I hereby claim:
- I am greyltc on github.
- I am greyltc (https://keybase.io/greyltc) on keybase.
- I have a public key whose fingerprint is D903 1085 68FB 528B 94BA CE0A 80DA 60E7 2570 377C
To claim this, I am signing this object:
runtime: nelems=512 nfree=409 nalloc=103 previous allocCount=100 nfreed=65533 | |
fatal error: sweep increased allocation count | |
runtime stack: | |
runtime.throw(0xc291ac, 0x20) | |
/usr/lib/go/src/runtime/panic.go:566 +0x95 | |
runtime.(*mspan).sweep(0x7fb637391fb0, 0x7fb637391f01, 0x431301) | |
/usr/lib/go/src/runtime/mgcsweep.go:287 +0x7ab | |
runtime.(*mcentral).cacheSpan(0x1014790, 0x170000d670) | |
/usr/lib/go/src/runtime/mcentral.go:47 +0x491 |
runtime:greyobject: checkmarks finds unexpected unmarked object obj=0xc42020de00 | |
runtime: found obj at *(0xc42020e900+0x270) | |
base=0xc42020e900 k=0x6210107 s.base()=0xc42020e000 s.limit=0xc42020ff80 s.sizeclass=32 s.elemsize=1152 | |
*(base+0) = 0xc4201db500 | |
*(base+8) = 0x37b | |
*(base+16) = 0x37b | |
*(base+24) = 0xc4201db504 | |
*(base+32) = 0x263 | |
*(base+40) = 0x377 | |
*(base+48) = 0xc4201db5fa |
==> Making package: bowtie2 2.3.1-1 (Sat Mar 11 13:46:32 GMT 2017) | |
==> Checking runtime dependencies... | |
==> Checking buildtime dependencies... | |
==> Retrieving sources... | |
-> Found v2.3.1.tar.gz | |
==> Validating source files with md5sums... | |
v2.3.1.tar.gz ... Passed | |
==> Removing existing $srcdir/ directory... | |
==> Extracting sources... | |
-> Extracting v2.3.1.tar.gz with bsdtar |
#!/usr/bin/env bash | |
# example usage: ./mkcert.sh plex.domain.com | |
DOMAIN_NAME=$1 | |
openssl pkcs12 -export -in /etc/letsencrypt/live/$DOMAIN_NAME/fullchain.pem -inkey /etc/letsencrypt/live/$DOMAIN_NAME/privkey.pem -out /var/lib/plex/archive.pfx -name "$DOMAIN_NAME" |
this computer's BIOS is hardcoded to boot from $EFI_PARTITION/EFI/Microsoft/boot/bootmgfw.efi every time | |
I've moved Microsoft's $EFI_PARTITION/EFI/Microsoft/boot/bootmgfw.efi to $EFI_PARTITION/EFI/Microsoft/boot/bootmgfw.efi.ms | |
I've copied grub's efi boot stub from $EFI_PARTITION/EFI/arch_grub/grubx64.efi | |
to $EFI_PARTITION/EFI/Microsoft/boot/bootmgfw.efi so that the machine boots into grub | |
I've edited /usr/lib/os-probes/mounted/efi/20microsoft to look for my newly named windows efiloader stub: | |
sudo sed -i 's,bootmgfw.efi ,bootmgfw.efi.ms ,g' /usr/lib/os-probes/mounted/efi/20microsoft |
#!/usr/bin/env bash | |
#bash <(curl -L https://gist.github.com/greyltc/dcfab85afb29bad4e476b973b2575315/raw) $DEST | |
shopt -s nullglob | |
files=(*) | |
NOTOPEN=() | |
for i in "${!files[@]}"; do | |
if fuser -s "${files[$i]}" ; then |
$ kicad | |
/usr/lib64/python2.7/site-packages/wx-3.0-gtk3/wx/_core.py:16629: UserWarning: wxPython/wxWidgets release number mismatch | |
warnings.warn("wxPython/wxWidgets release number mismatch") | |
Segmentation fault (core dumped) |
$ wx-config --list | |
Default config is gtk2-unicode-3.0 | |
Default config will be used for output | |
Alternate matches: | |
gtk3-unicode-3.0 | |
Also available in /usr: |
I hereby claim:
To claim this, I am signing this object:
2018-04-17 11:00:51,103 - pyvisa - DEBUG - SerialSession was correctly imported. | |
2018-04-17 11:00:51,124 - pyvisa - DEBUG - USBSession and USBRawSession were correctly imported. | |
2018-04-17 11:00:51,127 - pyvisa - DEBUG - TCPIPSession was correctly imported. | |
2018-04-17 11:00:51,128 - pyvisa - DEBUG - GPIBSession was correctly imported. | |
2018-04-17 11:00:51,128 - pyvisa - DEBUG - Created library wrapper for unset | |
2018-04-17 11:00:51,128 - pyvisa - DEBUG - Created ResourceManager with session 1889153 | |
2018-04-17 11:00:51,129 - pyvisa - DEBUG - TCPIP::10.42.0.30::INSTR - opening ... | |
2018-04-17 11:00:51,129 - pyvisa - DEBUG - RawTCPClient: connecting to socket at (10.42.0.30, 111) | |
2018-04-17 11:00:51,149 - pyvisa - DEBUG - Make call <PortMapperVersion.get_port: 3>, (395183, 1, 6, 0), <bound method PortMapperPacker.pack_mapping of <pyvisa-py.protocols.rpc.PortMapperPacker object at 0x7f3ce2010cf8>>, <bound method Unpacker.unpack_uint of <pyvisa-py.protocols.rpc.PortMapperUnpacker object at 0x7f3ce2010d68>> | |
2018-04-17 |