

…kinda wanna try Bl00pyGameRzX now
…kinda wanna try Bl00pyGameRzX now
Wait, are they not releasing it on Sega Genesis? It’s called Return To Genesis.
Edit: reading helps:
developed for the Genesis / Mega Drive and is running Steam under emulation – isn’t due to be released on Sega’s 16-bit console until next year
Why? Mint has a reasonable upgrade path.
The poster’s avatar is a drawing of a mouse: absolute fact
I run archosaur btw
The Undertaker threw Mankind off hell of the cell
I always assumed it was an irc slash command
I got distracted. At first glance, it seems that PR was for the groundworks, I haven’t been able to figure out how to actually do it. I’ll try again in a bit.
WAIT, if I’m reading this right, it’s had code folding since last year: https://github.com/zyedidia/micro/pull/2942
I’m gonna try this right now
There’s got to be a Micro plug-in for this.
I found an Irix theme for Plasma but it didn’t work. I’m running a CDE theme in the mean time. I’m especially impressed by all the little details.
Look. I want to believe you. I do.
What.
I assumed the same thing.
Package managers are great.
You’ve been hearing about Snaps specifically.
I installed Arch on my daily driver because I wanted a challenge.
It’s too dependable, even when updating every other day and installing a bunch of nonsense from the AUR. Where’s my challenge?
Ah yes, the “extended Berkeley Packet Filter”.
Wikipedia:
eBPF is a technology that can run programs in a privileged context such as the operating system kernel.
Hornet uses a similar signature verification scheme similar to that of kernel modules. A pkcs#7 signature is appended to the end of an executable file. During an invocation of bpf_prog_load, the signature is fetched from the current task’s executable file. That signature is used to verify the integrity of the bpf instructions and maps which where passed into the kernel. Additionally, Hornet implicitly trusts any programs which where loaded from inside kernel rather than userspace, which allows BPF_PRELOAD programs along with outputs for BPF_SYSCALL programs to run.
So this is to make kernel-level instructions from userspace (something that’s already happening) more secure.
The thread linked by the OP is Jarkko Sakkinen (kernel maintainer) seemingly saying “show your work, your patch is full of nonsense” in a patch submitted for review to the Linux kernel.
Edit: the OP has edited the link, it used to point to this comment in the mailing list chain.
Ok now somebody do “It’s some kind of shellfish”