Last week I published benchmark results of using Intel AES-NI for Ubuntu home directory encryption, but the benefits of using this new x86 instruction set found on the latest Intel and AMD (as of today's Bulldozer launch) processors was minimal for this eCryptfs-based solution. Continuing in the AES-NI investigation under Linux, today are benchmark results when using AES-NI for full-disk encryption with dmcrypt.
Though, if you have the choice, dmcrypt is always preferable to eCryptFS. It's slightly faster, less buggy due to a simpler design, and will also encrypt meta information like filenames, so your attacker won't see whether there's a folder named ~/goat_porn/ with 179489 files in it, or that just yesterday you've worked on job_application_to_$competitor.odt
Anyway, if you're using a laptop storing confidential or private information, encrypting your home partition is well worth it. Not so much on a single-user desktop - it'll only protect against someone gaining physical access to the hard drive, not against remote attacks on a system where the encrypted drive is mounted and accessible.
yes, git can give you a list of every commit which includes a change containing a given string - so any commit which added, deleted or modified a string containing AES_NI_INTEL in the above case. git for life!