Solved

processor choice in kernel config

Posted on 2002-06-06
3
217 Views
Last Modified: 2010-04-20
I am making some production kernels tuned for individual hardware platforms. I do not want a ton of kernels unless it makes sense to do so. Specifically, for a non-graphical,non-sound dedicated network application server, is there a any justification (performance/reliability) for me to make a PII, PIII and PIV kernel (all other things the same for argument sake)? I would rather just have a PII kernel to run on all if there is no difference...
0
Comment
Question by:medent
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 17

Accepted Solution

by:
psimation earned 200 total points
ID: 7061510
Obviously there are performance issues and others as well, else they wouldn't have bothered to make provision for the different CPU's now would they?
However, I believe that most of the "advantages" of compiling the kernel for a specific processor has to do with the added instruction sets for the processors, which is mainly aimed at graphics and multimedia performance enhancements,so in your case there might not be a difference...
But, to be on the safe side, compile them, and do a test to see if the advantages are significant or not... Only REAL way to tell methinks
0
 

Author Comment

by:medent
ID: 7061608
Testing performance is not a problem, but reliability is; hence the ee question. Yes I also feel I would gain nothing in my non-multimedia usage. Just looking if someone had the real low down on intel & linux. I would assume a that non-pentium (i386) would be much slower, but the pII and PIII difference??
0
 

Expert Comment

by:CleanupPing
ID: 9089018
medent:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0

Featured Post

[Webinar] How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Using 'screen' for session sharing, The Simple Edition Step 1: user starts session with command: screen Step 2: other user (logged in with same user account) connects with command: screen -x Done. Both users are connected to the same CLI sessio…
Exception Handling is in the core of any application that is able to dignify its name. In this article, I'll guide you through the process of writing a DRY (Don't Repeat Yourself) Exception Handling mechanism, using Aspect Oriented Programming.
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question