Just in case anyone's still stuck with the SBAT issue on the Linux systems and can't easily disable secure boot for whatever reason - boot a live Fedora image, open a terminal, run
sudo mokutil --set-sbat-policy delete
and reboot. shim should now clear the sbat policy and you're back in business. Don't allow Windows Update to run again until things are sorted.
If you need help trying to figure out what version of Node, Ruby, Postgres, Redis, Elasticsearch, Libvips, FFmpeg, ImageMagick you need to upgrade your Mastodon instance you can always check out https://www.mastoreqs.com in addition to reading through the release notes of the new version.
PolkaVM is based on RVI20U64, which is a RISC-V profile lacking machine (M) and supervisor (S). The ALU of RVI20U64 has 47 opcodes in total.
I also noted FENCE and FENCE.I are in the profile. Are they useful for a single core CPU package?
Does this architecture have pmpcfg*
registers? It would not make any possible sense to me so I’m only sanity checking here.
Here's a fascinating look at the first IBM PC 5150, from my friend David who wrote the training documentation.
I had missed that AWS discussed how they use #eBPF to implement network policies, optimize TCP performance, and reduce Lambda function cold starts.
Recording: https://youtu.be/pVJHljuz1F0
Microsoft breaking a bunch of dual-boot systems by revoking insecure versions of grub during a standard Windows update is, uh, not great and was not supposed to happen, but it's worth mentioning that systems broken by this were running known insecure bootloaders and anyone running a distro that's actually on top of security updates was unaffected
(Edit to add: I wasn't terribly clear here. It's not the user's fault if their distro fails to deal with this, it's the distro's)