• 0 Posts
  • 82 Comments
Joined 18 days ago
cake
Cake day: September 14th, 2025

help-circle
  • tal@olio.cafetoSelfhosted@lemmy.worldhow do I find process that leads to oom?
    link
    fedilink
    English
    arrow-up
    19
    arrow-down
    1
    ·
    edit-2
    19 hours ago

    OOMs happen because your system is out of memory.

    You asked how to know which process is responsible. There is no correct answer to which process is “wrong” in using more memory — all one can say is that processes are in aggregate asking for too much memory. The kernel tries to “blame” a process and will kill it, as you’ve seen, to let your system continue to function, but ultimately, you may know better than it which is acting in a way you don’t want.

    It should log something to the kernel log when it OOM kills something.

    It may be that you simply don’t have enough memory to do what you want to do. You could take a glance in top (sort by memory usage with shift-M). You might be able to get by by adding more paging (swap) space. You can do this with a paging file if it’s problematic to create a paging partition.

    EDIT: I don’t know if there’s a way to get a dump of processes that are using memory at exactly the instant of the OOM, but if you want to get an idea of what memory usage looks at at that time, you can certainly do something like leave a top -o %MEM -b >log.txt process running to get a snapshot every two seconds of process memory use. top will print a timestamp at the top of each entry, and between the timestamped OOM entry in the kernel log and the timestamped dump, you should be able to look at what’s using memory.

    There are also various other packages for logging resource usage that provide less information, but also don’t use so much space, if you want to view historical resource usage. sysstat is what I usually use, with the sar command to view logged data, though that’s very elderly. Things like that won’t dump a list of all processes, but they will let you know if, over a given period of time, a server is running low on available memory.


  • tal@olio.cafetoTechnology@lemmy.world60hz Displays are a slideshow
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    21 hours ago

    I’m the other way. I’d rather have battery life on cell phones, and turn the refresh rate down.

    On a desktop, where the power usage is basically irrelevant, then sure, I’ll crank the refresh rate way up. One of the most-immediately-noticeable things is the mouse pointer, and that doesn’t exist on touch interfaces.





  • Canada called me a couple of weeks ago, they want to be part of it

    https://tvtropes.org/pmwiki/pmwiki.php/Main/GirlfriendInCanada

    Girlfriend in Canada

    A convenient way for a character to disabuse the idea that they’re either gay, too socially inept for a relationship or simply unlucky in love is to claim that they indeed have a girlfriend — but the other characters have never met her because she lives in Canada. She doesn’t visit very often, but when she does they just spend all day in bed. Look, here’s her entry in his phone’s contact list. No, you can’t see a picture.

    The idea is that since “she” lives in a different country, and presumably would have to get a passport and go through all that hassle in order to visit her “boyfriend”, it’s particularly tempting to make her Canadian as a way of discouraging others from asking too many questions.

    The tactic could be scaled up.


  • Hmm.

    So for some software, you can just increase the price.

    But…I wonder what that will do to the cost of video games. Typically, those are closer to one-off releases, not packages where new releases exist and are regularly purchased or subscriptions are in place.

    I’d expect this to increase the cost of maintenance, if there are legal obligations on publishers to monitor, notify, and deploy security fixes for their software and upstream. You’d think that it might encourage vendors to EOL software sooner; pull it off Steam or the like, mark as no longer supported.

    Maybe there are some exemptions somewhere that affect those.



  • tal@olio.cafetolinuxmemes@lemmy.worldWe have POSIX at home
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    2
    ·
    edit-2
    2 days ago

    What’s the big deal with POSIX? Why are ppl constantly discussing what is and isn’t posix compliant?

    The short version: it’s a least-common-denominator standard that spans multiple Unix and Unix-like systems, so if you write to it, your software can fairly-trivially run on various systems.

    https://en.wikipedia.org/wiki/POSIX

    Windows has some level of Microsoft-provided Posix support, which is what the post is alluding to. I am fairly confident that it doesn’t have full Posix compliance. Cygwin, a separate, non-Microsoft, open-source effort, might qualify.

    kagis

    Okay, apparently it does confirm to a portion of the Posix standard:

    https://en.wikipedia.org/wiki/Microsoft_POSIX_subsystem

    The subsystem only implements the POSIX.1 standard – also known as IEEE Std 1003.1-1990 or ISO/IEC 9945-1:1990 – primarily covering the kernel and C library programming interfaces which allowed a program written for other POSIX.1-compliant operating systems to be compiled and run under Windows NT. The Windows NT POSIX subsystem did not provide the interactive user environment parts of POSIX, originally standardized as POSIX.2. That is, Windows NT did not provide a POSIX shell nor any Unix commands out of the box, except for pax. The NT POSIX subsystem also did not provide any of the POSIX extensions that postdated the creation of Windows NT 3.1, such as those for POSIX Threads or POSIX IPC.





  • I have a feeling its mostly due to some audio and video hardware that has some real longevity. I’ve got a VHS+minidv player that I am transferring old videos from using FireWire (well, for the minidv. VHS is s-video capture).

    Yeah, that’s a thought…though honestly, unless whatever someone is doing requires real-time processing and adding latency is a problem, they can probably pass it through some other old device that can speak both Firewire and something else.

    Probably the m-audio delta 1010

    That doesn’t have a Firewire interface, does it? I thought I had one of those.

    checks

    Oh, I’m thinking of the 1010LT, not the 1010. That lives on a PCI card.


  • If it’s Linux, sounds like it should just work out of box, at least for a while longer.

    https://www.tomshardware.com/news/linux-to-support-firewire-until-2029

    Linux to Support Firewire Until 2029

    The ancient connectivity standard still has years of life ahead of it.

    Firewire is getting a new lease on life and will have extended support up to 2029 on Linux operating systems. Phoronix reports that a Linux maintainer Takashi Sakamoto has volunteered to oversee the Firewire subsystem for Linux during this time, and will work on Firewire’s core functions and sound drivers for the remaining few that still use the connectivity standard.

    Further, Takashi Sakamoto says that his work will help users transition from Firewire to more modern technology standards (like perhaps USB 2.0). Apparently, Firewire still has a dedicated fanbase that is big enough to warrant six more years of support. But we suspect this will be the final stretch for Firewire support, surrounding Linux operating systems. Once 2029 comes around, there’s a good chance Firewire will finally be dropped from the Linux kernel altogether.







  • Is your concern compromise of your data or loss of the server?

    My guess is that most burglaries don’t wind up with people trying to make use of the data on computers.

    As to loss, I mean, do an off-site backup of stuff that you can’t handle losing and in the unlikely case that it gets stolen, be prepared to replace hardware.

    If you just want to keep the hardware out of sight and create a minimal barrier, you can get locking, ventillated racks. I don’t know how cost-effective that is; I’d think that that might cost more than the expected value of the loss from theft. If a computer costs $1000 and you have a 1% chance of it being stolen, you should not spend more than $10 on prevention in terms of reducing cost of hardware loss, even if that method is 100% effective.