A recent round of fixes for another Spectre varient that got backported into linux 1.19 and reverted in 1.20, then revised, and finally a new version written caused major CPU slowdowns but was not reported to balloon memory use. The revised code fixed most of the performance issues by limiting the change to security-sensitive code rather than all code.
Much about this on phoronix.com On 12/5/2018 at 11:26 PM, "Ralf Mardorf" <[email protected]> wrote: > >On Wed, 5 Dec 2018 14:27:15 -0500, Mike Squires wrote: >>I wonder if it might have something to do with the security >updates >>for the various problems like Spectre. > >You could disable those mitigations, but they unlikely cause that >kind >or performance issue. > >Read this thread, IOW this request and _all_ follow-ups: >https://lists.ubuntu.com/archives/ubuntu-users/2018- >November/295911.html > >Especially care about >https://lists.ubuntu.com/archives/ubuntu-users/2018- >November/295924.html. > >-- >ubuntu-studio-devel mailing list >[email protected] >Modify settings or unsubscribe at: >https://lists.ubuntu.com/mailman/listinfo/ubuntu-studio-devel -- ubuntu-studio-devel mailing list [email protected] Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-studio-devel
