gentooLTO
src
gentooLTO | src | |
---|---|---|
39 | 745 | |
573 | 3,044 | |
- | 0.8% | |
3.0 | 10.0 | |
about 2 months ago | 4 days ago | |
Shell | C | |
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
gentooLTO
-
Planning to benchmark Ubuntu vs Gentoo, what benchmarks can you recommend?
You can also go full lto, see ltoize on https://github.com/InBetweenNames/gentooLTO.
- Which distros are built with -O3 optimization?
-
Gentoo USE flag check
If you want to optimize the living shit out of Gentoo, I'd advise not just stopping at LTO and -fdevirtualize-at-ltrans and checking out GentooLTO.
-
Do You Prefer Clang or GCC
I am wondering if you prefer Clang or GCC. Which one compiles faster, and which one produces faster binaries? What are the advantages of Clang over GCC, and vice versa? I've enabled LTO optimizations for my system.
-
how can I improve my workflow further?
I unironically do that, see GentooLTO
-
My overriced Gentoo experiment: LTO + PGO + Graphite + Ccache + Portage compiling on RAM on all packages
EDIT: here you can check out it better.
-
Compiling GRUB with "mount" useflag fails
Are you using LTO? Quick google found: https://github.com/InBetweenNames/gentooLTO/issues/139
- ...
-
Bichés be like i love compiling QTwebengine.
FWIW I just based the joke off the GentooLTO project
- Any recommendations on where I can read up on pgo and lto? (Suddenly Firefox demands ...something, and I have never cared about this since I installed gentoo.)
src
-
OpenBSD Upgrade 7.3 to 7.4
The OpenBSD project released 7.4 of their OS on 16 Oct 2023 as their 55th release 💫
-
OpenBSD System-Call Pinning
Well since https://www.openbsd.org/ still says
> Only two remote holes in the default install, in a heck of a long time!
I'm assuming not, but I could always be mistaken.
- Project Bluefin: an immutable, developer-focused, Cloud-native Linux
-
From Nand to Tetris: Building a Modern Computer from First Principles
> building a cat from scratch
> That would be an interesting project.
Here is the source code of the OpenBSD implementation of cat:
> https://github.com/openbsd/src/blob/master/bin/cat/cat.c
and here of the GNU coreutils implementation:
> https://github.com/coreutils/coreutils/blob/master/src/cat.c
Thus: I don't think building a cat from scratch or creating a tutorial about that topic is particularly hard (even though the HN audience would likely be interested in it). :-)
-
OpenBSD – pinning all system calls
> I don't know how they define `MAX`, but I'm guessing it's a typical "a>b?a:b"
Indeed: https://github.com/openbsd/src/blob/master/sys/sys/param.h#L...
> Then `SYS_kbind` seems to be a signed int.
It's an untyped #define: https://github.com/openbsd/src/blob/master/sys/sys/syscall.h...
I believe your whole analysis is correct, that running an elf file with an openbsd.syscalls entry with .sysno > INT_MAX will allow an out-of-bounds write.
- Une nouvelle mise à jour de Systemd permettra à Linux de bénéficier de l'infâme "écran bleu de la mort" de Windows, mais la fonctionnalité a reçu un accueil très mitigé
-
tmux causing ANSI color-response garbage on attaching?
I can reproduce it. And this is the commit that causes the issue: https://github.com/openbsd/src/commit/d21788ce70be80e9c4ed0c52c149e01147c4a823
-
Sudo-rs' first security audit
This doesn’t really change your conclusion, but I think that’s the wrong file. This is the real doas afaict: https://github.com/openbsd/src/blob/master/usr.bin/doas/doas...
Still just a tidy 1072 lines in that folder though.
I spent 5 minutes staring at your file trying to understand how on earth it does the things in the man page, but of course it doesn’t.
-
OpenBSD: Removing syscall(2) from libc and kernel
OpenBSD developers are making serious effort to kill off indirect syscalls, the base system is completely clean, take a look at the work Andrew Fresh did to adapt Perl. He write a complete syscall "dispatcher" or emulator for the Perl syscall function so that it calls the libc stubs.
https://github.com/openbsd/src/commit/312e26c80be876012ae979...
The ports tree is also being cleansed of syscall(2) usage, until they're all gone.
msyscall, pinsyscall, recent mandatory IBT/BTI, xonly. OpenBSD is making waves, but people aren't really seeing them yet.
-
"<ESC>[31M"? ANSI Terminal security in 2023 and finding 10 CVEs
Actually, I got it wrong, too many vulnerabilities in flight. They did fix it: https://github.com/openbsd/src/commit/375ccafb2eb77de6cf240e...
What are some alternatives?
lto-overlay - [ARCHIVED] A Portage configuration for O3, Graphite, and LTO system-wide
cosmopolitan - build-once run-anywhere c library
nix-guix-gentoo - Gentoo overlay for nix and guix functional package managers.
bastille - Bastille is an open-source system for automating deployment and management of containerized applications on FreeBSD.
gentoo - [MIRROR] Official Gentoo ebuild repository
buttersink - Buttersink is like rsync for btrfs snapshots
llvm-overlay - Unofficial experimental gentoo overlay for compiling llvm with additional components
PHPT - The PHP Interpreter
gentoo-install - A gentoo installer with a TUI interface that supports systemd and OpenRC, EFI and BIOS, as well as variable disk layouts using ext4, zfs, btrfs, luks and mdraid.
Joomla! - Home of the Joomla! Content Management System
CubicSDR - Cross-Platform Software-Defined Radio Application
ctl - The C Template Library