Bug 15056 - Kernel Spectre mitigations should be disableable
Summary: Kernel Spectre mitigations should be disableable
Status: NEW
Alias: None
Product: Samba 4.1 and newer
Classification: Unclassified
Component: Other (show other bugs)
Version: 4.16.0
Hardware: All All
: P5 enhancement (vote)
Target Milestone: ---
Assignee: Samba QA Contact
QA Contact: Samba QA Contact
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2022-04-29 10:18 UTC by Björn Jacke
Modified: 2022-04-29 13:02 UTC (History)
2 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Björn Jacke 2022-04-29 10:18:19 UTC
The Kernel mitigations for CPU flaws like Spectre can slow down I/O operations noticably. The mitigations are however only required on systems, where users can log on via a shell and execude code. On servers, where user shells are not possible, it would be accaptable to disable the mitigations to regain the full performance. Linux has a way to disable the mitidations via prctl(2). A smb.conf option to disable the mitigations for our procecesses would be nice. See also https://www.phoronix.com/scan.php?page=news_item&px=Linux-PR_SPEC_DISABLE_NOEXEC