Announcement
Collapse
No announcement yet.
Disabling Spectre V2 Mitigations Is What Can Impair AMD Ryzen 7000 Series Performance
Collapse
X
-
As far as I understand, Spectre V2 mitigation restricts Indirect branch speculations. Is it possible, that changes done by AMD (probably as part of hardware mitigation implementation) caused indirect branch speculation speed regression so much, that code runs much slower with indirect branch speculation enabled?
-
Originally posted by birdie View PostThere's some trickery going on, e.g. the CPU could completely discard the instructions which are meant to protect against Spectre but there are other protections in place so the vulnerability is taken care of. Amazing I'd say except this could open the door to new vulnerabilities.
- Likes 3
Leave a comment:
-
Originally posted by birdie View PostThere's some trickery going on, e.g. the CPU could completely discard the instructions which are meant to protect against Spectre but there are other protections in place so the vulnerability is taken care of. Amazing I'd say except this could open the door to new vulnerabilities.
Also, this "optimization" seems very fragile.
What if the spectre v2 migration in linux changed in the future?
Even some slight changes can shift the performance dramatically.
I do wonder whether this behavior also exhibits on windows.
If so, then the tuning might be even more sensible to changes in the kernel.
- Likes 3
Leave a comment:
-
Originally posted by ll1025 View Post
Since when did the Linux enthusiast community become security-allergic luddites?
Do you also setenforce 0 and run as root? Maybe you stick to 1024 bit RSA because it's faster? And what's with that lengthy key exchange in SSH, take us back to telnet!
It's 2022, and sentiments like yours are responsible for the massive cybercrime industry's success. Whether on Linux or Windows, this kind of "it'll never get me" attitude is exactly how they get you.
- Likes 10
Leave a comment:
-
Originally posted by Espionage724 View PostSo now instead of being able to disable mitigations and get the processor's full-performance, the mitigations are built-in, presumably causing the same impact, and now can't be disabled?
Do you also setenforce 0 and run as root? Maybe you stick to 1024 bit RSA because it's faster? And what's with that lengthy key exchange in SSH, take us back to telnet!
It's 2022, and sentiments like yours are responsible for the massive cybercrime industry's success. Whether on Linux or Windows, this kind of "it'll never get me" attitude is exactly how they get you.
- Likes 18
Leave a comment:
-
Interesting results. I suppose it's a good thing that mitigated=faster. Makes me wonder if they figured out an algorithm that makes mitigated code faster than unmitigated -- like if they know a range of stuff isn't going to be valid due to how mitigations work, just not operate or branch predict or WTF ever on that range versus the old way of doing it and tossing it aside or flushing the cache or something. Y'all get what I mean.
phoronix
Page 1:
based on the CPU MSrs and applied
return stack buffer (RSB) filling
So to curious and dig deeper,
I can't tell which one you meant for that to mean.
Page 2:
"spectre_v2=off" to disabling the
Page 3:
Including code compilation workloads were negatively
At a minimum add a comma between compilation and workloads.
- Likes 4
Leave a comment:
-
BTW mitigations=off just disable some (not all) mitigations that should slow down the system. In this case it should not disable the mitigations which won't slow down or make the system faster.
- Likes 4
Leave a comment:
Leave a comment: