Just in case anyone's still stuck with the SBAT issue on the Linux systems and can't easily disable secure boot for whatever reason - boot a live Fedora image, open a terminal, run
sudo mokutil --set-sbat-policy delete
and reboot. shim should now clear the sbat policy and you're back in business. Don't allow Windows Update to run again until things are sorted.
If you need help trying to figure out what version of Node, Ruby, Postgres, Redis, Elasticsearch, Libvips, FFmpeg, ImageMagick you need to upgrade your Mastodon instance you can always check out https://www.mastoreqs.com in addition to reading through the release notes of the new version.
@raggi Hmm…
So one option would be to create Documents/rust/async-guidelines.rs and document pre-existing usage patterns in Linux. I think it would be better try not to over-engineer the document. One example would documenting async itself. It is probably the best idea to keep it compact and punctual.
All you need to do then is just modifying the existing guidelines and adding sometimes completely new guidelines based on the patches.
Now, if I send a Rust patch with some async code, it will now be less likely to be against maintainers expectations. That results less noise in the mailing list, and patches landing more quickly. Or that’s I’d see it.
Way more important benefit would be that async would be “existentially” sealed to the kernel ecosystem early on.
I think this just like basic governance and risk management, not IMHO a big deal :-)
PolkaVM is based on RVI20U64, which is a RISC-V profile lacking machine (M) and supervisor (S). The ALU of RVI20U64 has 47 opcodes in total.
I also noted FENCE and FENCE.I are in the profile. Are they useful for a single core CPU package?
Does this architecture have pmpcfg*
registers? It would not make any possible sense to me so I’m only sanity checking here.
Here's a fascinating look at the first IBM PC 5150, from my friend David who wrote the training documentation.