• 0 Posts
  • 60 Comments
Joined 3 months ago
cake
Cake day: June 23rd, 2024

help-circle

  • I, a systems guy, have a better time learning go than nix packages.

    Go is a simple and elegant imperative language (that does come with its downsides); Nix the DSL is a functional language which requires a different way of thinking. Systems usually are operated imperatively, so it’s normal that you’d find it easier.

    It’s not an easy language at all and one might ask if another one wouldn’t do the job better, which is what Guix System kind of explores, but its (nix) design goals make a lot of sense.





  • A good first approximation.

    So where in this setup would you mount a network share? Or am additional hard drive for storage? The latter is neither removable nor temporary. Also /run is quite more than what this makes it seem (e.g. user mounts can be located there), there is practically only one system path for executables (/usr/bin)…

    Not saying that the graphic is inherently wrong or bad, but one shouldn’t think it’s the end all be all.




  • The only hint at the other topic I see is this:

    (not even considering some hostile emails that I recently received from the upstream developer or his public rants on lkml and reddit)

    I guess this is about https://www.reddit.com/r/bcachefs/comments/1em2vzf/psa_avoid_debian/, and while I think the title is too broad, the actual message is

    If you’re running bcachefs, you’ll want to be on a more modern distro - or building bcachefs-tools yourself.

    I don’t consider Kent’s reasoning (also further down the thread) a rant - it might not be the most diplomatic, but he’s not the only one who has problems with Debian’s processes. The xscreensaver developer is another one for similar reasons.

    I think, in fairness, bcachefs and Debian currently aren’t a good fit. bcachefs is also in the kernel so users can rest it and report, but it wasn’t meant to be stable; it’s meant to not lose data unrecoverably.

    Anyhow, while I think that he’s also not the easiest person on the LKML, I don’t consider him ranting there; and with the author’s and my judgement differing in these points, I’m led to believe that we might also disagree on what qualifies as hostile.

    Lastly, while I’m not a big fan of how Rust packaging works, it ensures that the program is built exactly the same on the developer’s and other machines (for users and distributors); it is somewhat ironic to see Debian complain about it, since they do understand the importance of reproducibility.

    You must have missed the last half of the post then. Especially the last two paragraphs.

    There’s isn’t much more to that issue than that sentence, while all other paragraphs cover the packaging. It’s tangential at best.


  • The OP is about packaging issues with userspace utilities due to version pinning in Rust. It’s an issue with Rust in general. Kent is not obligated to lock dependencies in any particular fashion. He could loosen the dependencies, but there is no obligation, and Debian has no obligation to package it.

    This is different from the thread you linked in which the bcachefs kernel code and the submission process is discussed, and on which there was a thread here as well in the last days. But your criticism, as valid as it is, only applies there, not in a thread about tooling packaging issue.




  • Laser@feddit.orgtoLinux@lemmy.mlvkd3d 1.13 Released
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    13 days ago

    Maybe not, but doesn’t really answer my question what this would be used for.

    I’m not hating, just interested; my last knowledge was that if you wanted to play Direct3D 12 games, you’d need the proton fork. But I don’t know many other things Direct3D is used for, so…





  • Microsoft, by default, decides which code is safe to run, yes.

    However, that’s not the only way to use Secure Boot; I enroll my own certificates in addition to Microsoft’s, allowing code that I sign to be booted into. This requires some UEFI setup once.

    For most machines, Secure Boot should never lock you out completely; you can always disable it, fix your boot chain and reenable.

    I think it’s actually sensible technology, but as every security feature, it usually comes at the cost of some convenience.




  • Some extensions won’t matter in the slightest, especially concerning controllers that use the instruction set. For the vendors selling general purpose CPUs, we’ll see how it shakes out. It’s in their interest to retain compatibility, so I suppose it’ll be similar to how it’s handled for Vulkan: vendors having their own extensions that at one point get merged into a common de facto standard for general purpose computing or something.