For getting an initial idea of the AMD Inception mitigation performance impact, I used an AMD EPYC 7763 (Milan / Zen 3) server running Ubuntu 22.04 LTS and using a custom kernel build as of last week, The following kernel configurations were tested:
off - No Inception mitigations. All other CPU security mitigations were at their defaults... This testing is just looking at the Inception mitigation overhead.
safe RET no microcode - The purely kernel-based mitigation while using the prior Family 19h CPU microcode without the Inception mitigation there.
safe RET - The default safe RET mode when using the newest CPU microcode.
IBPB - The alternative IBPB-based mitigation approach.
For details on these different mitigation routes, see
the kernel documentation around this Speculative Return Stack Overflow (SRSO) mitigation for Inception. The "safe RET" mode is the default mode of operation with AMD Zen processors on the Linux kernel versions patched since last week.