Show Your Support: This site is primarily supported by advertisements. Ads are what have allowed this site to be maintained on a daily basis for the past 18+ years. We do our best to ensure only clean, relevant ads are shown, when any nasty ads are detected, we work to remove them ASAP. If you would like to view the site without ads while still supporting our work, please consider our ad-free Phoronix Premium.
AMD Sends Out Linux Kernel Patches To Allow Disabling Predictive Store Forwarding (PSF)
Hitting the Linux kernel mailing list today were the five patches for mitigating Predictive Store Forwarding if desired. With a patched kernel, PSF remains on by default but can be disabled via the Spectre V4 mitigation control or by setting the nopsfd kernel parameter boot option to just force off this feature. Again, this is only relevant for Zen 3 (and presumably future) CPUs.
AMD doesn't believe there is much real-world security risk but for those concerned the option is available. My initial PSF benchmarking found minimal performance impact when disabling it. Ongoing tests have shown no measurable difference outside of some long-running database workloads where even there was just 1~2% or less. So overall the exposure seems to be quite minimal even if you want to disable it.
The AMD PSF patches out now for public review can be found on the kernel mailing list.