This is great, but the context is that this is for specific inner loops, and it is compared to the C version of that specific inner loop. Typically what was used before this on a computer with avx512 was the avx2 version of the inner loop, and the speedup compared to that version appears to be up to 60%: https://x.com/FFmpeg/status/1852542388851601913 . Then as not a specific inner loop isn’t run all the time, the speedup is probably much less than 60%. This is still sizeable, but the actual speedup in practice with this implementation is far far from 94x.
Yeah 7000-series Ryzen benefits from the avx512 code paths in ffmpeg. I’ve benchmarked a 5900x vs a 7900x specifically for software H.265 decoding and there was a sizeable difference.
Ah, so they don’t actually say that they read kernel space. They check the version of all installed packages and checksum the installed DLLs/SOs.
If the user still has root privileges, this may still not prevent sideloading of kernel modules. Even if it would detect a kernel module that has been sideloaded, I believe it’s possible to write a kernel module that will still be resident after you unload it. This kernel module can then basically do anything without the knowledge of userspace. It could for example easily replace any code running in userspace, and their anticheat would miss that as it doesn’t actually check what code is currently running. Most simply, code could be injected that skips the anticheat.
Of course, in their model, if a user isn’t given root privileges it seems much harder to do anything, then probably the first thing you’d want to look for is a privilege escalation attack to obtain root privileges. This might not be that hard if they for example run Xorg as it isn’t known to be the most secure - there’s a reason there’s a strong recommendation to not run any graphical UI on servers.
Another way if you don’t have root is to simply run the code on a system that does but that does have such a kernel module - or perhaps modify the binary itself to skip the anticheat. I don’t see anything preventing that in their scheme.
I’m having a hard time understanding how this would work. udev will load kernel modules depending on your hardware, and these modules run in kernel space. Is there an assumption that a kernel module can’t cheat? Or do they have a checksum for each possible kernel module that can be loaded?
Also, how do they read the kernel space code? Userspace can’t do this afaik. Do they load a custom kernel module to do this? Who says it can’t just be replaced with a module that returns the “right” checksum?
It will say “Dallas DS1287 REAL TIME” and be unusually thick for being a DIP chip.
I just remembered, there’s a third possibility for replacement if this is the problem - the nwx287, a hobbyist-made replacement chip that has a cr2032 holder.
Then the cmos battery is probably in a Dallas DS1287 or similar chip. There are hacks to replace the battery itself with a CR2032 holder, but it requires drilling into the chip.
I bought a DS12887+ to replace it, and socketed it in case it would need replacement again in the future (in another 30 years? :)). But if you want to go this route look up what chip is compatible with the exact one you have.
No, the reason it doesn’t work is that IDE to USB adapters don’t support pre-LBA HDDs. These old disks are all CHS-addressed.
I wanted to take images of such disks. I ended up managing to boot an ancient version of Knoppix from a CD (just booting it was a nightmare) and then using dd_rescue to clone it to a file on a CF card connected vi a CF-to-IDE adapter.
Edit: oh, drive powers off when usb is connected? Might be that the adapter doesn’t offer enough power, but if you could get around this you would inevitably run into the problem I describe above.
For example, maybe branching is something you’d like to be able to do without it being a nightmare?
Services are automatically restarted. There is no automatic reboot by default, but that can be enabled if you really want to. Otherwise it’ll keep track of whether a reboot is necessary or not.
I’ve been running Debian stable with unattended-upgrades on servers for years and have had no issues whatsoever.
As somehow living in that region of Sweden, that was my first thought!
Forskarna räddar världen med spiddekauga!
That joke has aged like milk
Not really, they allowed him to run as he’s a nutjob and thought nobody would vote for him, while retaining an illusion of that all sides are available for election. He’s been described as an Iranian Trump. Then surprised pikachu this reformist nutjob gets elected. This is going to be an interesting run.
Ah yes, of course husband is included, I forgot the obvious one :) oh, and siblings should be included too.
Yes, to be specific, according to the Quran women can wear whatever in the presence of “mahram” (close relatives), meaning, parents, grandparents, kids and grandkids iirc.
In Iran, the mahram part is rarely enforced so in practice women can wear whatever inside private homes, no matter the relationship to those present.
Recently, women in Iran are pushing back against the Islamic clothing rules in public and step by step bending the rules. Now, what you actually need to wear vary wildly depending on exactly where in Iran you happen to be. In some parts, typically rich parts of bigger cities, it’s in practice tolerated to wear almost western-style clothing at the moment.
I’m tired of this kind of post, as it shows what a minority of society did in the 70’s, it also simplifies women rights issues in Iran to simply clothing. Although it is a prominent part, there’s much more to it. Things like that in court, a male witness is worth two female witnesses, and men inherit twice as much as women. Rape and sexual harassment is considered the fault of the women for dressing immodestly.
Of course it could be taken today. It looks like it’s taken inside a private home. The clothing laws concern public places.
I expected some resolution or motivation for everything that had occurred, instead we got “God did it”.
Ah right. Sorry for the bothering.