Moonchild wrote: ↑2024-12-13, 07:50
We don't provide portable versions of Pale Moon for non-Windows operating systems. Please indicate exactly what you have been running and where you got it.
sorry im a little stupid
i clicked Downloads > Palemoon > Palemoon Portable and then scrolled up without noticing the heading
it is the "Linux 64-bit GTK3" Version from palemoon.org/download.shtml#Portable_versions
Code: Select all
uname -a
Linux goodboy 6.12.4-gnu_1 #1 SMP PREEMPT_DYNAMIC Wed Dec 11 08:50:54 CET 2024 x86_64 GNU/Linux
also i should have mentioned that i not only updated the kernel, but also used the linux libre patch
Code: Select all
lscpu
Architektur: x86_64
CPU Operationsmodus: 32-bit, 64-bit
Adressgrößen: 36 bits physical, 48 bits virtual
Byte-Reihenfolge: Little Endian
CPU(s): 4
Liste der Online-CPU(s): 0-3
Anbieterkennung: GenuineIntel
Modellname: Intel(R) Core(TM)2 Quad CPU Q9000 @ 2.00GHz
Prozessorfamilie: 6
Modell: 23
Thread(s) pro Kern: 1
Kern(e) pro Sockel: 4
Sockel: 1
Stepping: 10
Übertaktung: aktiviert
Skalierung der CPU(s): 100%
Maximale Taktfrequenz der CPU: 2001,0000
Minimale Taktfrequenz der CPU: 1600,0000
BogoMIPS: 4000,40
Markierungen: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm sse4_1 xsave lahf_lm pti tpr_shadow flexpriority vpid dtherm ida vnmi
Virtualisierung: VT-x
L1d Cache: 128 KiB (4 Instanzen)
L1i Cache: 128 KiB (4 Instanzen)
L2 Cache: 6 MiB (2 Instanzen)
NUMA-Knoten: 1
NUMA-Knoten0 CPU(s): 0-3
Schwachstelle Gather data sampling: Not affected
Schwachstelle Itlb multihit: KVM: Mitigation: Split huge pages
Schwachstelle L1tf: Mitigation; PTE Inversion; VMX EPT disabled
Schwachstelle Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
Schwachstelle Meltdown: Mitigation; PTI
Schwachstelle Mmio stale data: Unknown: No mitigations
Schwachstelle Reg file data sampling: Not affected
Schwachstelle Retbleed: Not affected
Schwachstelle Spec rstack overflow: Not affected
Schwachstelle Spec store bypass: Vulnerable
Schwachstelle Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Schwachstelle Spectre v2: Mitigation; Retpolines; STIBP disabled; RSB filling; PBRSB-eIBRS Not affected; BHI Not affected
Schwachstelle Srbds: Not affected
Schwachstelle Tsx async abort: Not affected
Architektur: x86_64
CPU Operationsmodus: 32-bit, 64-bit
Adressgrößen: 36 bits physical, 48 bits virtual
Byte-Reihenfolge: Little Endian
CPU(s): 4
Liste der Online-CPU(s): 0-3
Anbieterkennung: GenuineIntel
Modellname: Intel(R) Core(TM)2 Quad CPU Q9000 @ 2.00GHz
Prozessorfamilie: 6
Modell: 23
Thread(s) pro Kern: 1
Kern(e) pro Sockel: 4
Sockel: 1
Stepping: 10
Übertaktung: aktiviert
Skalierung der CPU(s): 100%
Maximale Taktfrequenz der CPU: 2001,0000
Minimale Taktfrequenz der CPU: 1600,0000
BogoMIPS: 4000,40
Markierungen: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good nopl cpuid aperfmperf pni dtes64 monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr pdcm sse4_1 xsave lahf_lm pti tpr_shadow flexpriority vpid dtherm ida vnmi
Virtualisierung: VT-x
L1d Cache: 128 KiB (4 Instanzen)
L1i Cache: 128 KiB (4 Instanzen)
L2 Cache: 6 MiB (2 Instanzen)
NUMA-Knoten: 1
NUMA-Knoten0 CPU(s): 0-3
Schwachstelle Gather data sampling: Not affected
Schwachstelle Itlb multihit: KVM: Mitigation: Split huge pages
Schwachstelle L1tf: Mitigation; PTE Inversion; VMX EPT disabled
Schwachstelle Mds: Vulnerable: Clear CPU buffers attempted, no microcode; SMT disabled
Schwachstelle Meltdown: Mitigation; PTI
Schwachstelle Mmio stale data: Unknown: No mitigations
Schwachstelle Reg file data sampling: Not affected
Schwachstelle Retbleed: Not affected
Schwachstelle Spec rstack overflow: Not affected
Schwachstelle Spec store bypass: Vulnerable
Schwachstelle Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Schwachstelle Spectre v2: Mitigation; Retpolines; STIBP disabled; RSB filling; PBRSB-eIBRS Not affected; BHI Not affected
Schwachstelle Srbds: Not affected
Schwachstelle Tsx async abort: Not affected
not entirely sure boot looks like you are right and my cpu is too old now