- Aug 30, 2012
- 6,598
Full Test Testing Windows 10 Performance Before and After the Meltdown Flaw Emergency Patch
Conclusion, so far
Well, there you have it. Desktop users have little to worry about in terms of performance loss, particularly gamers. We've yet to test older CPUs, but given the type of workloads we’re seeing impacted by the patch, I don’t think there’s going to be an issue with any desktop hardware, but we’ll certainly report back if there is.
The reduction in 4K read performance for high-speed NVMe drives is a concern and while this shouldn’t impact any games, any application that is sensitive to this might show a reduction in performance. Of course, the brief list of applications I tested showed no real reduction in the performance period.
The issue nonetheless remains and is one that has a far bigger potential in affecting servers. It's a serious concern for data centers both on the side of performance and more importantly, security. That's not our area of expertise or interest, so we'll leave that testing to those better equipped to tackle it.
The IT world was caught by surprise this week when it was disclosed that nearly every processor sold in the last 20+ years powering all forms of computers could be exploited due to two major hardware flaws (read our 'what you need to know' article). Discovered last year by Google’s Project Zero team, manufacturers have been investigating and working on a fix for months, although the public just came to know about this now.
Because of the nature of Meltdown and Spectre, the patches have to come at the OS level, and there's a possibility of performance loss. On the upside for consumers, desktop computing and gaming may not be as affected as other intensive tasks more commonly seen in server and database applications.
Based on the information received so far, we know most Intel CPUs are affected, but this issue also extends to select ARM architectures, while AMD appears to be mostly in the clear. There are three variants of the exploit and AMD is vulnerable to the “Bounds Check Bypass” method but this can be solved via an OS update and should come at an insignificant performance cost. The other two variants reportedly don't impact AMD processors due to differences in their architectural design.
Linux is one of the operating systems that had received an update addressing the exploit before it was disclosed and tech site Phoronix benchmarked performance before and after. They found some pretty crippling performance down turn on server related tests using a Core i7-8700K with a Samsung 950 PRO NVMe storage device. They followed up with a Linux gaming test that looked at half a dozen titles and mostly found the difference was within the margin of error.
Conclusion, so far
Well, there you have it. Desktop users have little to worry about in terms of performance loss, particularly gamers. We've yet to test older CPUs, but given the type of workloads we’re seeing impacted by the patch, I don’t think there’s going to be an issue with any desktop hardware, but we’ll certainly report back if there is.
The reduction in 4K read performance for high-speed NVMe drives is a concern and while this shouldn’t impact any games, any application that is sensitive to this might show a reduction in performance. Of course, the brief list of applications I tested showed no real reduction in the performance period.
The issue nonetheless remains and is one that has a far bigger potential in affecting servers. It's a serious concern for data centers both on the side of performance and more importantly, security. That's not our area of expertise or interest, so we'll leave that testing to those better equipped to tackle it.