According to #GeekBench, a brand new computer similarly specced (relative to contemporary systems) to my 10 year old laptop is only 2.5X faster (single core) than my ten-year-old laptop.
Uhh... why upgrade??
@RL_Dane I wish it wasn't this way. I'd love the ability to switch vulnerable processor optimizations on and off, per-process, if possible. So I can choose between speed and security. Is it a thing?
@golemwire
Dunno!
Vulnerabilities:
Itlb multihit: KVM: Mitigation: VMX disabled
L1tf: Mitigation; PTE Inversion; VMX conditional cache flushes, SMT vulnerable
Mds: Mitigation; Clear CPU buffers; SMT vulnerable
Meltdown: Mitigation; PTI
Mmio stale data: Not affected
Retbleed: Not affected
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl
...
@golemwire
...
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Mitigation; Retpolines, IBPB conditional, IBRS_FW, STIBP conditional, RS
B filling
Srbds: Vulnerable: No microcode
Tsx async abort: Not affected
@RL_Dane And this is a 10-year-old laptop? Better than I would have thought. (I don't know what Srbds is though)
I'm too sleepy to actually try to mentally parse it ;)
Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Spectre v2: Mitigation; Enhanced IBRS, IBPB conditional, RSB filling, PBRSB-eIBRS SW sequence
Srbds: Mitigation; Microcode
Tsx async abort: Not affected
[2/2]