[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20230813093502.GBZNijxgueFxBTxWwG@fat_crate.local>
Date: Sun, 13 Aug 2023 11:35:02 +0200
From: Borislav Petkov <bp@...en8.de>
To: Mikhail Gavrilov <mikhail.v.gavrilov@...il.com>
Cc: Linux List Kernel Mailing <linux-kernel@...r.kernel.org>,
x86@...nel.org
Subject: Re: [regression/bisected] Add IBPB decreases performance in two times
On Sun, Aug 13, 2023 at 02:17:25PM +0500, Mikhail Gavrilov wrote:
> > spec_rstack_overflow=off
>
> Thanks, I checked this and it works!
Right, so you have Zen4 and it already uses the default mitigation and
no IBPB is mitigating retbleed because Zen4 is not affected. (If
retbleed mitigates with IBPB, that is also the SRSO mitigation but this
is not the case for your machine).
So yeah, I guess disabling the mitigation is one option.
Another could be if you supply:
spectre_v2_user=on spec_rstack_overflow=microcode
on the kernel command line after upgrading your microcode. That would at
least take care of protecting one user process from another.
There's no microcode for your machine yet, AFAICT, but you could still
try the above to see whether that mitigation type is better than no
mitigation at all wrt gameplay.
As to the microcode, I guess you'll get it with a BIOS update according
to:
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html
the table cell about 7000 series.
HTH.
--
Regards/Gruss,
Boris.
https://people.kernel.org/tglx/notes-about-netiquette
Powered by blists - more mailing lists