Explore >> Select a destination


You are here

www.grendelman.net
| | debugging.works
1.1 parsecs away

Travel
| | describes how to debug a Linux Kernel Module
| | chipnetics.com
1.0 parsecs away

Travel
| | My notes for building the latest Linux kernel, and running the latest firmware, for a more bleeding edge experience.
| | williamdurand.fr
0.8 parsecs away

Travel
| | CVE-2016-0728 has been disclosed earlier this week and it is a serious security issue. The vulnerability affects most of the Linux kernel versions (3.8 and above). Although the exploit seems tricky to successfully use, it is still a flaw that has to be patched ASAP.
| | marc.info
18.0 parsecs away

Travel
| [AI summary] The provided text is a log output from an X server startup, likely from a Unix-like operating system such as NetBSD or OpenBSD. It includes information about the X server initialization, device detection, input devices, and some USB device listings. The log shows the X server loading modules, initializing extensions, and detecting hardware such as keyboards and mice. There is also a mention of the AIGLX (Accelerated GLX) module being loaded, which is related to OpenGL rendering. The log ends with some USB device information, indicating the system's hardware configuration.