Any advice on where to go from here? This console was running dmesg -w to try and catch an intermittent crash… And this is what I got. I am using an el cheapo USB wifi adapter that I’m suspicious of....
Look at the line with the asm_exc_invalid_op. That seems like a hardware fault caused by an invalid asm instruction to me. Either something wrong is being interpreted as an opcode (unlikely) or maybe the driver was compiled with extensions not available on the current machine.
OP, how old is your CPU? And how old is the nic you are using?
Edit: did you use a custom driver for the NIC? I’m looking at the Linux src and rt_mutex_schedule does not exist. Nevermind. Was checking 4.18 instead of 6.7. found it now. The bug is most likely inside a macro called preempt_disable(). Unfortunately most of the functions are pretty heavily inlined and architecture dependent so you won’t get much out of it. But it is likely any changes you made in terms of premption might also be causing the bug.
My suggestion would be to try compiling the kernel locally.its highly likely the one packaged in your distro contains extensions that you don’t have. Doing a local native compile should rule that out pretty quickly without having to disable any additional features.
I think we may be looking at these wrong. Yes there’s a visible throughput/latency improvement here but what about other factors? Power savings? Cache efficiency? CPU cycles saved for other co-running processes?
These are going to be pretty hard to measure without an x86_64 simulator. So I don’t fault them for not including such benches. But there might be more to the story here.
Why can’t y’all just make normal children’s food like chicken curry with rice? Stop putting so much sugar and corn syrup in everything.
If this continues we’ll have to retaliate: see how certain East Asian countries make pizzas and burgers and see how you like it! (PS: it was flatbread with corn and ham as the only toppings)
Oh and the original answer: since so many people have already answered soy sauce, I’d say chicken soup or pork broth.
Out of curiosity, what’s preventing someone from making a regulatory db similar to tzdb other than the lack of maintainers?
This seems like the perfect use case for something like this: ship with a reasonable default, then load a specific profile after init to further tweak PM. If regulations change you can just update a package instead of having to update the entire kernel.
So, I downloaded Lego Jurassic World on mobile as an APK. On launching the game it displayed Chinese text. On translating the text, I found out that it was Chinese Age-verification. How do I bypass this. Or do I not bypass this at all and download another version
Btw this is most likely a scam. This is the equivalent of asking for your name, DOB, and SSN on a random app you found (the ID contains both location and DOB). Even if you have an actual ID DO NOT FILL THIS OUT. Delete, purge, and move on.
So let me get this straight, you want other people to work on a project that you yourself think is a hassle to maintain for free while also expecting the same level of professionalism of a 9to5 job?
Proton Mail, the leading privacy-focused email service, is making its first foray into blockchain technology with Key Transparency, which will allow users to verify email addresses. From a report: In an interview with Fortune, CEO and founder Andy Yen made clear that although the new feature uses blockchain, the key technology...
This is solving a problem we DO have, albeit in a different way. Email is ancient, the protocol allows you to self identify as whoever you want. Let’s say I send an email from the underworld (server ip address) claiming I’m Napoleon@france (user@domain), the only reason my email is rejected is because the recipient knows Napoleon resides on the server France, not underworld. This validation is mostly done via tricky DNS hacks and a huge part of it is built on top of Google’s infrastructure. If for some reason Google decides I’m not trustworthy, then it doesn’t matter if I’m actually sending Napoleon’s mail from France, it’s gonna be recognized as spam on most servers regardless.
A decentralized chain of trust could potentially replace Google + all these DNS hacks we have in place. No central authority gets to control who is legitimate or not. Of all the bs use cases of block chain I think this one doesn’t seem that bad. It’s building a decentralized chain of trust for an existing decentralized system (email), which is exactly what “block chain” was originally designed for.
There are more places where bandwidth is a bottleneck now than 10 years ago.
NIC speeds have gone from 100Gbps to 800Gbps in the last few years while PCIe and DRAM speeds have nowhere increased that much. No way are you going to push all that data through to the CPU on time. Bandwidth is the bottleneck these days and will continue to be a huge issue for the foreseeable future.
Qualcomm brought a company named Nuvia, which are ex-Apple engineers that help designed the M series Apple silicon chips to produce Oryon which exceeds Apple’s M2 Max in single threaded benchmarks....
I grew up in a household where I was taught when cooking salty sweet dishes, you should add just enough sugar to the dish so that it tastes different but you can’t tell why. Otherwise you’ve added too much sugar.
You can definitely taste the sweet in Pineapple pizza…
Performance is basically the same (in microbenchmarks), they went as far as preserving the use of red black trees for an apples to apples comparison, but it’s going to improve security as binder runs inside every process....
