- Joined
- Mar 23, 2016
- Messages
- 4,839 (1.63/day)
Processor | Ryzen 9 5900X |
---|---|
Motherboard | MSI B450 Tomahawk ATX |
Cooling | Cooler Master Hyper 212 Black Edition |
Memory | VENGEANCE LPX 2 x 16GB DDR4-3600 C18 OCed 3800 |
Video Card(s) | XFX Speedster SWFT309 AMD Radeon RX 6700 XT CORE Gaming |
Storage | 970 EVO NVMe M.2 500 GB, 870 QVO 1 TB |
Display(s) | Samsung 28” 4K monitor |
Case | Phantek Eclipse P400S (PH-EC416PS) |
Audio Device(s) | EVGA NU Audio |
Power Supply | EVGA 850 BQ |
Mouse | SteelSeries Rival 310 |
Keyboard | Logitech G G413 Silver |
Software | Windows 10 Professional 64-bit v22H2 |
Quoting this from the source link at the bottom of my post.
Source: Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems
In general, our experience is that Variant 1 and Variant 3 mitigations have minimal performance impact, while Variant 2 remediation, including OS and microcode, has a performance impact.
Performance impact summary:
For context, on newer CPUs such as on Skylake and beyond, Intel has refined the instructions used to disable branch speculation to be more specific to indirect branches, reducing the overall performance penalty of the Spectre mitigation.
- With Windows 10 on newer silicon (2016-era PCs with Skylake, Kabylake or newer CPU), benchmarks show single-digit slowdowns, but we don’t expect most users to notice a change because these percentages are reflected in milliseconds.
- With Windows 10 on older silicon (2015-era PCs with Haswell or older CPU), some benchmarks show more significant slowdowns, and we expect that some users will notice a decrease in system performance.
- With Windows 8 and Windows 7 on older silicon (2015-era PCs with Haswell or older CPU), we expect most users to notice a decrease in system performance.
- Windows Server on any silicon, especially in any IO-intensive application, shows a more significant performance impact when you enable the mitigations to isolate untrusted code within a Windows Server instance. This is why you want to be careful to evaluate the risk of untrusted code for each Windows Server instance, and balance the security versus performance trade-off for your environment.
Source: Understanding the performance impact of Spectre and Meltdown mitigations on Windows Systems