News:

Willkommen im Notebookcheck.com Forum! Hier können sie über alle unsere Artikel und allgemein über Notebook relevante Dinge disuktieren. Viel Spass!

Main Menu

Post reply

The message has the following error or errors that must be corrected before continuing:
Warning: this topic has not been posted in for at least 120 days.
Unless you're sure you want to reply, please consider starting a new topic.
Other options
Verification:
Please leave this box empty:

Shortcuts: ALT+S post or ALT+P preview

Topic summary

Posted by Lihyun
 - January 13, 2018, 19:29:53
As expected: no loss of performance in those specifically chosen benchmarks.

But mkfile(8) throughput is reduced to 33% of pre-patch performance. Search "Meltdown mkfile(8)".

Posted by Paolo
 - January 06, 2018, 02:50:54
No performance degradation because Apple since 32-bit has always used dual page tables in order to take advantage of the full addressable memory space, therefore no performance difference with the kpti patch applied.
Posted by Lihyun
 - January 06, 2018, 01:02:52
Given the nature of the exploit, the headline is wrong and does not match what Apple said. Geekbench and the other benchmarks they used should *not* show performance degradation in kernel with these mitigations. There will still be performance penalty for syscalls on XNU-based systems.
Posted by Redaktion
 - January 05, 2018, 21:56:26
With the massive vulnerabilities recently discovered in Intel CPUs, the main question on everyone's minds are when affected devices will be updated to guard against possible exploits. Apple is ahead of the game; apparently, the latest versions of their various operating systems protect against Meltdown, and a fix for Spectre is coming to Safari in the next few days. The best part? These mitigations have no perceptible effect on performance.

https://www.notebookcheck.net/Apple-devices-are-already-protected-against-Meltdown-without-any-hit-to-performance.276946.0.html