The Surprising Spectre BHI Mitigation Performance Impact On Meteor Lake
- Reference: 0001605662
- News link: https://www.phoronix.com/review/spectre-bhi-meteor-lake
- Source link:
[3]
Previously I hadn't looked at the Spectre BHI impact on Meteor Lake due to my never-ending benchmarking list and workload. When the vulnerability and microcode plus kernel mitigations debuted, there were [4]~12% database performance hits on affected hardware though some kernel improvements made since to help offset some of the costs.
In this article is looking at the Intel Core Ultra "Meteor Lake" performance with the default mitigations compared to running the same kernel with the "spectre_bhi=off" option set to just disable Spectre BHI. All the other CPU security mitigations relevant to Meteor Lake remained in place with this benchmarking just toggling the Spectre BHI mitigation from BHI_DIS_S to off. The BHI_DIS_S indirect predictor control is used to overwrite the branch history to prevent predicted targets of indirect branches executed from CPL0 through CPL2 from being selected based on the branch history of branches executed from CPL3.
The same Intel Core Ultra 7 155H Meteor Lake laptop was used for all of this benchmarking with the only difference between the two runs is booting with spectre_bhi=off.
[1] https://www.phoronix.com/review/intel-meteor-lake-2025
[2] https://www.phoronix.com/search/Spectre+BHI
[3] https://www.phoronix.com/image-viewer.php?id=spectre-bhi-meteor-lake&image=spectre_bhi_lrg
[4] https://www.phoronix.com/news/Linux-BHI-Fix-Server-Perf