Show newer

@luis_in_brief @cfiesler in this case this wasn't even adversarial testing, just testing on the typical questions that might be expected

@yossarian

What about using sources from version control instead of from released tarballs?

@delroth

It sounds like it might make sense to deny access to testdata until the build is don (i.e.in nix terms, until the normal output is fully written out), because it's easiest to hide random cruft there.

Is this something that might be semi practical to do in nixos?

@b0rk use custom work trees for any scripts that have to commit changes they make to avoid having to deal with dirty work tree and impact of untracked files on the script's behavior

@kravietz

If you already had to do countersinked holes or chamfers on all edges, is I'd appreciate knowing how you did they. (These two are examples of things that I find tedious in solvespace and would love to have a better approach to.)

@b0rk so the only way to get it back is to find the hash in terminal scroll back. Sigh...

@b0rk oh. Then I was mistaken and you can lose the thing being popped :( (I assume it doesn't get added to the global reflog?)

@b0rk huh, I must be mistaken about something because I thought that stash's reflog behaves normally. Thanks, will take a look at it when I'm next at something more computer-like than a phone.

Yet another even worse ISA fanfiction from yours truly 

@koakuma ah, so raising the stack pointer in some sense invalidates the part of the stack that's not legal to access. Thanks, that makes sense.

Yet another even worse ISA fanfiction from yours truly 

@koakuma so what's the additional weakening of the mem model here?

Yet another even worse ISA fanfiction from yours truly 

@koakuma

Aaah, I didn't realize that sign was important there.

Yet another even worse ISA fanfiction from yours truly 

@koakuma

What _would_ allow one to read writes to the same mem loc done at a different ST in this model? I'd expect function arguments to require that.

@sophieschmieg well, if I have a PRF I can make all of cryptography out of it :P

But I do mostly get the concept. Are you intentionally including handshakes of any kind in the fancy part?

@koakuma

Where does the call instruction store the return address in that model?

@koakuma the sound steam trains make when starting from stand still is like that but very low frequency (lower than can be emulated by humans).

@koakuma you mean set up things below the place where `call` will place the return address?

@b0rk

It's not obvious (and you probably already know this), but stash has its reflog, so failed pop doesn't destroy the thing you popped. Alas, it can destroy the changes in the work tree you popped onto.

robryk boosted

@brie @pluszysta no więc ja sobie czasem żegluję, i kiedyś obserwowałem śląską załogę pokazowo robiącą manewry na kotwicy.

Zwykły zestaw komend na rzucenie kotwicy to:
- Przygotować kotwicę do rzucenia!
- Kotwica do rzucenia klar!
- Kotwicę rzuć!

Ślązacy zapodali:
- Ankiel do ciepania rychtuj!
- Ankiel do ciepania klar!
- Ankiel ciep!

Zrobili mi wtedy dzień. Mi i reszcie portu. Szacun.

Show older
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.