• 2 Posts
  • 522 Comments
Joined 2 years ago
cake
Cake day: July 31st, 2023

help-circle
  • Mac is very similar to Linux in that it comes with bash (these days zsh) and a lot of the command line tools you’d expect on Linux, including gcc

    No it doesn’t.

    The gcc command is a wrapper for clang, and the clang command is a stub that runs an executable used to install the “Xcode Command-Line Tools”

    It also uses the BSD coreutils, rather than the GNU coreutils present on most Linux distros. The two are only compatible up to functionality defined by the POSIX standard, and anything beyond that is an inconsistent mess.

    Windows is more difficult. The command line is very different (it inherits from DOS instead of Unix like both Mac and Linux). It doesn’t come with Python pre-installed

    If you limit yourself to not using WSL, sure. WSL 2 runs an actual Linux kernel with the same Linux executables you would find on any other distro.

    It’s still Windows and full of telemetry and AI garbage nobody wants, but it somehow manages to have better Linux compatibility than macOS.


  • Unsurprising. Drivers are better than they used to be, but some of them (Nvidia) have a long way to go in terms of optimization.

    More importantly, however, is the complete lack of info the article provides about their testing methodology.

    • They said they tested on SteamOS—ok, but it’s not officially available on non-handheld devices. How did they install it? Did they use HoloISO? Did they install the version meant for handhelds on a desktop PC?

    • How did they run the games? Directly through an embedded gamescope session like the Steam Deck, or through KDE Plasma, which has a compositor that can’t be disabled on Wayland. Or, did they take the double hit and run gamescope as a window within Plasma?

    • Speaking of Wayland, did they use Wayland or X? They have different performance characteristics, and it’s not negligible.

    • How many runs did they do? One-and-done, then record what the game said the average FPS was? Average of 5 runs? Were runs with outliers excluded and retested?

    • Did they pre-run the scenes to ensure the assets were cached from the disk and the shader caches were available? Did they restart the system between games? Did they restart the system between runs?

    And the way they present the results are also bad:

    • They graph the FPS achieved by each platform, but they have absolutely no detail about the 1% or 0.1% lows—and at a sufficiently-high average FPS, these are what make the games feel slow and stuttery.

    • What about frametime graphs and frame pacing information? If Linux can achieve more consistent pacing at 85% of the average FPS, it would still be a better experience than having the same frame being presented repeatedly because the game missed the vblank window.

    • They didn’t try multiple resolutions to identify where the bottlenecks are occuring in each game. If a game is CPU bottlenecked by their hardware choices, it’s not a good comparison of GPU performance. Likewise, if it’s GPU bottlenecked, it’s not a good comparison for CPU performance.






  • Agreed. The call trace shows it occurred as part of a drm_ function, which is related to the DRM (Direct Rendering Manager) subsystem.

    There’s a chance it might not be the root cause, but the more obvious answer is that the Nvidia driver managed to corrupt a kernel data structure.












  • Sorry to see the downvotes buddy, people are cult-ish. You aren’t wrong.

    The entire idea of Secure Boot is to verify the boot chain using signature checks to ensure that nothing “unauthorized” runs in the boot process before control is handed off to the kernel. It’s meant to stop lower bootloader stages from silently modifying or hooking later stages.

    In theory, it’s supposed to stop rootkits from being able to exist above the OS, hiding themselves while stealing information or influencing programs. In practice, there’s a shit load of badly implemented EFI programs and bootloaders that are signed and later turned out to be vectors for arbitrary code execution (this is why you need the DBX list to be updated frequently).

    Cynically, Microsoft probably came up with Secure Boot because that whole rootkit-and-fuck-with-the-kernel thing used to be one of the ways people cracked Windows 7.

    As for TPM 2.0, the whole point of it being used for anticheat is because it stores an immutable log of the Secure Boot process and attests to the integrity of the system. If I installed my own Secure Boot certificates and rootkitted Windows for the sole purpose of cheating, the TPM would see that a self-signed executable was used during boot and refuse to say the system was unmodified.