Basically, *you* need to know if:

1. your workload does a LOT of syscalls (kernel entries from userspace)
OR

2. your workload does a LOT of VMEXITs (runs on a VM) OR

3. uses Intel SGX (you're on your own in that case, go talk to Intel).

Which are directly impacted by the microcode and/or kernel changes.

You can also selectively disable KPTI/PTI, L1D flushes (L1TF
mitigation), and SSBD mitigation to track down which is not compatible
with your workload.  That *might* give enough hints on how to change
your workload to not suffer as much.

https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html

and also

https://www.kernel.org/doc/html/latest/admin-guide/kernel-parameters.html
( read the documentation for  the parameters pti=, spectre_v2=, 
spec_store_bypass_disable= )

You can disable kernel microcode updating (which will revert to the
microcode in your BIOS/UEFI) using the dis_ucode_ldr parameter on the
*bootloader* (grub, etc).  Instructions are in intel-microcode's README
file in /usr/share/doc/intel-microcode

You can just install an older version of the intel-microcode package and
reboot, if you want to switch to an earlier microcode update **provided
that your system firmware (BIOS/UEFI) does not have a newer microcode**.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789719

Title:
  severe performance issue after intel-microcode update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1789719/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to