-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Heavy slow down in graphical applications #8
Comments
doing it didn't affect anything |
I can confirm the frame drops no matter which desktop environment i am using, i can't find any workarounds |
I have uploaded videos to proof it: Note: after slowdown, cpu usage for recording increased too but cpu usage never hit %60 or more in both situations |
output of: utku@clr-449e9b2a44f8458bb4885604dc172a1c ~ $ cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 37 model name : Intel(R) Core(TM) i3 CPU M 380 @ 2.53GHz stepping : 5 microcode : 0x4 cpu MHz : 1294.824 cache size : 3072 KB physical id : 0 siblings : 4 core id : 0 cpu cores : 2 apicid : 0 initial apicid : 0 fpu : yes fpu_exception : yes cpuid level : 11 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 popcnt lahf_lm retpoline tpr_shadow vnmi flexpriority ept vpid dtherm arat bugs : cpu_meltdown spectre_v1 spectre_v2 bogomips : 5066.80 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: processor : 1 vendor_id : GenuineIntel cpu family : 6 model : 37 model name : Intel(R) Core(TM) i3 CPU M 380 @ 2.53GHz stepping : 5 microcode : 0x4 cpu MHz : 1470.358 cache size : 3072 KB physical id : 0 siblings : 4 core id : 0 cpu cores : 2 apicid : 1 initial apicid : 1 fpu : yes fpu_exception : yes cpuid level : 11 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 popcnt lahf_lm retpoline tpr_shadow vnmi flexpriority ept vpid dtherm arat bugs : cpu_meltdown spectre_v1 spectre_v2 bogomips : 5066.80 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: processor : 2 vendor_id : GenuineIntel cpu family : 6 model : 37 model name : Intel(R) Core(TM) i3 CPU M 380 @ 2.53GHz stepping : 5 microcode : 0x4 cpu MHz : 1807.030 cache size : 3072 KB physical id : 0 siblings : 4 core id : 2 cpu cores : 2 apicid : 4 initial apicid : 4 fpu : yes fpu_exception : yes cpuid level : 11 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 popcnt lahf_lm retpoline tpr_shadow vnmi flexpriority ept vpid dtherm arat bugs : cpu_meltdown spectre_v1 spectre_v2 bogomips : 5066.80 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: processor : 3 vendor_id : GenuineIntel cpu family : 6 model : 37 model name : Intel(R) Core(TM) i3 CPU M 380 @ 2.53GHz stepping : 5 microcode : 0x4 cpu MHz : 1679.491 cache size : 3072 KB physical id : 0 siblings : 4 core id : 2 cpu cores : 2 apicid : 5 initial apicid : 5 fpu : yes fpu_exception : yes cpuid level : 11 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf pni dtes64 monitor ds_cpl vmx est tm2 ssse3 cx16 xtpr pdcm pcid sse4_1 sse4_2 popcnt lahf_lm retpoline tpr_shadow vnmi flexpriority ept vpid dtherm arat bugs : cpu_meltdown spectre_v1 spectre_v2 bogomips : 5066.80 clflush size : 64 cache_alignment : 64 address sizes : 36 bits physical, 48 bits virtual power management: I gues |
the |
utku@clr-449e9b2a44f8458bb4885604dc172a1c ~ $ cat /proc/cmdline root=PARTUUID=4b6713b2-0264-4009-b7f0-2914031f51f8 quiet modprobe.blacklist=ccipciedrv,aalbus,aalrms,aalrmc console=tty0 console=ttyS0,115200n8 init=/usr/lib/systemd/systemd-bootchart initcall_debug tsc=reliable no_timer_check noreplace-smp kvm-intel.nested=1 rootfstype=ext4,btrfs,xfs intel_iommu=igfx_off cryptomgr.notests rcupdate.rcu_expedited=1 i915.fastboot=1 rcu_nocbs=0-64 rw pti=off
seems to me i havve passed pti=off option successfully but i will try nopti too |
I have changed utku@clr-449e9b2a44f8458bb4885604dc172a1c ~ $ ls /etc/kernel/cmdline.d my.conf utku@clr-449e9b2a44f8458bb4885604dc172a1c ~ $ sudo su -c 'echo nopti > /etc/kernel/cmdline.d/my.conf; chmod 777 /etc/kernel/cmdline.d/my.conf' Password: i will reboot and see the results |
utku@clr-449e9b2a44f8458bb4885604dc172a1c ~ $ cat /proc/cmdline root=PARTUUID=4b6713b2-0264-4009-b7f0-2914031f51f8 quiet modprobe.blacklist=ccipciedrv,aalbus,aalrms,aalrmc console=tty0 console=ttyS0,115200n8 init=/usr/lib/systemd/systemd-bootchart initcall_debug tsc=reliable no_timer_check noreplace-smp kvm-intel.nested=1 rootfstype=ext4,btrfs,xfs intel_iommu=igfx_off cryptomgr.notests rcupdate.rcu_expedited=1 i915.fastboot=1 rcu_nocbs=0-64 rw nopti i did passed |
I have uploaded https://drive.google.com/open?id=1jkQCTjTWcI6q8jb4X5UO_qqO1VT-N_BJ at 3 January 2018, so that eliminates the updates before 3 January 2018 |
after adding that file you need to run 'clr-boot-manager update' to have it
update the bootloader
…On Wed, Jan 17, 2018 at 6:08 AM, tuxutku ***@***.***> wrote:
I have uploaded https://drive.google.com/open?id=1jkQCTjTWcI6q8jb4X5UO_
qqO1VT-N_BJ at 3 January 2018, so that eliminates the updates before 3
January 2018
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#8 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ABPeFdFldQgnZlvO6vefis577AgG6_liks5tLf7XgaJpZM4RdUka>
.
