TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

AMD Ryzen 7000 Series performs better with Spectre V2 Mitigations enabled

256 点作者 ad8e超过 2 年前

9 条评论

MBCook超过 2 年前
“As for why the Ryzen 7000 series performance is actually slower if disabling the Spectre V2 mitigations, that&#x27;s likely something only AMD can effectively answer but presumably…”<p><i>Just ask!</i><p>Seriously. You can ask AMD. Maybe they won’t tell you, but <i>they might</i>. It might be really good info. Why not ask someone who is really knowledgeable about this stuff like a kernel developer who works on x86-64 or worked on the mitigations?<p>This is what I never understand about Phoronix. People link to them all the time but they run a bunch of benchmarks and then end on “there you go”. I’d like investigation into <i>why</i>. You won’t always get an answer but you should try.
评论 #33130036 未加载
评论 #33129852 未加载
评论 #33130115 未加载
评论 #33131216 未加载
评论 #33130893 未加载
Ristovski超过 2 年前
An interesting comment made in the Phoronix forums:<p>&gt; My theory is that fixing the Spectre V2 vulnerability on a hardware level would lead to fundamental architecture changes that AMD is not willing to make, because it may add so much more complexity to the architecture or it may just be too unconvenient. They probably realized that optimizing the code paths that the Linux kernel utilizes on the default mitigations mode is faster, simpler and it may involve less deeper changes, while still being secure.<p>&gt; As far as I know, pretty much every CPU architecture that implements speculative execution is vulnerable to some version of Spectre, so note that this is not a fundametal flaw of AMD64.
评论 #33128673 未加载
评论 #33128525 未加载
评论 #33129181 未加载
评论 #33128340 未加载
ZiiS超过 2 年前
This is basically just saying: the super clever AMD designers and Linux kernel developers have optimised for the setting they recomend and most people use. An insecure setting they recomend against isn&#x27;t yet well optimised on brand new hardware.
评论 #33135239 未加载
stevefan1999超过 2 年前
meh, maybe they just flush TLB every time in hardware level if you disabled the mitigations, ane disabled the hardware flush if the software side can handle it
评论 #33135246 未加载
评论 #33131415 未加载
amelius超过 2 年前
Perhaps their Spectre path has benchmark detection :)
staticassertion超过 2 年前
Interesting. I wonder if the kpti path leveraging PCID has &#x27;tipped&#x27; into a performance improvement? Maybe a larger PCID cache on the CPUs and optimized codepaths for specter-usage?
Havoc超过 2 年前
Interesting. When i first heard this I assumed it’s bad benchmarking but photonics saying same suggest otherwise
sylware超过 2 年前
this smells really bad... as it does not make a lot of sense, the devil hides in the details.
simlevesque超过 2 年前
It seems logical that if Zen 4 is immune to Spectre, the mitigations are a waste and therefore slow the CPU.
评论 #33129042 未加载