省流:Neoverse V2
Google Axion Processors – Arm-based CPUs designed for the data center https://cloud.google.com/blog/products/compute/introducing-googles-new-arm-based-cpu/
Chips and Cheese
Intel’s Ambitious Meteor Lake iGPU
#ChipAndCheese
Telegraph | source
(author: clamchowder)
Intel’s Ambitious Meteor Lake iGPU
#ChipAndCheese
Telegraph | source
(author: clamchowder)
Arch Linux: Recent news updates
Increasing the default vm.max_map_count value
The vm.max_map_count paramater will be increased from the default
This change should help address performance, crash or start-up issues for a number of memory intensive applications, particularly for (but not limited to) some Windows games played through Wine/Steam Proton. Overall, end users should have a smoother experience out of the box with no expressed concerns about potential downsides in the related proposal on arch-dev-public mailing list.
This
Before upgrading, in case you are already setting your own value for that parameter in a
source
(author: Robin Candau)
Increasing the default vm.max_map_count value
The vm.max_map_count paramater will be increased from the default
65530 value to 1048576.This change should help address performance, crash or start-up issues for a number of memory intensive applications, particularly for (but not limited to) some Windows games played through Wine/Steam Proton. Overall, end users should have a smoother experience out of the box with no expressed concerns about potential downsides in the related proposal on arch-dev-public mailing list.
This
vm.max_map_count increase is introduced in the 2024.04.07-1 release of the filesystem package and will be effective right after the upgrade.Before upgrading, in case you are already setting your own value for that parameter in a
sysctl.d configuration file, either remove it (to switch to the new default value) or make sure your configuration file will be read with a higher priority than the /usr/lib/sysctl.d/10-arch.conf file (to supersede the new default value).source
(author: Robin Candau)
杰哥的{运维,编程,调板子}小笔记
开发一个链接器(3)
前言
这个系列的前两篇博客实现了一个简单的静态链接器,它可以输入若干个 ELF .o 文件,输出 ELF 可执行文件。接下来,我们进一步支持动态库:输入若干个 ELF .o 文件,输出 ELF 动态库。
source
开发一个链接器(3)
前言
这个系列的前两篇博客实现了一个简单的静态链接器,它可以输入若干个 ELF .o 文件,输出 ELF 可执行文件。接下来,我们进一步支持动态库:输入若干个 ELF .o 文件,输出 ELF 动态库。
source
唉原来王羽佳都已经37岁了,怪不得看起来老了。想当年第一次看到王羽佳的演奏还是在这个古代视频
https://b23.tv/o6E1gtH
https://b23.tv/o6E1gtH
Chips and Cheese
Inside Control Data Corporation’s CDC 6600
#ChipAndCheese
Telegraph | source
(author: clamchowder)
Inside Control Data Corporation’s CDC 6600
#ChipAndCheese
Telegraph | source
(author: clamchowder)
Harry Chen’s Blog
在 Linux 6.6 上使用 Intel DG1 GPU 加速视频编解码
Telegraph | source
(author: Shengqi Chen ([email protected]))
在 Linux 6.6 上使用 Intel DG1 GPU 加速视频编解码
Telegraph | source
(author: Shengqi Chen ([email protected]))
本频道温馨提醒:若遇到疑似诈骗可拨打反诈咨询电话 96110 咨询。若发现上当受骗,请注意及时保存好相关证据,并第一时间拨打 110 报警。
杰哥的{运维,编程,调板子}小笔记
开发一个链接器(2)
前言
这个系列的第一篇博客实现了一个最简单的静态链接器,它可以输入单个 ELF .o 文件,输出 ELF 可执行文件。接下来,我们需要把它升级到支持输入两个或者更多的 ELF .o 文件。
source
开发一个链接器(2)
前言
这个系列的第一篇博客实现了一个最简单的静态链接器,它可以输入单个 ELF .o 文件,输出 ELF 可执行文件。接下来,我们需要把它升级到支持输入两个或者更多的 ELF .o 文件。
source
Arch Linux: Recent news updates
The xz package has been backdoored
TL;DR: Upgrade your systems and container images now!
