Announcement

Collapse
No announcement yet.

Benchmarking The Performance Impact Of Speculative Store Bypass Disable For Spectre V4 On Intel Core i7

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Benchmarking The Performance Impact Of Speculative Store Bypass Disable For Spectre V4 On Intel Core i7

    Phoronix: Benchmarking The Performance Impact Of Speculative Store Bypass Disable For Spectre V4 On Intel Core i7

    In late May Spectre V4 was made public and coinciding with the public reveal was the Linux kernel patches for the Speculative Store Bypass Disable (SSBD) mode for mitigating this latest side-channel attack. For SSBD on Intel CPUs, updated microcode is required and those patched microcode files are now being delivered down through new BIOS updates from motherboard vendors. In recent days with seeing ASUS motherboards get the updated supported, I decided to run some initial Core i7 Coffeelake benchmarks with/without the SSBD support being enabled in the Linux kernel.

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    Please test on older 'commodity' hardware (CPUs) and sum it up. (Here 10%, there 10%, etc...)
    Thanks!

    Comment


    • #3
      Does "vulnerable" include previous Spectre and Meltdown patches, or does that mean before all patches? Because if this is the former, that's actually quite a significant performance loss, when you account for all the other performance losses of the other patches.

      Comment


      • #4
        Originally posted by schmidtbag View Post
        Does "vulnerable" include previous Spectre and Meltdown patches, or does that mean before all patches? Because if this is the former, that's actually quite a significant performance loss, when you account for all the other performance losses of the other patches.
        From the system table:

        Vulnerable: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW Protection
        SSBD On: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW + SSB disabled Protection


        Only SSBD is being toggled in this article, the others left at their defaults.
        Michael Larabel
        https://www.michaellarabel.com/

        Comment


        • #5
          Originally posted by Michael View Post
          Vulnerable: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW Protection
          SSBD On: KPTI + __user pointer sanitization + Full generic retpoline IBPB IBRS_FW + SSB disabled Protection
          Is there a reference with all of these Spectre/Meltdown patches disabled? On a home/gaming system I'd rather have the performance than a few patches that are essentially nonsense for my situation.

          Comment


          • #6
            Originally posted by Ehvis View Post

            Is there a reference with all of these Spectre/Meltdown patches disabled? On a home/gaming system I'd rather have the performance than a few patches that are essentially nonsense for my situation.
            Yes some from 4.15~4.16 https://www.phoronix.com/scan.php?page=search&q=KPTI
            Michael Larabel
            https://www.michaellarabel.com/

            Comment


            • #7
              Sad that all these side channel and speculative execution vulnerability patches add up to a fairly notable loss of performance across various workloads when combined all together. Maybe time to look at CPU overclocking to help offset the losses.

              Comment

              Working...
              X