Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > comp.os.linux.misc > #70401
| From | Farley Flud <ff@linux.rocks> |
|---|---|
| Subject | Cruisin' On Kernel 6.16 |
| Newsgroups | comp.os.linux.advocacy, comp.os.linux.misc |
| Followup-To | comp.os.linux.advocacy |
| Message-Id | <pan$a55e0$77ea761f$8e828e97$c1fb94ae@linux.rocks> |
| Date | 2025-08-05 19:38 +0000 |
| Organization | UsenetExpress - www.usenetexpress.com |
Cross-posted to 2 groups.
Followups directed to: comp.os.linux.advocacy
I configured, built, and installed kernel 6.16 today (10 minutes total time, including Nvidia modules). I configured the X86_NATIVE_CPU option, of course. Do I notice a speedup? Fuck no! I am a human being. I interact with the computer though a GUI, and all GUIs are necessarily very slow. To actually measure a performance increase I would have to compare virtual memory allocation, context switching, I/O throughput, and many of the other functions that the kernel performs and which are beyond the reach of human perception. But, whether I can sense it or not, it is there. Most importantly check this: [~]# grep . /sys/devices/system/cpu/vulnerabilities/* /sys/devices/system/cpu/vulnerabilities/gather_data_sampling:Not affected /sys/devices/system/cpu/vulnerabilities/ghostwrite:Not affected /sys/devices/system/cpu/vulnerabilities/indirect_target_selection:Not affected /sys/devices/system/cpu/vulnerabilities/itlb_multihit:Processor vulnerable /sys/devices/system/cpu/vulnerabilities/l1tf:Mitigation: PTE Inversion /sys/devices/system/cpu/vulnerabilities/mds:Vulnerable; SMT vulnerable /sys/devices/system/cpu/vulnerabilities/meltdown:Vulnerable /sys/devices/system/cpu/vulnerabilities/mmio_stale_data:Not affected /sys/devices/system/cpu/vulnerabilities/old_microcode:Vulnerable /sys/devices/system/cpu/vulnerabilities/reg_file_data_sampling:Not affected /sys/devices/system/cpu/vulnerabilities/retbleed:Not affected /sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow:Not affected /sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Vulnerable /sys/devices/system/cpu/vulnerabilities/spectre_v1:Vulnerable: __user pointer sanitization and user /sys/devices/system/cpu/vulnerabilities/spectre_v2:Vulnerable; STIBP: disabled; PBRSB-eIBRS: Not af /sys/devices/system/cpu/vulnerabilities/srbds:Vulnerable /sys/devices/system/cpu/vulnerabilities/tsa:Not affected /sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected Holy holies! I am vulnerable everywhere! The bogey men are ready to pounce. The gremlins are poised to strike. I am doomed to die a horrible death. Ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha! The security toadies cause more damage to my digital sensibilities than any "vulnerabilty" ever will. -- Systemd: solving all the problems that you never knew you had.
Back to comp.os.linux.misc | Previous | Next | Find similar
Cruisin' On Kernel 6.16 Farley Flud <ff@linux.rocks> - 2025-08-05 19:38 +0000
csiph-web