|
i did runned the
|
utku@clr-449e9b2a44f8458bb4885604dc172a1c ~ $ cat /proc/cmdline root=PARTUUID=4b6713b2-0264-4009-b7f0-2914031f51f8 quiet modprobe.blacklist=ccipciedrv,aalbus,aalrms,aalrmc console=tty0 console=ttyS0,115200n8 init=/usr/lib/systemd/systemd-bootchart initcall_debug tsc=reliable no_timer_check noreplace-smp kvm-intel.nested=1 rootfstype=ext4,btrfs,xfs intel_iommu=igfx_off cryptomgr.notests rcupdate.rcu_expedited=1 i915.fastboot=1 rcu_nocbs=0-64 rw nopti noibrs noibpb utku@clr-449e9b2a44f8458bb4885604dc172a1c ~ $ sudo '/home/utku/Desktop/spectre-meltdown-checker.sh' Password: Spectre and Meltdown mitigation detection tool v0.23 Checking for vulnerabilities against live running kernel Linux 4.14.13-509.native #1 SMP Sat Jan 13 15:03:45 UTC 2018 x86_64 CVE-2017-5753 [bounds check bypass] aka 'Spectre Variant 1' * Checking count of LFENCE opcodes in kernel: UNKNOWN (couldn't find your kernel image in /boot, if you used netboot, this is normal) > STATUS: UNKNOWN (impossible to check ) CVE-2017-5715 [branch target injection] aka 'Spectre Variant 2' * Mitigation 1 * Hardware (CPU microcode) support for mitigation: NO * Kernel support for IBRS: NO * IBRS enabled for Kernel space: NO * IBRS enabled for User space: NO * Mitigation 2 * Kernel compiled with retpoline option: UNKNOWN (couldn't read your kernel configuration) * Kernel compiled with a retpoline-aware compiler: NO > STATUS: VULNERABLE (IBRS hardware + kernel support OR kernel with retpoline are needed to mitigate the vulnerability) CVE-2017-5754 [rogue data cache load] aka 'Meltdown' aka 'Variant 3' * Kernel supports Page Table Isolation (PTI): NO * PTI enabled and active: NO > STATUS: VULNERABLE (PTI is needed to mitigate the vulnerability) A false sense of security is worse than no security at all, see --disclaimer I have passed |
If you're going to disable security precautions in your kernel, you are at risk of exposing yourself to the vulnerabilities that they protect against. We strongly advise against doing doing that. |
Since your original issue was about passing a kernel commandline option, which seems resolved, I'm tempted to close this issue. |
I have opened a new issue about frame drops in graphical applications: #9 |
When i was playing bombsquad, i have noticed frame drops (from stable 60 fps to 40 fps)
and happened on xonotic too (from benchmark, minimum fps was 48, now 24)
cpu and memory usage is minimal, same as before
while searching in the internet i have found https://security.stackexchange.com/questions/176624/how-do-i-check-if-kpti-is-enabled-on-linux/176654 but it didn't worked so i don't know if its enabled or not
also i found https://askubuntu.com/questions/991874/how-to-disable-page-table-isolation-to-regain-performance-lost-due-to-intel-cpu but since i don't have grub, i assume that i will need to create a file in
/etc/kernel/cmdline.d
with.conf
extension and putpti=off
line into it and reboot. I couldn't find any documentary about iti have intel core i3 i3-380M processor with integrated graphics
The text was updated successfully, but these errors were encountered: