A recent round of fixes for another Spectre varient that got backported into
linux 1.19 and reverted in 1.20, then revised, and finally a new version written
caused major CPU slowdowns but was not reported to balloon memory use.
The revised code fixed most of the performance issues by limiting the change
to security-sensitive code rather than all code.

Much about this on phoronix.com


On 12/5/2018 at 11:26 PM, "Ralf Mardorf" <[email protected]> wrote:
>
>On Wed, 5 Dec 2018 14:27:15 -0500, Mike Squires wrote:
>>I wonder if it might have something to do with the security 
>updates
>>for the various problems like Spectre.
>
>You could disable those mitigations, but they unlikely cause that 
>kind
>or performance issue.
>
>Read this thread, IOW this request and _all_ follow-ups:
>https://lists.ubuntu.com/archives/ubuntu-users/2018-
>November/295911.html
>
>Especially care about
>https://lists.ubuntu.com/archives/ubuntu-users/2018-
>November/295924.html.
>
>-- 
>ubuntu-studio-devel mailing list
>[email protected]
>Modify settings or unsubscribe at: 
>https://lists.ubuntu.com/mailman/listinfo/ubuntu-studio-devel


-- 
ubuntu-studio-devel mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-studio-devel

Reply via email to