Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Boot parameters (side channel mitigations) #29

Open
2 of 3 tasks
mmisono opened this issue Nov 23, 2023 · 1 comment
Open
2 of 3 tasks

Boot parameters (side channel mitigations) #29

mmisono opened this issue Nov 23, 2023 · 1 comment
Labels

Comments

@mmisono
Copy link
Member

mmisono commented Nov 23, 2023

Linux has several side channel mitigations (KPTI, spectre, L1F, ...). We should enable appropriate ones.

TODO

  • List available mitigation
  • Check Linux's default configuration
  • Determine which one should be enabled for evaluation
@mmisono
Copy link
Member Author

mmisono commented Nov 23, 2023

I think the default behavior is

 mitigations=
[...]
                        auto (default)
                                Mitigate all CPU vulnerabilities, but leave SMT
                                enabled, even if it's vulnerable.  This is for
                                users who don't want to be surprised by SMT
                                getting disabled across kernel upgrades, or who
                                have other ways of avoiding SMT-based attacks.
                                Equivalent to: (default behavior)

And we disable hyperthreading in the BIOS, so the default parameter should be fine.

@mmisono mmisono added benchmark priority:high help wanted Extra attention is needed labels Nov 23, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant