Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you look here: https://www.computerbase.de/2018-01/intel-cpu-pti-sicherheit... (Sorry it is German)

But if you scroll down to "Windows-Benchmarks: Anwendungen" you can see that most applications do not have any performance hit with the Windows patch.

Only M.2 SSD seem to be affected.



All their tests are CPU-bound, not IO-bound, namely -- archiving, rendering, encoding video. Performance degradation happens with transactional, IO-bound tasks (think noSQL databases, ad serving, trading)


It is possible Microsoft has mitigated the issue in a way that has much lesser performance impact. Maybe they had a highly tuned feature to enable kernel page separation already coded but disabled. I won't be surprised if even the Linux implementation is tuned to the absolute limit in the coming months.


> I won't be surprised if even the Linux implementation is tuned to the absolute limit in the coming months.

To me, this sounds like unnecessary work if Intel is coming up with a microcode patch within a few months.


I think so too. It also seems the Linux version right now is in a "get it to work, optimize later" state.


If you know how to materially optimize it, I'm all ears.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: