Привет! На работе спор плюсовиков: юзать или не юзать исключения от слова совсем.
Я за комбинированный подход. Так читать ассемблер я не умею, прошу аргументы: может кто-то подкинет статейку на то, насколько быстры сейчас исключения в бинарях, сгенерированных современными компиляторами? Или свои соображения...
Всем привет. Залил dd-wrt 2015-го года вместо прошивки версии 2010-го года. И заметил, что роутер периодически начал фризить. Включил логи, а там вот что увидел:
Jan 18 14:40:30 DD-WRT authpriv.warn dropbear[3473]: Bad password attempt for 'root' from 122.225.109.103:47373 Jan 18 14:40:30 DD-WRT authpriv.warn dropbear[3469]: Bad password attempt for 'root' from 122.225.109.103:38946 Jan 18 14:40:31 DD-WRT authpriv.warn dropbear[3473]: Bad password attempt for 'root' from 122.225.109.103:47373 Jan 18 14:40:31 DD-WRT authpriv.warn dropbear[3470]: Bad password attempt for 'root' from 122.225.109.103:44156 Jan 18 14:40:31 DD-WRT authpriv.warn dropbear[3469]: Bad password attempt for 'root' from 122.225.109.103:38946 Jan 18 14:40:32 DD-WRT authpriv.warn dropbear[3471]: Bad password attempt for 'root' from 122.225.109.103:44700 Jan 18 14:40:32 DD-WRT authpriv.warn dropbear[3469]: Bad password attempt for 'root' from 122.225.109.103:38946 Jan 18 14:40:33 DD-WRT authpriv.warn dropbear[3469]: Bad password attempt for 'root' from 122.225.109.103:38946 Jan 18 14:40:35 DD-WRT authpriv.warn dropbear[3472]: Bad password attempt for 'root' from 122.225.109.103:45818 Jan 18 14:40:35 DD-WRT authpriv.warn dropbear[3469]: Bad password attempt for 'root' from 122.225.109.103:38946 Jan 18 14:40:36 DD-WRT authpriv.warn dropbear[3472]: Bad password attempt for 'root' from 122.225.109.103:45818 Jan 18 14:40:36 DD-WRT authpriv.warn dropbear[3469]: Bad password attempt for 'root' from 122.225.109.103:38946 Jan 18 14:40:36 DD-WRT authpriv.warn dropbear[3472]: Bad password attempt for 'root' from 122.225.109.103:45818 Jan 18 14:40:37 DD-WRT authpriv.warn dropbear[3469]: Bad password attempt for 'root' from 122.225.109.103:38946 Jan 18 14:40:37 DD-WRT authpriv.info dropbear[3469]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 122.225.109.103:38946 Jan 18 14:40:38 DD-WRT authpriv.warn dropbear[3472]: Bad password attempt for 'root' from 122.225.109.103:45818 Jan 18 14:40:39 DD-WRT authpriv.warn dropbear[3473]: Bad password attempt for 'root' from 122.225.109.103:47373 Jan 18 14:40:39 DD-WRT authpriv.info dropbear[3472]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 122.225.109.103:45818 Jan 18 14:40:45 DD-WRT authpriv.warn dropbear[3473]: Bad password attempt for 'root' from 122.225.109.103:47373 Jan 18 14:40:46 DD-WRT authpriv.warn dropbear[3470]: Bad password attempt for 'root' from 122.225.109.103:44156 Jan 18 14:40:47 DD-WRT authpriv.warn dropbear[3470]: Bad password attempt for 'root' from 122.225.109.103:44156 Jan 18 14:40:48 DD-WRT authpriv.warn dropbear[3470]: Bad password attempt for 'root' from 122.225.109.103:44156 Jan 18 14:40:49 DD-WRT authpriv.warn dropbear[3470]: Bad password attempt for 'root' from 122.225.109.103:44156 Jan 18 14:40:49 DD-WRT authpriv.info dropbear[3470]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 122.225.109.103:44156 Jan 18 14:40:52 DD-WRT authpriv.warn dropbear[3473]: Bad password attempt for 'root' from 122.225.109.103:47373 Jan 18 14:41:01 DD-WRT authpriv.warn dropbear[3473]: Bad password attempt for 'root' from 122.225.109.103:47373 Jan 18 14:41:02 DD-WRT authpriv.warn dropbear[3473]: Bad password attempt for 'root' from 122.225.109.103:47373 Jan 18 14:41:02 DD-WRT authpriv.info dropbear[3473]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 122.225.109.103:47373 Jan 18 14:41:04 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:06 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:41:06 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:07 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:08 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:10 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:13 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:13 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:14 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:17 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:18 DD-WRT authpriv.warn dropbear[3475]: Bad password attempt for 'root' from 122.225.109.103:56540 Jan 18 14:41:18 DD-WRT authpriv.info dropbear[3475]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 122.225.109.103:56540 Jan 18 14:41:26 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:41:37 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:41:40 DD-WRT authpriv.warn dropbear[3476]: Bad password attempt for 'root' from 122.225.109.103:1390 Jan 18 14:42:08 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:42:33 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:33 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:34 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:42 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:43 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:43 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:49 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:42:50 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:51 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:54 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:54 DD-WRT authpriv.warn dropbear[3478]: Bad password attempt for 'root' from 122.225.109.103:6830 Jan 18 14:42:55 DD-WRT authpriv.info dropbear[3478]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 122.225.109.103:6830 Jan 18 14:43:21 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:27 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:28 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:30 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:32 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:43:33 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:43:33 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:34 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:43:34 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:34 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:43:35 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:35 DD-WRT authpriv.warn dropbear[3474]: Bad password attempt for 'root' from 122.225.109.103:55900 Jan 18 14:43:36 DD-WRT authpriv.info dropbear[3474]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 122.225.109.103:55900 Jan 18 14:43:39 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:41 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:42 DD-WRT authpriv.warn dropbear[3479]: Bad password attempt for 'root' from 122.225.109.103:26409 Jan 18 14:43:42 DD-WRT authpriv.info dropbear[3479]: Exit before auth (user 'root', 10 fails): Max auth tries reached - user 'root' from 122.225.109.103:26409 Jan 18 14:43:44 DD-WRT authpriv.info dropbear[3471]: Exit before auth (user 'root', 1 fails): Error reading: Connection reset by peer Jan 18 14:43:44 DD-WRT authpriv.info dropbear[3480]: Exit before auth: Error writing: Connection reset by peer Jan 18 14:46:41 DD-WRT authpriv.info dropbear[3477]: Exit before auth: Timeout before auth Jan 18 14:46:41 DD-WRT authpriv.info dropbear[3476]: Exit before auth (user 'root', 1 fails): Timeout before auth
Всем привет. Сабж. RockShox Recon Silver Tk (Solo Air). Кто таким занимался? По мануалу, по идее, должен сервисное обслуживание сделать, но боюсь разбирать. Кто перебирал? Что нужно учесть, какое масло заливать? Где таблица соотвествия этим oz (вязкость же?)? Какие инструменты особенно учесть и т.д.?
Привет! Сколько сабж должен собираться? У меня на виртуалке, куда я отдал два ядра (на хосте 2 реальных + 2 виртуальных) make делался с 9 утра, до 14 часов где-то и оборвалось на ошибке какой-то. К сожалению, что за ошибка не помню - не сообразил зафиксировать - сонный был (есть возможность логи где глянуть, кстати?). Вопрос? Это нормально, если это все было на VirtualBox-е, процессор - Core i5 430M, файловая система на хосте ext4, у гостя - тоже, но на хосте барьер включен, а там — нет, к тому же data=writeback ?
upd. А, да - Ubuntu x86_64 14.10 - @host, x86 14.10 - @guest.