Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > comp.os.linux.misc > #70401

Cruisin' On Kernel 6.16

From Farley Flud <ff@linux.rocks>
Subject Cruisin' On Kernel 6.16
Newsgroups comp.os.linux.advocacy, comp.os.linux.misc
Followup-To comp.os.linux.advocacy
Message-Id <pan$a55e0$77ea761f$8e828e97$c1fb94ae@linux.rocks>
Date 2025-08-05 19:38 +0000
Organization UsenetExpress - www.usenetexpress.com

Cross-posted to 2 groups.

Followups directed to: comp.os.linux.advocacy

Show all headers | View raw


I configured, built, and installed kernel 6.16 today (10 minutes
total time, including Nvidia modules).

I configured the X86_NATIVE_CPU option, of course.

Do I notice a speedup?

Fuck no!  I am a human being.  I interact with the computer
though a GUI, and all GUIs are necessarily very slow.

To actually measure a performance increase I would have to compare
virtual memory allocation, context switching, I/O throughput, and
many of the other functions that the kernel performs and which
are beyond the reach of human perception.  

But, whether I can sense it or not, it is there.

Most importantly check this:

[~]# grep . /sys/devices/system/cpu/vulnerabilities/*
/sys/devices/system/cpu/vulnerabilities/gather_data_sampling:Not affected
/sys/devices/system/cpu/vulnerabilities/ghostwrite:Not affected
/sys/devices/system/cpu/vulnerabilities/indirect_target_selection:Not affected
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Processor vulnerable
/sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion
/sys/devices/system/cpu/vulnerabilities/mds:Vulnerable; SMT vulnerable
/sys/devices/system/cpu/vulnerabilities/meltdown:Vulnerable
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data:Not affected
/sys/devices/system/cpu/vulnerabilities/old_microcode:Vulnerable
/sys/devices/system/cpu/vulnerabilities/reg_file_data_sampling:Not affected
/sys/devices/system/cpu/vulnerabilities/retbleed:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Vulnerable: __user pointer sanitization and user
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable; STIBP: disabled; PBRSB-eIBRS: Not af
/sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable
/sys/devices/system/cpu/vulnerabilities/tsa:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected

Holy holies!  I am vulnerable everywhere!

The bogey men are ready to pounce.  The gremlins are poised to strike.
I am doomed to die a horrible death.

Ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha!

The security toadies cause more damage to my digital sensibilities
than any "vulnerabilty" ever will.


-- 
Systemd: solving all the problems that you never knew you had.

Back to comp.os.linux.misc | Previous | Next | Find similar


Thread

Cruisin' On Kernel 6.16 Farley Flud <ff@linux.rocks> - 2025-08-05 19:38 +0000

csiph-web