Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


benchmark software (Spectre/Meltdown, performance impacts after patching)

  • Please log in to reply
No replies to this topic

#1 LASERzzzzzz


  • Members
  • 47 posts
  • Gender:Male
  • Location:Europe/Germany
  • Local time:05:52 PM

Posted 09 January 2018 - 07:26 PM

I'd like to take a look at the performance of my machines before and after patching the spectre/meltdown vulnerability.

...sorry have absolutely no idea about this kind of software... :)

Currently running two gaming laptops (i7, GTX 970M and GTX860M, both with SSDs, Win7 and Win8.1) and an older/average laptop (i5, GT540M, Win7). The performance after patching seems to be a problem:


source: https://cloudblogs.microsoft.com/microsoftsecure/2018/01/09/understanding-the-performance-impact-of-spectre-and-meltdown-mitigations-on-windows-systems/


Here is the summary of what we have found so far:

  • With Windows 10 on newer silicon (2016-era PCs with Skylake, Kabylake or newer CPU), benchmarks show single-digit slowdowns, but we don’t expect most users to notice a change because these percentages are reflected in milliseconds.
  • With Windows 10 on older silicon (2015-era PCs with Haswell or older CPU), some benchmarks show more significant slowdowns, and we expect that some users will notice a decrease in system performance.
  • With Windows 8 and Windows 7 on older silicon (2015-era PCs with Haswell or older CPU), we expect most users to notice a decrease in system performance.
  • Windows Server on any silicon, especially in any IO-intensive application, shows a more significant performance impact when you enable the mitigations to isolate untrusted code within a Windows Server instance. This is why you want to be careful to evaluate the risk of untrusted code for each Windows Server instance, and balance the security versus performance tradeoff for your environment.


thx a lot and greets from europe/germany!

Edited by LASERzzzzzz, 09 January 2018 - 07:31 PM.

....i dont like CHAOS but CHAOS likes me! ....live from EUROPE/germany !!! ....live from EUROPE/germany !!!

BC AdBot (Login to Remove)


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users