Originally posted by droste
View Post
Announcement
Collapse
No announcement yet.
DragonFlyBSD's Meltdown Fix Causing More Slowdowns Than Linux
Collapse
X
-
-
The real slowdown comes after applying the Intel KPTI OS patch and the new Intel Microcode that goes along with it which makes the branch predictor in Intel CPU's significantly less aggressive. Techspot shows that the combination of the two has a more significant impact on system performance (gaming included): https://www.techspot.com/article/1556-meltdown-and-spectre-cpu-performance-windows/
Michael, the new Intel microcode should be available from Asus for their 370 MB as a BIOS update.
Last edited by gururise; 07 January 2018, 08:58 PM.
Leave a comment:
-
Originally posted by garegin View PostWho cares Dragonfly is a hobby OS that’s unused in the enterprise.
I'd like to see if and how much fixing these exploits in hardware would lessen the performance gap between Intel and AMD processors. If AMD is less affected and Intel more, there should theoretically be something like close-to-parity now between newer Intel and "Zen's".
- Likes 1
Leave a comment:
-
Who cares Dragonfly is a hobby OS that’s unused in the enterprise.
- Likes 1
Leave a comment:
-
Or, you know, this stuff got really complicated over time and the time to market went down and nobody was seeing the consequences this technology introduced.
You should also make a distinction between the bug in the Intel hardware and the bug in the AMD and ARM hardware. The Intel one is the serious one with an existing exploit and this is the one causing the huge slowdowns.
I really wonder how you think a government could even do this 25 years long with so many people involved and everybody was OK with this and kept his mouth shut. There's no way to keep a secret with that many people involved over that period of time.
- Likes 2
Leave a comment:
-
Personally I can't hold any OS vendor responsible for any performance loss associated with trying to mitigate bugs in the underlying hardware. The fault needs to be laid squarely at the feet of the various hardware vendors, namely Intel, AMD, because their cpu's are also susceptible to aspects of these attack vectors, which makes sense considering they produce processors using technology licensed from Intel, ARM but not the various ARM hardware vendors because they just license the ARM technology but didn't actually develop it and NVIDIA, because the have disclosed that even their gpu's have this bug.
But this leads me to a much bigger, over arching question, if this is really the work of a certain shadowy, massive, state actor, namely the United States government.
Think about it for a second, every single cpu made in the last 25 years, from any vendor, including vendors that only make gpu's, have bugs that can be exploited, unbeknownst to the OS, to execute random code that can't be detected by conventional means, does this make any sense to anyone?
We know that there are embargoes with sharing sensitive technology with certain regimes, hell you couldn't even export Playstation 1's to certain countries, maybe these bugs are the result of a covert directive to include back doors in hardware and software to aid in hacking enemy networks; maybe this was never supposed to come to light but once the cat was out of the bag there was nothing that could be done.
Come to think of it, NVIDIA's products are probably vulnerable because they supposedly include a custom ARM based cpu integrated into the gpu.
- Likes 3
Leave a comment:
-
The current workaround probably doesn't make use of PCID, which alleviates some of the performance loss, at least on the CPU's that support it.
But not all x86 processors support it, so probably they went for the solution that's both simpler to implement and universally supported. For now.
Wasn't KAISER/KPTI worked on for Linux since at least summer?
From my googles, it would seem that PCID (more generically known as ASID) can be performant (or maybe less un-performant) on other architectures. Assuming that's true, hopefully this will motivate Intel to optimize PCID in addition to a proper fix for meltdown.
Last edited by hiryu; 07 January 2018, 06:36 PM.
Leave a comment:
-
DragonFlyBSD's Meltdown Fix Causing More Slowdowns Than Linux
Phoronix: DragonFlyBSD's Meltdown Fix Causing More Slowdowns Than Linux
Following the move by Linux to introduced Kernel Page Table Isolation (KPTI) to address the Meltdown vulnerability affecting Intel CPUs, DragonFlyBSD has implemented better user/kernel separation to address this issue. While the Linux performance hit overall was minor, in our tests carried out so far the DragonFlyBSD kernel changes are causing more widespread slowdowns.
Tags: None
Leave a comment: