Hacker News new | past | comments | ask | show | jobs | submit login

If you look here: https://www.computerbase.de/2018-01/intel-cpu-pti-sicherheit... (Sorry it is German)

But if you scroll down to "Windows-Benchmarks: Anwendungen" you can see that most applications do not have any performance hit with the Windows patch.

Only M.2 SSD seem to be affected.




All their tests are CPU-bound, not IO-bound, namely -- archiving, rendering, encoding video. Performance degradation happens with transactional, IO-bound tasks (think noSQL databases, ad serving, trading)


It is possible Microsoft has mitigated the issue in a way that has much lesser performance impact. Maybe they had a highly tuned feature to enable kernel page separation already coded but disabled. I won't be surprised if even the Linux implementation is tuned to the absolute limit in the coming months.


> I won't be surprised if even the Linux implementation is tuned to the absolute limit in the coming months.

To me, this sounds like unnecessary work if Intel is coming up with a microcode patch within a few months.


I think so too. It also seems the Linux version right now is in a "get it to work, optimize later" state.


If you know how to materially optimize it, I'm all ears.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: