Ask yourself: do you really need a performance boost or are you just chasing the numbers to avoid a non-existant problem?
Linux
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
Everything is secure until it isn't. I'd leave it on.
The system will be secure for personal use as before.
I wouldn't be so sure of that. CPU side channels allow data to be leaked across security contexts. For example, from a user process to sandboxed JavaScript in a browser, from kernel space to user space, or from one containerized process to another. This is a problem even on a single user system without any VMs.
Many years ago when I was still doing my undergrad I had a cyber security prof talk about side channels:
”There's no way to prevent side-channels. As long as two components are sharing the same physical resource there will be side channels. The only problem is that these side channels are leaking way more bits than we expected.”
So the question here is how big does the side channel need to be to leak something sensitive from memory? Turning off mitigations will almost certainly lead to larger side channels. Whether that is worth the risk is up to you.
The short answer, as a ton of people already said in the comments of the video, is "hell no" it is not and it is most likely also not worth it. Back when the video came out I tested it (with unplugged network) on my system and the performance gain was ~1% which I'd consider well within the margin of error
Mines about 60% faster, ymmv
What workload makes that much of a difference?
Games on a 3rd gen i7
Which games?
It depends on how importent security is for that system and how devestating it would be if someone else got control over it and all accounts and devices connected to it.
Assuming there are sucessful exploits it would be like running everything as root and disabling all sandbox/isolation features from the kernel and browsers. I'd say you should not connect such a machine to the internet.
...or you could opt for other ways to improve your PC performance. For instance, using equal values for both scaling_max_freq
and scaling_min_freq
gives you a quite considerable performance boost at the expense of (almost) nothing.
Well, you lose a lot of power efficiency, this would be massively detrimental to many peoples experiences if you do this on anything battery powered like a laptop.
Eh...I see your point.
And does this still work with modern cpufreq schedulers like amd-pstate and the Intel equivalent? IIRC I couldn't simply set frequencies or select the userspace scheduler on 10th gen Intel and frequencies don't seem to be honoured by AMD pstate drivers on Zen4.
Link for the video?
As a general rule of thumb, I've been told that anything less than a 50% performance boost is hardly noticeable.
I've also heard (but ready to stand corrected) that mitigation costs only about 10% CPU (depending on the CPU).
I don't get out of bed for a 10% performance boost.