As many of you may have already read 1, the upstream release tarballs for
This vulnerability is tracked in the Arch Linux security tracker 2.
The
The following release artifacts contain the compromised
● installation medium
● virtual machine images
● container images created between and including 2024-02-24 and 2024-03-28
The affected release artifacts have been removed from our mirrors.
We strongly advise against using affected release artifacts and instead downloading what is currently available as latest version!
Upgrading the system
It is strongly advised to do a full system upgrade right away if your system currently has
Upgrading container images
To figure out if you are using an affected container image, use either
or
depending on whether you use
Any Arch Linux container image older than
Run either
or
to upgrade affected container images to the most recent version.
Afterwards make sure to rebuild any container images based on the affected versions and also inspect any running containers!
Regarding sshd authentication bypass/code execution
From the upstream report 1:
However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way. This is because other yet-to-be discovered methods to exploit the backdoor could exist.
source
(author: David Runge)
The xz package has been backdoored
TL;DR: Upgrade your systems and container images now!
As many of you may have already read 1, the upstream release tarballs for
xz in version 5.6.0 and 5.6.1 contain malicious code which adds a backdoor.This vulnerability is tracked in the Arch Linux security tracker 2.
The
xz packages prior to version 5.6.1-2 (specifically 5.6.0-1 and 5.6.1-1) contain this backdoor.The following release artifacts contain the compromised
xz:● installation medium
2024.03.01● virtual machine images
20240301.218094 and 20240315.221711● container images created between and including 2024-02-24 and 2024-03-28
The affected release artifacts have been removed from our mirrors.
We strongly advise against using affected release artifacts and instead downloading what is currently available as latest version!
Upgrading the system
It is strongly advised to do a full system upgrade right away if your system currently has
xz version 5.6.0-1 or 5.6.1-1 installed:pacman -SyuUpgrading container images
To figure out if you are using an affected container image, use either
podman image history archlinux/archlinuxor
docker image history archlinux/archlinuxdepending on whether you use
podman or docker.Any Arch Linux container image older than
2024-03-29 and younger than 2024-02-24 is affected.Run either
podman image pull archlinux/archlinuxor
docker image pull archlinux/archlinuxto upgrade affected container images to the most recent version.
Afterwards make sure to rebuild any container images based on the affected versions and also inspect any running containers!
Regarding sshd authentication bypass/code execution
From the upstream report 1:
openssh does not directly use liblzma. However debian and several other distributions patch openssh to support systemd notification, and libsystemd does depend on lzma.Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:
ldd "$(command -v sshd)"However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way. This is because other yet-to-be discovered methods to exploit the backdoor could exist.
source
(author: David Runge)
“我发表了论文/专利/软著,我有过良好的科研训练”:我对论文的标准是 “教会你的大/小专家同行一些不 trivial 的事情”。据我近年观察,大部分申请者发表的论文都是减分项。相比于发表了 “错误” 论文或是在大创项目里学会了一本正经胡说八道的同学,我更偏好能耐心读论文和写代码的 “一张有潜力的白纸”。科学研究是脚踏实地的,前人所做到的 (内卷程度) 可能远比你想象得要大,认真读了 3-4 年博士依然没有论文的也大有人在,完全不必急功近利。
“我现在还不太会,但我会努力学习”:很遗憾,无论导师是否尽职尽责,研究生总体来说还是带有交易的成分。一方面,无论你的导师给你画了多大的饼,用 “给导师劳动” 换取 “导师的指导” 都是在所难免的。另一方面,我更希望导师和学生站在平等的合作者位置,并且我非常喜欢能够据理力争挑战我观点的学生。我们期望我们的同学在对计算机世界的认识、阅读、写作方面没有明显的短板,例如知道世界顶级名校名课 (包括研究生课) 的水准并能跟上。