IRC Logs for #crux-devel Wednesday, 2019-05-15

*** stenur has quit IRC00:09
TimB_Romster: ccache 3.7.1 is out and upstream url changed to www.ccache.dev, download url is now on github: https://github.com/TimB87/crux-ports/blob/master/ccache/Pkgfile07:05
frinnstthese new hip TLD are so stupid. Hold my beer when i renew my .guru domain07:35
frinnstwhile*07:35
TimB_lol07:35
Romsterwait until a TLD disappears08:17
ryuoi'm still waiting for a .ster TLD.08:47
frinnsthttps://cpu.fail/08:48
frinnstfun times08:48
frinnsthttps://zombieloadattack.com/08:48
ryuowhy would anyone want a domain names that reaks of failure?08:48
ryuolol08:48
Romsterryuo, i would be grabbing a heap of .ster names if it did exist08:58
*** jue has quit IRC10:03
*** jue has joined #crux-devel10:10
*** xor29ah has quit IRC12:20
*** xor29ah has joined #crux-devel12:20
frinnstACTION pokes pedja 12:43
frinnstseems intel has new microcode out for the new fuckup12:43
frinnsthttps://security-tracker.debian.org/tracker/source-package/intel-microcode12:44
pedjathat zombiesomething thing? I'll push the update in a couple of hours12:46
frinnstyeah12:46
ryuoi never thought i'd see vulnerabilities in the actual CPU.12:48
ryuolol...12:48
pedjaisn't one of the highlights for new intel cpu gen that they finally addressed some vulns in silicon instead of microcode?12:50
*** stenur has joined #crux-devel12:56
pedjawhere did debian get that (2090514), I wonder. the latest official on Intel site is 20180807a12:56
pedja2019051412:56
pedjaand suse ships 20190507 as the latest. wth13:00
pedjaah, github. of course13:01
pedjafrinnst, should I add the [notify] thingie to commit message?13:12
*** pedja has joined #crux-devel13:39
pedja'disable hyperthreading'. that's Intels answer to everything these days :)14:14
Romsterglad i don't run intel :D14:49
jaegeryou're totally safe :)15:21
Romsternot really :) but just don't like the idea of meltdown and other bugs, amd has there fair share of bugs too.15:24
jaegerIt's handy at least that we can check mitigation status directly from the kernel now15:25
jaegerpedja mentioned it in #crux, the /sys file15:25
jaegerI use a line like this to check them now and then: for v in /sys/devices/system/cpu/vulnerabilities/*; do echo -n "${v##*/}: "; cat ${v}; done15:26
*** stenur has quit IRC15:40
*** onodera has joined #crux-devel16:32
*** onodera has quit IRC21:41
*** stenur has joined #crux-devel22:29
*** stenur has quit IRC23:52

Generated by irclog2html.py 2.14.0 by Marius Gedminas - find it at mg.pov.lt!