Having one program (process) talk to another is dangerous. Think of a stranger trying to come over to me and deliver a message. There’s no way I can guarantee that he isn’t planning to stab me as soon as he sees me.
That’s why we have special mechanisms for programs talking to other programs. Instead of having the stranger deliver the message directly to me, our mutual friend Bob (IPC Library, binder in this case) acts as an intermediary. This way at least I can’t be “directly” stabbed.
What’s preventing the stranger from convincing Bob to stab me? Not much (except for Bob’s own ethics/programming)
To work around this, we have designed programming languages (rust) that don’t work if there’s a possibility of it being corrupted (I would add “at least superficially”, but that’s not the main topic here). Bob was trained by the CIA in anti-brainwashing techniques. It’s really hard to convince Bob to stab me. That’s why it’s such a big deal. We now have a way of delivering messages between two programs that is much safer than before.
The only problem is that the CIA anti-brainwashing techniques (rust) tend to make people slow. So we deliver messages less efficiently than before. Good news is in this case we managed to make Bob almost as fast as before, so we don’t lose our own much while gaining additional security. The people who checked on Bob even made sure to have Bob do the exact same thing as before when delivering messages (using RB Trees), hence this evidence is most likely credible.
Worked in IT, target disk mode is a life saver when you have to recover data from a laptop with a broken screen/keyboard/bad ribbon cable and don’t want to take apart something held together by glue.
Formerly pretty good free resource for academic citations now turned into a giant pile of steamy hot garbage by the incredible asswipes at Chegg, a corporate name that mostly calls forth the image of a debilitating sexually transmitted infection....
Ansible casually administering hundreds or thousands of devices (lemmy.zip)
Help w/ crash (lemmy.world)
Any advice on where to go from here? This console was running dmesg -w to try and catch an intermittent crash… And this is what I got. I am using an el cheapo USB wifi adapter that I’m suspicious of....
ifn't (programming.dev)
Benchmarking The Experimental Ubuntu x86-64-v3 Build For Greater Performance On Modern CPUs (www.phoronix.com)
Gastronomical Masterpiece (lemmy.world)
Power Management Bugs Hold Up Some Linux Laptops Due To Regulatory Requirements (www.phoronix.com)
Chinese Age-verification (lemmy.world)
So, I downloaded Lego Jurassic World on mobile as an APK. On launching the game it displayed Chinese text. On translating the text, I found out that it was Chinese Age-verification. How do I bypass this. Or do I not bypass this at all and download another version
I've been robbed! (startrek.website)
This color picker on Flathub got rated 12+
https://i.imgur.com/ZLtTL1e.png...
Proton Mail CEO Calls New Address Verification Feature 'Blockchain in a Very Pure Form' (tech.slashdot.org)
Proton Mail, the leading privacy-focused email service, is making its first foray into blockchain technology with Key Transparency, which will allow users to verify email addresses. From a report: In an interview with Fortune, CEO and founder Andy Yen made clear that although the new feature uses blockchain, the key technology...
Every goddamn time I'm trying to make something for my DnD game (lemmy.world)
CloudConvert.com might as well be my fucking home page.
Imagine Linux on an Arm SoC that benchmark better than Apple's M2 Max! (youtu.be)
Qualcomm brought a company named Nuvia, which are ex-Apple engineers that help designed the M series Apple silicon chips to produce Oryon which exceeds Apple’s M2 Max in single threaded benchmarks....
Does anybody use Thunderbird on Android a.k.a. K-9
Just recently started using thunderbird to see how it would help managing múltiple Gmail accounts. Has anybody used the app version? Is it good? Bad?
"Pineapple Pizza" by Salo_Comic (telegra.ph)
Source: Instagram - Imgsed(Use ad Blocker) - Proxigram - RSS
Binder (Android's core IPC) Rust rewrite posted to LKML (lore.kernel.org)
Performance is basically the same (in microbenchmarks), they went as far as preserving the use of red black trees for an apples to apples comparison, but it’s going to improve security as binder runs inside every process....
Systemd Working On "Storage Target Mode" Feature - Inspired By Apple macOS (lemmy.world)
Yet another win for Systemd.
bibme.org wants me to watch a sponsored message (lemmy.dbzer0.com)
Formerly pretty good free resource for academic citations now turned into a giant pile of steamy hot garbage by the incredible asswipes at Chegg, a corporate name that mostly calls forth the image of a debilitating sexually transmitted infection....
"Just Season It" by Mr.Lovenstein (telegra.ph)
Source: Mastodon - RSS...
What were we talking about again? (startrek.website)
Google Passkeys Now Offered as Default Login Option for Personal Google Accounts: How it Works | Technology News (www.gadgets360.com)