I mean no harm.

  • 1 Post
  • 38 Comments
Joined 2 years ago
cake
Cake day: July 4th, 2023

help-circle




  • Btw, ld.so is a symlink to ld-linux-x86-64.so.2 at least on my system. It is an statically linked executable. The ld.so is, in simpler words, an interpreter for the ELF format and you can run it:

    ld.so --help
    

    Entry point address: 0x1d780

    Which seems to be contained in the only executable section segment of ld.so

    LOAD 0x0000000000001000 0x0000000000001000 0x0000000000001000
         0x0000000000028bb5 0x0000000000028bb5  R E    0x1000
    

    Edit: My understanding of this quite shallow; the above is a segment that in this case contains the entirety of the .text section.





  • JATth@lemmy.worldtoScience Memes@mander.xyzIt's the law!
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    3 months ago

    Send it through the earth, you can reduce it theoretically to 42.5ms

    This isn’t as ridiculous as it sounds and you just need a neutrino-beam… which has a horrible bandwidth (of 0.1 bits/s) plus the ridiculous upfront cost of running two particle-accelerators for a full-duplex link. (Google it up, this exists.)












  • Python is just a pile of dicts/hashtables under the hood. Even the basic int type is actually a dict of method names:

    x = 1
    print(dir(x))
    ['__abs__', '__add__', '__and__', '__bool__', '__ceil__', '__class__', '__delattr__', '__dir__', ... ]
    

    PS: I will never get away from the fact that user-space memory addresses are also basically keys into the page table, so it is hashtables all the way down - you cannot escape them.