 2023 at 1:24 PM Borislav Petkov <bp@...en8.de> wrote:
>
> What do you have on your kernel command line?

log_buf_len=16M sysrq_always_enabled=1 nmi_watchdog=1
amdgpu.lockup_timeout=-1,-1,-1,-1 amdgpu.aspm=0
crashkernel=1G-4G:192M,4G-64G:256M,64G-:512M

> What does
>
> grep -r . /sys/devices/system/cpu/vulnerabilities/
>
> say?

Attached as [vulnerabilities.txt]

>
> Please send a full dmesg, privately is fine too.
>

Attached as [dmesg.zip]

> If the bisection points to this patch, then it sounds like you have IBPB
> enabled as SRSO mitigation which is the heaviest one.
>
> The default one - safe RET - should be a lot better.
>
> > Maybe it is possible to find another approach for solving security
> > issue without slowing down?
>
> Yeah, magic. :-)
>
> > If not, then provide an option to turn off this slowdown.
>
> spec_rstack_overflow=off

Thanks, I checked this and it works!

-- 
Best Regards,
Mike Gavrilov.

View attachment "vulnerabilities.txt" of type "text/plain" (1073 bytes)

Download attachment "dmesg.zip" of type "application/zip" (49382 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