

Yeah, it’s almost certainly a VM.


Yeah, it’s almost certainly a VM.


I always wait until it’s at least 300%, 400%, 800% off. Just like my prescription drug prices.


That is correct, the fix targets the AMDGPU kernel driver so nvidia users will have to wait/implement it ourselves.


Yeah, exactly. If they ever try anything you can just fork from just before that update.
While they play nice, their contributions are welcome and improve software for everyone.
If you’re using Mullvad as your VPN Tailscale supports it right out of the box. You could use Tailscale only and use Mullvad’s VPN as an exit node. This is probably the easiest and most out-of-the-box ready solution.


It’s on the AUR but you need a patched kernel which you can grab from catchyOS
Instructions are in the developer’s blog post: https://pixelcluster.github.io/VRAM-Mgmt-fixed/
Q: I use another Arch-based distro! What now?
The
dmemcg-boosterandplasma-foreground-boosterutilities are available in the AUR as well (plasma-foreground-booster carries the package nameplasma-foreground-booster-dmemcg), so you can install them from there.For the kernel side, you can either use the CachyOS kernel package on a non-CachyOS system by retrieving the package from their repository, or you can compile your own kernel. Installing
linux-dmemcgfrom the AUR will compile the development branch I used to develop this. Being a development branch, this carries the risk of some stuff being broken, so install at your own risk!If you want to apply the kernel patches yourself, you need these six .patch files: [links in blog]
I’m not sure how easily they apply on specific kernel versions, but feel free to leave a comment if you run into issues and I’ll try to help out.


Lots of for-profit commercial entities contribute to open source projects.
The code they’re contributing is covered by the same license as the code contributed by volunteer developers.
I understand why we should be cautious about these things, but the current situation is that Valve is contributing a lot and their contributions are open source. Yeah, they’re doing it for a profit motive, but not to the point where they’re trying to kill open source projects or hide the updates behind proprietary binaries.
Valve is, currently, not being evil. GabeN has plenty of yacht money.
May as well get some more mileage out of docker and install pi-hole too.
What if you’re away from home and want to play, certainly a situation resolved by a mesh VPN like tailscale (or self-host headscale).
etc.etc.etc
Yeah, setup a pi-hole container/server to do DHCP and disable it on your router. The documentation should cover it, but you have to use network_mode: host in order for it to do DHCP.
You can then add an A record entry for your Immich server’s domain name pointing to the LAN IP and so any device on your LAN will resolve its domain to the LAN IP.
You also get pi-hole DNS filtering/adblock and, probably, a larger DNS cache than what the router provides.
On your LAN DNS server (say, pi-hole), you could add an A record for your Immich’s domain name that points to the internal IP address so clients on your LAN would simply resolve the LAN IP instead of trying to do fancy NATing. Make sure your browser doesn’t try to do DNS over HTTPS, which would skip your local dns.
Or you could run everything on a meshVPN like Tailnet. That way the (VPN) IP of the Immich server doesn’t change and the Tailnet will route the traffic over your LAN when your clients are local.


Depends on the program, they don’t use system libraries so if they have a lot of dependencies then they’ll be larger.
An example:
Steam Flatpak: 35MB
Steam pacman: 19MB
On one hand, it’s only a few MB. On the other hand, it’s 54% larger.
Flatpaks can also depend on other flatpaks. For example, graphics card support requires about 1-1.5GB of flatpak dependencies even though your system already has graphics card drivers.


Tailscale and Rustdesk are my go to for family PCs.


If you could you could be a Psythlete


Physical exercises, physical sports, or physical games.
shaming the idiots
solidarity is required
Your team building tactics could use some work.
-An idiot


eAthlete would probably fit better.
Since Athlete means
One who participates in physical exercise or sports, especially in competitive events.
One possessing the requisite strength, agility, and endurance for success in sports.


What is the security hole in systemd?
You haven’t answered this.
systemd-tmpfiles exists to delete inactive files in /tmp. That’s not a security flaw, that’s system maintenance. It’s the documented purpose of systemd-tmpfiles and it performs exactly was documented.
The security hole is in snap-confine which does not verify that its own directory is owned by root before mounting it AS ROOT. That’s the security hole.
So, again, what is the security hole in systemd-tmpfiles?
If you don’t have an answer then just say so. Resorting to name calling and trying to frame this as if I’m the irrational one is absurd.


There is no systemd flaw here.
snap-confine creates /tmp/.snap owned by root.
systemd-tmpfiles can delete this directory because it also has root privileges. It will do so if the directory is inactive for, by default, 30 days. Files can be excluded from this by adding a .conf file to /etc/tmpfiles.d/, snap-confine does not do this.
Because the files are not excluded they will be deleted. systemd-tmpfiles can do this because it is running as root.
Once they are deleted a USER can recreate /tmp/.snap with malicious code.
snap-confine never verifies that the directory is owned by root, and performs its security checks before its privileged file operations, creating a race window. Because snap-confine is setuid root, it then bind-mounts files from the attacker-controlled /tmp/.snap into the snap sandbox’s filesystem, allowing an attacker to execute arbitrary code as root.
What is the systemd-tmpfiles flaw? It does exactly what it is supposed to do, and it provides a means to exclude directories from its process. snap doesn’t configure systemd to ignore the directories and it doesn’t perform appropriate checks on the directory’s ownership.
I’d also add:
Sometimes you just want to send someone a random file without needing to create an account for them and walking them through installing an app. You can use Filebrowser to generate a link that they can access to browse that specific file/directory without credentials. You can set these links to timeout after minutes/hours/days/never.
Useful to have a link to all of your services in a portable and shareable form. Very customizable and useful for most homelab assets.